Skip to main content

AD_4nXe_LaLp_74gniWhO830iVEZFECtpBNDNazO8_kciHtOgpgeRToClFTUNGW6Rh2WRlxLC2OX7yrexA833TLQoU0KWSTI9Q5mfNdzFaVDNykcKU2jm2OuErq9QhuJbxwdU_UKFfmvHidksuKgxRZmm9TrJh-j8nF-7ZPa1vvFhxLv1HVrinPm2hY?key=5sSCXxzPwGoO6Pf8B99MUw

Netskope Global Technical Success (GTS)

Use Case - DLP - How to block Zip files via File Type Control

 

Netskope Cloud Version - 113

 

Objective

Blocking Zip files using a file profile within a DLP profile.

 

Prerequisite

Netskope SWG/CASB and Netskope standard/advanced inline DLP license is required.

 

Context

By configuring a file profile within a DLP policy, you can effectively block the transfer of ZIP files across your network or endpoints. This approach allows you to identify and restrict compressed files based on their format, ensuring sensitive data isn't compressed and shared without authorization. It's a key method for preventing data leakage while maintaining control over file transfers.

 

Do You Know?

 

  • Netskope DLP can leverage the File profile capabilities to detect specific files.
  • Incidents are generated for each file/sub-file that matches DLP profiles.
  • The DLP service has an internal limit of generating only 50 incidents for a given request.
  • Zip files are not supported in a RTP file type constraint:
    https://docs.netskope.com/en/supported-file-types-for-detection/

DLP Netskope doc starting point:

https://docs.netskope.com/en/data-loss-prevention/

 

Use Case

Step 1: Create a file profile

Go to Netskope UI>> Policies >> Profiles >> File >> New File Profile.

AD_4nXexLcMgN42PsJ7DKTHQe4XgbsEAjB0GTFA4sgWkalpvAdzKVg4UOQAXpDaz9pmg7XJDPhtngldhu-HNSLrzC2fsQE1r3FFfreEGJAslUJ__AdTf5FyXNRt5xttm2tlLTtetz83EmOktmPDoEkvmKP0bqXIX3Fvm18WdI-eF?key=5sSCXxzPwGoO6Pf8B99MUw

 

Click on File Type >> click the magnifying glass for archive and compressed files

AD_4nXd1rp6F0iA0yNTkiT9_BiZhFPb5RzpuyLUf8d-mzUFawElSMRWxZII79hgp2R--F3h-f2-CEQS4RmmsdM87jpXJQO90VghZtabYeZuG4ZZRldu7LaRXH--_60PIsH5M8MKqYSF-7cUywCtF09CIbsFx9D06K5i1vJg57Mi5?key=5sSCXxzPwGoO6Pf8B99MUw

At file Types search “Zip archive” and mark the checkbox, and click next.

AD_4nXcOcDv6zfIiEQPgba5c_9BEeWPr36ixy-G9P5tKHw6xt85Qt40qr8PKMJ7qp5yCZ5ECV-kuwAzmnvhG0eGbUqJASs3h3CB_4mRh5VxE63FGE9tsBkoN_tF735F_Ig7JW-xD6haeQ4XgqXjgsgbL-5m9ph3n6ldkVIWZyK_mPg?key=5sSCXxzPwGoO6Pf8B99MUw

Add a profile name and a description. Click Save and apply changes.

AD_4nXfF9pHTLRQaO_dtsYe7MaRMjNDvoZO1TxHroOCGmG5sJUPhgeUHaLBI3m_cUd6ZfeNnp3XYNvWelXoQ26RHvoXUzuU1zceCUYuY_QdItonHfduTjYaGwSruA9yEIX-FeCWjMq68RmGWXYzWRH-R_iw5VEUJKhU1uv8u6vmkQg?key=5sSCXxzPwGoO6Pf8B99MUw
 

Step 2: Create DLP profile
Go to Netskope UI >> Policies >> Profiles >> DLP >> New Profile.

Select the file type created at step 1 and mark matches at match type, click Next.

