Netskope Administration for Departing Users
When a user announces their departure from the organization, it's crucial to implement stringent controls and checks to protect corporate data and resources. The user's account should immediately be placed into a "Leaving Users" group within their Identity Provider or Directory Services. This move should trigger a set of pre-configured policies for these accounts.
Critical Policies to be Enabled
- Restricted Activities: This policy limits certain user activities to prevent potential loss of data:
 - Unable to Delete Files: Prevents the user from unintentionally or maliciously deleting crucial company information.
 - Unable to Share Files to Any Non-Corporate User: Ensures sensitive company data isn't shared externally.
 - Unable to Download from Salesforce: Ensure customer and prospect data from being downloaded.
 - Restricted Instances: This policy confines the user's interaction with certain instances:
 - Unable to Upload any files to Non-Corporate Instances of Sanctioned Cloud Applications: Keeps the organization's data within its control and stops it from being transferred to external locations.
 - Restricted Applications: This policy governs which applications the user can access:
 - Unable to Access or Upload Files to Unsanctioned Applications: Keeps company data within approved applications and prevents data leakage
 - Restrict Endpoint Controls: This policy should be activated to limit endpoint activities:
 - Unable to Transfer any Files to USB: This ensures that data can't be physically taken out of the organization's network.
 - Unable to Print any Files: This prevents hard copy data leakage, which can be difficult to track.
 - Restrict IaaS controls: This policy restricts Infrastructure as a Service (IaaS) access:
 - Network Administrators should be removed from accessing Production instances of IaaS: This ensures only the necessary personnel can access the production environment.
 
Investigation Best Practices for Administrators:
- Advanced Analytics: Leverage Netskope's Advanced Analytics to monitor user activities and data flow. This allows early detection and management of any anomalies or suspicious activities.
 - Insider Threat Report: Ensure this report is run with filters for the departing User Group.
 - Generate a Comprehensive Report: Curate a report of all Application Events for the leaving user for review by the manager. This offers a complete overview of the user's interactions with the company's resources.
 - User Investigation Report: Ensure this report is run with filters for the departing User Group
 
Additional Best Practices for Administrators
- Take Prompt Action: Implement all changes as soon as a user announces they are leaving to minimize the window for potential data compromises.
 - Revoke Access: After the user's last day, ensure all access to corporate resources is immediately revoked.
 - Documentation: Keep detailed records of all actions taken during the offboarding process. This assists in audits, troubleshooting, and provides a reference for future cases.
 - Regular Review of Departing User Policies: Update and review policies regularly to keep them relevant and effective.
 
Additional Security Policies to consider:
- Password Change Policy: Force an immediate password change to prevent unauthorized access.
 - Email Forwarding Policy: Disable auto-forwarding of emails to prevent potential data leakage.
 - Data Backup Policy: Backup all data associated with the user to prevent loss during the offboarding process.
 
By adhering to these practices, a Netskope Administrator can ensure a secure and efficient offboarding process for departing users, mitigating the risk to the organization's data and resources.



