Skip to main content

AD_4nXc4z_GqtsfVfEcaC2oWK-ohgpQ1EP5mA4CKuDikIrzTblGswu0n4u5RzramiHBfFgKPmMbONxJ80K_D-27CmdtzBD1ePoot3pdGLb7QbRyZg64fXKxQHJ5rFvoeyTmqPc8MGy9Z?key=ht0fV_dmWK0vT-vC9hSpX9dr

Netskope Global Technical Success (GTS)

Detect transfer of sensitive files classified using classification tool in Netskope

 

Netskope Cloud Version - 122

 

Objective

This document outlines the steps to configure a policy in Netskope for detecting the transfer of files labeled as "Sensitive" by a classification tool.

 

Prerequisite

Netskope Inline SWG and DLP license is required

 

Context

A data classification tool is used to categorize and organize data into predefined categories based on sensitivity, value, or other characteristics. Having said that, organizations might want to create policies to safeguard their already classified sensitive documents using DLP policies created in Netskope.

This document will guide through the steps that can be followed to achieve this use case.

 

Lab recreate

In this lab exercise, we will configure a DLP policy to detect a file classified as “Highly Sensitive

Classification tools embed classification tags into a document’s metadata properties. Therefore, Netskope policies must be defined specifically to identify the keyword “Highly Sensitive” within the metadata only, excluding any occurrences in other parts of the document.

 

Step 1 : Create a new entity with the keyword “Highly sensitive”

Path: Netskope Tenant UI >>> Policies >>> Profile >>> DLP — DLP Rule — Entities

AD_4nXexHULqBOCC40JaYW_Aw7v29lBrnFjSLHiMDEEnfasBBcZbP32F_tVsc95lrG3-JZ2_-w5VmyoHl4gdZqk-TPtB2X1rBjuvzFFADxKDUqiEJC3wFB1FiXbKuOrDPzkFwHO8sBKEIA?key=ht0fV_dmWK0vT-vC9hSpX9dr

 

Step 2 : Create a DLP rule including the above entity

Path: Netskope Tenant UI >>> Policies >>> Profile >>> DLP — DLP Rule — Rule New rule

Choose the data identifier created in Step 1 and click on Next until the “content” section

AD_4nXcRRlgsOOjpW001rh1A0TBg1cHoWABriEALaaME0XxlF-flLwg3QXQuLOUlPlHgf9ui3-wUbd7bO1QI5MYDB3iMpY3PUlBVrvSV4tCHSXBraC2rPU7ECK-WwPQfwnFfctq_7-dc?key=ht0fV_dmWK0vT-vC9hSpX9dr

 

In the content section, choose “Metadata” only as we only want to detect the classification tag within the Metadata properties of the document. Choose severity , give name to the rule and hit save. Click on Apply changes

AD_4nXfL_UXVbcujeINCcRteZ5NsCf3f-68qpk42o2xF3FJs1AUL9C2B9pFz2Cb2afvVM9W6qSjphuqGaMn5hyIPy9YDcpSCKXXaZ1p6QTT1nnLmbwQsj7au_zc6xDJvvyqD3YwkuLXn?key=ht0fV_dmWK0vT-vC9hSpX9dr

 

Step 3 : Add the DLP rule to a new profile

Path: Netskope Tenant UI >>> Policies >>> Profile >>> DLP — New profile. 

Choose the DLP rule created in Step 2, hit save and Apply changes

AD_4nXdzuoFpNL5fJXW_QkrF2RZCFlAepijZ63h-w6U7jNShosCSXxNggECqCn6BqOduIeGdqNVe0dt9F5epDKoLMmTUzJoMURetwM2Q6GpodPHbNTz88Xkq3lxFdv0BbV7JOw4aowRZ?key=ht0fV_dmWK0vT-vC9hSpX9dr

 

Step 4 : Create a Real time protection policies for destinations of your interest to detect transfer of the files tagged as Highly sensitive

Path: Netskope Tenant UI >>> Policies >>> Realtime Protection  New policy

AD_4nXfyibnmshaApmOmDYOJunXbNhUyuch9uNO1NiVfRmP_WYK7oJQINc3qIF29vIYrxub4OcneXl9xJ563JuhTc1mHjaBFfyLhsWYsPDiKulW9hbS16ECFU4P3fZJqXCOJcy3iRX3zeA?key=ht0fV_dmWK0vT-vC9hSpX9dr

 

When you try to upload  a file that has classification within the Metadata properties, it gives you a block prompt as configured in the policy

Document content and properties

AD_4nXcGZZV4apgdGvx2q3BAg0VYcwJ9oaVNcdOCG_CPbCf7hsB8gvaPtt2_jvi9pybPzW9_VRPfWLVPgy1wSk4ZIsw495oNqq_6knIOGCRE6ci_bhDGFgOER2hH7Cq7ySgAD3gF0gCs?key=ht0fV_dmWK0vT-vC9hSpX9dr

 

AD_4nXdpQpflz6tLSmZ_g55VolbIu3-POFF5UQ4U_ofIs8svWKtWLBiCDSsCLVH-kRztVZGGTJO-ZFpfGjni3xwiaxNDscKSmOtGcWKELFf8WXcklCQRFyQRTp8hC09IgSd7qLlvMTEX_Q?key=ht0fV_dmWK0vT-vC9hSpX9dr

 

AD_4nXfTetVqhmBgRh5aIlw4Mz_FC2fCcR9GvCK8Im5I-psYadahiLC6NRfkWCD_CoFgHLR5wvF4JG0u_AgcW7RxIfcGYMCCWKHe7qguMw6hREig4GTyznecN8ZyMDsyc59TkEHp3cjQ?key=ht0fV_dmWK0vT-vC9hSpX9dr

 

Verification

Viewing the generated DLP Incidents:

Path: Netskope Tenant UI >>> Incidents - DLP

AD_4nXePIYa2_neHz2dIyiV1mYGq7hIMEiPLmSmLLHYBf6HSGXlLPXSdrGtnc9WjfqdpwAffskUigBli1CIKOgFXAirpr7w9Cc8IF4wSs8gNeW_bY4hl32yrLL27LVhb0d9UITuvfhb9?key=ht0fV_dmWK0vT-vC9hSpX9dr

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, If any such platform changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.