Skip to main content

How to block Password Protected files via Netskope DLP?

  • September 17, 2024
  • 0 replies
  • 453 views

Santhosh Nair
Netskope Employee

AD_4nXdRdX3L4HEuSrH3QGHz-LHTKx4V1MAQzDNurXJfMyJK5nA1Bun-8t1nddcJeGbpFLJD4Q1EVdhVP0rTS52h65UYel4Z_m9TacAizddJGhE--M2lA6TP1KmH-rktSpsPOTCycZOX_uJLTH6RNh0TFH6V7vuo?key=rcwyKtss4kPb0w2Jg819VQ

Netskope Global Technical Success (GTS)

How to block Password Protected files via Netskope DLP

 

Netskope Cloud Version - 119

 

Objective

How to block Password Protected files via Netskope DLP

 

Prerequisite

Netskope SWG and DLP license is required

 

Context

Password-protected files can threaten organizations through insider risks, data loss, ransomware, compliance issues, shadow IT, malware concealment, collaboration barriers, forensic challenges, and key management problems. They may create a false sense of security while potentially hiding malicious activities or impeding legitimate business processes.

 

Do You Know?

  • Netskope DLP will not be able to analyze the contents of a password protected file. 
  • Instead we can detect if a file it's password-protected and apply an action to it such as Alert, Block, etc

 

Configuration

  • Create a Real-time protection policy

Path: Netskope Tenant UI >>> Policies >>> Real-time Protection >>> New Policy >>> DLP

AD_4nXevSm8p0Hw6ElNlHuW4x1qJb_VmGRBsEPnU0Z_PdaGgu6bg_KctUBeeeSP-X9Lij8lmCijRTHbz6gU6aiCP-wBN__9005vtLVlqVkWstD9xV52Gsm2hW8pVfn9n1YjqdHsKliHb_zg7nvz36oPmYcIFr34?key=rcwyKtss4kPb0w2Jg819VQ

 

  • Netskope provides a pre-defined DLP profile to detect Password Protected files

AD_4nXeg8RwJb0rU0ZLxVQapgw7ieyqe22ApaDa-_b4SausPaOyndYGKjbGvcDBT1mzT57tWrf3bdWTWHDBIOV1pT-cFtWk9V3vVR-r6y4Jy-Qj2CdQBJEEe2ZOVqHFYhGHqnD-5RjwOPit4KSrcVv6ahUXodxU?key=rcwyKtss4kPb0w2Jg819VQ

 

Verification

When the end user tries to upload a password protected file in Gdrive, they get a Pop Up from Netskope client that the activity is blocked.

AD_4nXcbS5azHSLY2CG-Vo4uc8Dt8IOd3RpbZjEjH8ax45omJegEkvkOEb2ZU_95QG0Pmbq_rGlagZ719mydR_sEqkiamxq7QT5vhPJYz1Z6e5ikcj6vpxZGBbMqVf0lBZTrMJPRjRmLYc9c-OUDFfXFR2xZnQ6b?key=rcwyKtss4kPb0w2Jg819VQ

AD_4nXfa_lNEl0nSa3Jg7HiWCOY5PgFHtBkjlfBa91SH8cZkcH37jIRisM1fSwvvx5lGTuxl9JPuCxUIBCElTv1Oa-DD5H54EW75zoKze62yYk-IxLPTzf9e4a-Uoh0ChdsBzzU1r9gm-_xbnSpliMgJ8y1Mjy5Q?key=rcwyKtss4kPb0w2Jg819VQ

AD_4nXd981MgkDIiiIIJoz4JBEV9l6U_kjNH7yGOhlmGam62WunUGs6popTTlrlq1S9EVTGq81CepHmq1knyzp1t_jwVFgDeSxthrqD1QevJS5AqqcOVFVC2QIWGGzzAiJmlCBTjvgYR6i_Nfu5gsKJephLAU-Q?key=rcwyKtss4kPb0w2Jg819VQ

 

Recommendations

  • Consider setting the policy to “Alert” before “block” to monitor the impact
  • Exceptions can be made based on User/Project Justification.

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.
This topic has been closed for replies.