Skip to main content

AD_4nXfKq4D62fN-4YdedrIRdEZ8nBPns9kdNRnaKd0Ef-VaF7Pa0mRFoYw_02jAXEy4a-64YNCouSoLQ8k2oA2qEem_f8EGaY9HsxRJhYAtDccdfTsPGSTOoww5mT0I1cf4lkXomBfERQ?key=bNIpn8LEQ0keFHdBSj5uDbRd

Netskope Global Technical Success (GTS)

Next-Gen ChatGPT Enterprise Inventory Scanning (Retroactive Scan)

 

Netskope Cloud Version - 123

 

Objective

Retroactive Scanning on ChatGPT Enterprise Instance using Next- Gen ChatGPT Enterprise API Module

 

Prerequisite

Netskope Next Gen CASB API license with ChatGPT Enterprise feature enabled

 

Context

How to perform a retroactive scan on ChatGPT Enterprise to expose the sensitive contents, conversations & collections (files & folders). For this article, we will scan all PCI information exposed through ChatGPT Enterprise.

To Learn more about Netskope Next-Gen API Retroactive Scans: Link

 

Do You Know?

  • On Feb 6, 2024, Netskope announced a new API module called ChatGPT Enterprise API. 
  • This feature is now generally available, delivering advanced security and compliance controls for your AI-powered workflows.
  • Below are the capabilities part of the solution:
  1. Ability to perform DLP & threat scan over conversations & files to adhere to compliance standards
  2. Ability to perform retroactive and ongoing scans for files & conversations
  3. Policy creation via unified NextGen API policy framework and supports visibility via dedicated dashboard

AD_4nXc4HXSKOmIAEVNenkZ7KzgsS-QbIpGN5-xZGZlOaDpt_Dj9e4UBZRytlir-2ytz2yN0Qk2LF18flvwsJOfgN8EzPBp4Pztjlq_BBjUUK_maU0Gevqy5TnwwyzJXxi1YcgqztVd-Wg?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

Configuration

To access the retroactive scan page, log in to your Netskope tenant, navigate to

Path: Netskope Tenant UI >>> Policies >>> API Data Protection >>> Next Gen >>> Click on Retroactive Scans >>> New Retroactive Scan

AD_4nXcIfypKtNgUAPJU5QoYQ3ikARn95THH9fmavIHhxzn3T8Qj_pqeysgAakIljWC9QLSJ4fuIuzSKc38VFiIVaQwEEFm06_Ph7_LPydmi9N9WQhYWSr-6sSI9jp6RAM_EIm32pmtapw?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

The New Retroactive Scan windows open. Enter the name of the Scan & Under Object, Select ChatGPT Enterprise Instance to run the scan. Click Next.

Note: For the Retroactive Scan, You can select one App Instance only.

AD_4nXd2uNrBDh1Bk_txGmbRhNgwxK8vInqBTiF88eg_zNyKyu_psvuhDDfGsDU61mYs7rIHDyR9Z1R4QpQIOFG1FRVu-xDh588i4a9SZ_fIqGBcT2dg5YGSaQIa6xQguyj9_2Q4PyOlbA?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

Now, New Retroactive Scan Policy Page opens with App Instance as pre-selected like below:

AD_4nXc6CthvVTbyjjXbHowNhSVZgvVZd_k3FmqZIvMaPMwZOrTCl6gabEP5hcanrUsva2cy6EycB-4yEfMxfosSMmVFVdnHi0ThZsUVFRhQrn5uRqlIbekgoM_8Sd5aQWDwjqakn0eQ?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

Fill in the Applicable Exposures to include/exclude collaborators like All Users, Internal/External User, User Group, User Profile, Domains, Domain Profile & No. of Internal Users as shown below:

AD_4nXfpazbUA7Fn3WFXQNhoXdnj1zXeZbn5PMgh7WYlEydPXNqwICN8ySbzRXlqy__LKtstninfdHztCFDDEuSzzBku4dPZhQQVFH0A7ppaluNHGk82ZHzA252SynriyKfDPWruChRM9g?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

Under Add Criteria, Select the File Type you want to scan or keep it blank to scan all File Types

AD_4nXcFvoGiqGDy8PViUYkwBXD4vt7nO-VSCUkWzNrEEzLqqCIXAaT5j7dPpH2ehaHOSUIj56qHdnGuNOamccFSup0dx6-z7moiwp_GSBpRzk5YjE_V4m--O3O_cYO3yV4ZD9_f3H2u?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

For this article, we are scanning the exposure of PCI Data over Conversations & Collections. The DLP Profile will be selected.