AD_4nXcFhU-aUaElFHOAPJ2DOGYswgh1JGZHx7PNTGt95teBTyuqbW9NYw_a8xopDeob8Wo7Pgq4Hne4SM1Yh6mKK3diiD5jx0HYY58O4SwmOjfxUcWfg30XLjwnc83Va3GX5LpVtpZtv6RcZPdXT-06aZNy2ZoIAmH_lpFhP45J?key=5sSCXxzPwGoO6Pf8B99MUw

Leave empty the “Rule | Classification” section and click next.

Add a profile name and click save.

AD_4nXcvGUkd86rCxMoA5SR5-XDwpQO7RyQm1_xfsry0pDXG_6Bq-jE5eS3fdm-nrI-a3HViYAUr8sOLIbN8U-W5hORrE35qLm45WCN1XeiQzVisL1HWe2tlcB9bMVuYz0SNnLuN3_bn6j2Nnypc1_STurxmzKI-nWVsSwMN1V61Lw?key=5sSCXxzPwGoO6Pf8B99MUw

Step 3: Create a real time protection policy to block Zip files.
Go to Netskope UI >> Policies >> Real Time Protection Policies >> DLP

AD_4nXfY0jZvgBiZHqBO0MYXIvF_ur6IpPUJHo9UOi6jsdXEdCHJ5Kl4mE-sLN_NWi1NwXgaOYpJJ9o_f-zkrjlOhxmg7CpCYfq0MYak7iBXhqFMqA22amJCRuAye5b-DxvMJoW2c2XE9RJ59vxbGRvaJAjKcmLdNEHYYh6GtpMp?key=5sSCXxzPwGoO6Pf8B99MUw

 

Select the application and activities you want to use to test the rule, in this case we are using google Drive and upload action.
Select the DLP profile created in step 2 and set the action block.

 

AD_4nXfqB1Z9MxxhdOwKQRfOiZT7L0xI55_gGZRTKUsG53tTIbNw94QX1HFKkbRAjObX6gsA77fY6vIk9a7YX9OBejSWerXnkM2sS7XN9Qk4Nt3dtBRgBw5pM9KERn-_SnIY4NP0OWGT-iw7OMCTyyIkOHlUxHpqQNpyOV6xRmuIQQ?key=5sSCXxzPwGoO6Pf8B99MUw

 

Verification

Select a Zip File and upload the file to the application we use to test the DLP rule.

The below message will pop-up blocking the action.AD_4nXfBTb1UpwWx_hPJM-kvAXt6j3m6j1WSRYN7xecNpdXaqc5VvtmjNZnyqluTEP0d-66C3ar5izfr-rSpHLzgn0tDfNgut8mnBPah-oQ_iSo05wbS5Scfy_NKfpxeEVLj8AzHuXEs9Aevs0yzEADGlD8sC9p-Zu5hvLLHPhntiw?key=5sSCXxzPwGoO6Pf8B99MUw

Review the policy alert details at SkopeIT:

Netskope UI >> SkopeIT >> Alerts >> Click the magnifying glass to check details.

AD_4nXcJVodCGz1IYKRX0CL28lzfBcyvrz5uPiezAS-C4EYL7vOlu8dZI8GyjJLwG2Jw2JweGXlp6L0dTZmMTMU4s4tTLwM2xWCZZFtlsMn4W6iyNdNgjf_dPDsY8bVsgsutu_WfmJ66k4gTyyVKS1-hNJlK8GgT9Hk9YGAYMjcC?key=5sSCXxzPwGoO6Pf8B99MUw

Review the DLP incident:
Netskope UI >> Incidents >> DLP >> access the incident details, clicking the object name.
AD_4nXft_uErUtAvBthKpbwU7g0GZN5eicoaWGObUGSvkHaA6HlNTKaLPxfBkso69wwC43zYRyxKxaLLt6qesRpsgRNNtX4QqVtayqCB8_qx1l3wmd_SK56fVOHYYz-antB6HGdOPlAa6LmQXNhfzI3xzdNBhAivJu3Z2_eJw9Z7gQ?key=5sSCXxzPwGoO6Pf8B99MUw

Note: as we are using a DLP profile, every time the policy is triggered you will get an SkopeIT event and an Incident event.

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

Be the first to reply!