Skip to main content

AD_4nXcf53qXXk9wx3JGbI0Hfbp1jsjv4pAtxj5oVKLP0DKN8AbUpJRfYMOEBjyLXdxOHZhR-k8z9H6TMX84H7rVbHpxCQWZzHnldMK0drZC0nMqnkq66bwcYcnDJkGzLlVE2csN2Jsxy3dB5BFrM6J0sSQM7jBG?key=svBqfKSmOjFNqmB_VemgVw

Netskope Global Technical Success (GTS)

KB - Netskope Inline DLP with Microsoft Information Protect (MIP) Labels

 

Netskope Cloud Version - 118

 

Objective

Prevent exfiltration of high sensitive Microsoft documents labeled with MIP.

 

Prerequisite

  • Netskope standard/advanced inline DLP license is required.
  • Netskope DLP Entity Modifier backend flag must be enabled on the tenant.

See: Release notes and Information.

  • Netskope Forensics should be configured and enabled on your preferred SaaS/IaaS.

See: Forensics, Configure Classic SaaS, and Next Gen Forensics

  • Microsoft co-authoring must be disabled.

See: Enable co-authoring for files encrypted with sensitivity labels

 

Context

There are customers who are already labeling their Microsoft documents with MIP labels and wish to prevent any of these documents being exfiltrated outside of their organization.

 

Limitation

When a document is labeled, the label becomes part of the document’s metadata. If Microsoft co-authoring is enabled, the file metadata is encrypted, therefore Netskope DLP engine will not be able to inspect the file metadata.

 

Configuration

  • After a document is labeled, the label can be seen while opening a file’s property.
  • For testing purposes, we have created a label named: “Confidential internal” and labeled a word document as you can see below:

AD_4nXceAByEZ-bD1VqPEifM_R4BmU4t-UGrn0i8OwKdXThaEEdBX1wNVgLghhPdLnwHVh4TddcaZEPNuEbwqMEXsC1faN4iTra1LCiWDxjdAhtdOD2zhwHrAtdvqW3euMTCJmIhBgo5jGArfLIdURnAaIY7brxp?key=svBqfKSmOjFNqmB_VemgVw

You will notice that the string: “5acb46e4-3dca-49b8-b138-4eb2fd6f47cf” is shared across many properties, in this case, we will use the following to create a DLP Identifier:

 

MSIP_Label_5acb46e4-3dca-49b8-b138-4eb2fd6f47cf_Name:

 

Path: Netskope Tenant UI >>> Policies >>> Profile --- DLP >>> EDIT RULES >>> Data Loss Prevention >>> Entities >>> Click on “New Entity” then add the above string, and save the Entity:

AD_4nXeKcjncd8pQcjp7xC3-47HMhEizltw9DlX_2TrCKyZnH-UqHtn8pAJ0BzZc5Blh6omaxrhLJiurngtBKEj5LSY3mk_bqphxMNCIQN0ySG_G3KHagRm-CFQw-XPDPJYdNMmYcV8oyYF1zeLJaCypbhGBelc4?key=svBqfKSmOjFNqmB_VemgVw

 

Path: Netskope Tenant UI >>> Policies >>> Profile --- DLP >>> EDIT RULES >>> Data Loss Prevention >>> Rules >>> Click on “New Rule” then add the above Entity, and save the rule:

AD_4nXeG6eUeHA7N-897V4oCMzXWIHMBYcQ5RcPQGUH8sF4wHeMe3dJii6V3Ya71ysYyjfTAJ9vAF-6GBpj9Vh2z-EOJWauoop_ehsQ5OeCX5dctOwZf0MIik_in5y55d-frrGpA8vmsf59q44eYmNuotzUePaPZ?key=svBqfKSmOjFNqmB_VemgVw

Note: Limit the scan to metadata only and action when low threshold is 1.

 

Path: Netskope Tenant UI >>> Policies >>> Profile --- DLP >>> Click on “New Profile”  then add the above Rule, and save the profile:

AD_4nXdEX1LgzJKuYqp-jLoHuBuYqM2TD3krGwL7D-7JtU7DqZV5fr2nb7Torf0WzBaMw5hL7SitsANHvqJQFGE5Tf2U4PI2hf9X7IeOdOoKz0JZWDcluz9z-_HB42SjchfPSABYkxmGkL29EtUyNQ5B_gjctkWk?key=svBqfKSmOjFNqmB_VemgVw

 

Now, you are ready to add the profile on any real time policy along with activity where we can inspect for DLP, in this example, we will be using Slack with the below Policy configuration:

 

Path: Netskope Tenant UI >>> Policies >>> New Policy >>> Cloud App Access

AD_4nXc44U1fIza_8iYs67DoKcBAV9xoLRxSPDDAeTY_6iZnxgdJbuw-QszCC_747oQ_LI4JrPug3RqKCl5A24p1oj7OZdkOG_uZU-WExXp1fkpee9N6J0VJHoU_8IAdO6IU1wMUgpUusQXS2gRT816CKQ8nDE8S?key=svBqfKSmOjFNqmB_VemgVw

 

Testing:

Alert at User level:

AD_4nXc5bVTAvGkUlYogl2HdJjd87QYtaYZqUGI-GvT9I74-V2mgPfkS-zM1r3jilq8L5-I3RZCwrnkLfj0QV8a56kxXWPgfzdxYedczOdgI2AOcQ7IWqHyb3l38-1WXiXOMuckNJ4xv3Pbgcu0SNF-OTuB_lYA?key=svBqfKSmOjFNqmB_VemgVw

 

Incident via UI with Forensics Enabled:

AD_4nXc5q737_U5UisadoeJx0SucUj7vRdCglNPPzOObCqKiLTY9B3GfrqLfZElHXfU9f0VKjPGpTTvRSRn4v5HN8ySEm_taZby84bPqy6hDppAjoXq1g1K1S12KgHoZxyMMqlm6IGloLQLsfIfQpG2ehbHqYdLk?key=svBqfKSmOjFNqmB_VemgVw

 

Notes to remember:

  • An Alert will be generated only on activities where we support DLP, please check CCI Page if you wish to validate whether a specific application with a predefined connector supports DLP.
  • After checking that the application and specific activity supports DLP, ensure that no exceptions are configured neither via Steering Configuration nor SSL Policy with “Do Not Decrypt” as an action.
  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.