AD_4nXeffI2HbY1R4AE_hOwCIyx3j4rK1mdt9PwXmYhL8NMm22cBKhtX54KanwVuuMc63sNLv-4lmGekhUrrb5g_EupYOPTLNu5nzTatbyOxTyB65LLLIDAk2lAOxLzKt1BTFA8WK30N?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

For this Retroactive Scan, PCI-DSS Pre-defined DLP Profile is selected.

AD_4nXcaVdzY1i_y9mMlvcyQNUMgSgJaabaF8Gao_LI54UFspLKKUq5QIN1yIlo05AOC9wpUGc2sLg3IVBqGLsUGdT2NYoy0BtCebA604_tgIQc6bJQlu3GauGEacxXjIVRHE4z4F8UU1g?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

Now, Choose the Action as Alert, Enter the Name of the Policy & Click Save.

On the Retroactive Scans Page, You can choose to Add more Policies to the Scan by clicking on Add Policy or Edit the existing Policy using Edit Scan

AD_4nXel3xCMlnmDRO9HWODFWJU2UjH2jJ8mlFg_BpsYJO0UlSmJc4ozFDKl1QqePakXS-8oGR-Ys_FOF-zGJTBOnUf1P6rMqCWXu-VOdiUFVG_sYq6aWojElUpoLOWrvebrjsVcVjkrRQ?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

To start the retroactive scan, click Start Scan.

AD_4nXe4VE1PzDp2_j_Rf9aMVgt5V5MZpXx9PG1JFMU_NrZXAh2j_5LRiU_q5ekwOu4lFDCiPDzAf3y25_u1YRMbkznsqDLX3UpMvNQXtsQ-rh4HvzQoQjBg4O_b_RE5DoucsBJPHRi0nw?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

AD_4nXfeCw3NfeDq6YhcupwclITHISQMPm4CwZ2BWc57z2G1bhOjsvCrkh1WkJbdQsmmh921YzuZ8x9Q0ML1rzq_fNnzV3jbechOF_rtyeeNYuWBmBwIu5fvgJXzIlomF355ewNMBdFp?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

Once the retroactive scan is complete, you can view the following status

AD_4nXdnxgtlPGR86wJSSyzp1nUNjaBIh_qeTXUr1kQJEjqPneSHVTaPOyVQaG9YtF7hlbUcW16SLfHvGiH0iVAqQ0EMkxxpw6dZjnl6XEg3Mo-kZ8OPCCADZcdrkzakSjawd9Xf0ItKxQ?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

Verification

You can view the No. of events exposed from here.

AD_4nXf9qRzPfXnbFOL9VNCYNWRf7XlzLDetCbMRsTBvFaozNfFXOf-thE6VR3rKqAg5vNH9aC9-0lOO_ZsL_K5aM_7waadnl-8lHO5vGptKR1q0P4zDwpno9zg-_JrsdoaPIDBkxVCuZA?key=bNIpn8LEQ0keFHdBSj5uDbRd

AD_4nXd4uoRddylQHVScUZaGN0o7jE0MtRwzbC6ZUMPtib9nidoFUMVQGxivu1ZEWj5MB21AZIGn6YzQn5Bal5n54OYhITRQSGyfcZVUEeNznoCcQLbrAKddTBgLbELOso9oV6zQhS3jvg?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

The details of the exposure can also be viewed under Alerts Page

AD_4nXdotVDZhcNk8E3n40Ye3J005Mm_vVYTm9GmfvzEAlfCreuP5Yg-Yrd-7FdfoTBF2uMk8AgWBQUgLsuYhb42NjcFYoBeeTWf-d8D97vqIfq94kSW__MCMT2dyreO-5MOWWQ58VdY?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

With More information about the File & Violated Data here:

AD_4nXd-vTZ4yRd7aOq6h8ToJSkgDUN3mDEzkIPtOaTz5yb32hPlFIiqYtvsDE-Mbcbr7g6W5g4E4nKS6s1h93nFnk3GG0PU3EKbqmdyDVbEGXgbr4yK5TKGxKOJEnC5ingAy5DNLzfJjw?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

AD_4nXdW4bimYIXB_rkgN5Q2xLLNSc5aK21EwZL2m0SGd44gQcapX51ehc1KQwIxnHsqSFcP2qCcP_d2QpoeUgh8_QKYt7sICaJkhoXEGc8L5FNgxN2Xn6KO_oq0hP2QL89MD1ITm1Lcwg?key=bNIpn8LEQ0keFHdBSj5uDbRd

 

Terms and Condition

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

Be the first to reply!