Skip to main content

dM8EuJ_ZbG6ImYOm9ge6Zzo8iyjGyFzCnS0fmTs1C1mdsepP-sQl1a0w_PK6blQwOjNLcsoslM0TYuN1WjoO8lsZIHYT69OdIpm7QpoTVC7ehKqkoDSjmsgMZ-HeKOtHhLPDDW5myHokpuFbYRDLfKw

Netskope Global Technical Success (GTS)

Configure Microsoft SharePoint for Netskope Next Gen Forensics with limited permissions

 

Netskope Cloud Version - 128

Objective
This article provides step-by-step guidance on how to integrate Microsoft SharePoint with Netskope Next Gen Forensics, enabling deep visibility and enhanced data loss prevention through forensic capture of user activities, files, and metadata.

Prerequisites
Before configuring Forensics profile, ensure the following:

  • Global admin access to Microsoft 365 account with SharePoint enabled.
  • Configure - Forensics Instance (Storage Destination) for Sharepoint.
  • Enable Netskope Backend flag - “DLP Incident Forensics: Image Preview and Subfile Download” for testing.

Step-by-Step Configuration
Step #1 - Create a user with “Global administrator” role in Entra ID to grant access to Netskope initially.

Path: Entra ID Tenant UI >>> Users >>> Select User >>>> Assigned Roles

Example User: Alex Wilber

AD_4nXdxQ0O04KiwtTzHjlqFfzlQ19kmgCNQTb-Gm2nVK72e4DGBoqVayhFyhXeEnEEeRrINcWnEH4_wbKuJR4U5-79qaMkd8jgvJnhRUJaGwPo318ZtjtJjYWROh-Zw6vbvgqmaopo1gQ?key=Qvp4VY6fAjsc91U1C2FRzg 

ℹ️Note:

"Global Administrator" privileges are required to grant access to the “Netskope – Forensics for SharePoint” application.This is because Netskope Forensics functionality is integrated within the same application that enables CASB API Protection for SharePoint.



Step #2 -  Configure Microsoft SharePoint as a Forensic Destination.

  • Log in to your Netskope tenant and navigate to Settings >>> Forensics >>> Instances.

AD_4nXdpF9iFli901WhWWm4m8xlXNB7gC2krdAV6n8e8gMOeMsFJiphnbkjyKnWxz_ppMR152mG5lTnb0vkhlLVxTmuGjdH-GEQ041r9R87nv-oSL0mq_CvJKIsOh-VG_-Q4VLOkolWEDg?key=Qvp4VY6fAjsc91U1C2FRzg

  • Under Office 365 Environment, select Commercial or GCC High.

AD_4nXe1qu5amM3Pqg0zhtKO8T67ZVPTLMOqBULWzenWOzBeY0JwmS8bALHrLZXZP-e4puAkt1Pvx4_kN9HN6TEX1Hrgs0yr18CCbQXfGt4Mo1GdcZAW5yEzNgLmiDOUtJ1FifNJ2p6y?key=Qvp4VY6fAjsc91U1C2FRzg

  • Under Instance Name, enter the name of the SaaS app instance. This step is optional and if left blank, Netskope will determine the name of the app instance post grant.

After clicking Grant Access, you will be prompted to log in with your global administrator username and password, and then Accept the permissions and click Close.

AD_4nXdTTOFiP8zpGUDJhkiHz2fpTHjb_w68gy3folbgq1VKiAlnwHIl2wu0uleu4-iRCukhzM1X5-EPzSpaG2rKOGBb8lBe63VOdfhKlTevFBiiKGWwyhgDB8Wh9JP0VMXFCB24pXyCwg?key=Qvp4VY6fAjsc91U1C2FRzg

 

Here's a detailed explanation of each permission shown in the above image based on the standard Microsoft Graph API permissions and their relevance to Netskope Forensics integration with SharePoint:

 

 

Permission


Type


Purpose for Netskope

Files.Read.All

Delegated / Application

Grants read access to all files the signed-in user or app can access across the organization. Netskope uses this to collect forensic details from SharePoint files (like name, path, owner, etc.).

Sites.Read.All

Delegated / Application

Allows read-only access to site collections (metadata like site name, URL, and structure). Netskope uses this to map file activity back to SharePoint site details.

AuditLog.Read.All

Application

Grants access to unified audit logs in Microsoft Purview / Microsoft 365 Compliance Center. Netskope relies on this to ingest user activity such as file access, download, and sharing events.

Directory.Read.All

Application

Provides read access to Azure AD directory objects, including user, group, and device metadata. This allows Netskope to enrich forensic events with user and group context.

User.Read

Delegated

Basic profile info (name, email) of the signed-in user. Netskope may use this for session validation or to pull basic user identity when forensic data is collected.


 

Step #3 - Create a Forensic Profile for SharePoint (Next Gen Forensics), 

Site or sub-site URL in this format: https://<account-name>.sharepoint.com/sites/<site-name>. 

For example: https://netskope.sharepoint.com/sites/test1

If you have selected a GCC High instance, the format will be https://<account-name>.sharepoint.us/sites/<site-name>

 

AD_4nXcDgqPj1WCbXWmpt4BaWCaK3uyiNMIsfl7amzNU1LC20byQE_q_Ccebx7OvdojVhXafaNemIVLOjANjkJFif-dzt8Due6G8vuZIh6p71EJW9R7DUqL_jEydsCuF6iEFTU_hJXNJ?key=Qvp4VY6fAjsc91U1C2FRzg

ℹ️ Make sure the assigned user to application “Netskope - Forensics for Sharepoint” has access to the site mentioned in the Forensic profile.

ℹ️ Once access is granted, the admin user — “Alex” in this example — is automatically listed under “Netskope - Forensics for SharePoint” → “Users & Groups.”


Assigned user: Alex Wilber

Forensic Site: https://netskope.sharepoint.com/sites/test1

AD_4nXff9sYxJVK8cCw7LTEWsmLg-NwuwgnT4_UDAjkiYnWoryrhp1D-y91p4PkcxP3pO946KJ36jJQOaboCEqPpV-I3eAvhQBuzN96Sfa5n30OqAhtyd8TGKNANRzYVDqaU8GTBogW1lQ?key=Qvp4VY6fAjsc91U1C2FRzg

 

Validation

To validate that the integration is working:

  1. Perform a DLP violation (e.g., upload a sensitive file to Unsanctioned application)
  2. Go to Incidents > DLP
  3. Verify that the forensics log is captured, including:
  • Option to download the original file
  • Metadata and context details
  • Keywords matching DLP rule/profile/policy

Example:

AD_4nXfgAfKJMwmqx0njczmAmBLbtKcaI5crh08EsQyFciU6dHeGtwQCYN_TW0qYI5zW6QK8TZ7Rq0N2jp2hTGg_6SKSKCpEPh1d04Fs2f69nkqATDFj_IUqn1rk793D1y0Onvv9L715?key=Qvp4VY6fAjsc91U1C2FRzg

Step #4 - Revoke the permissions assigned to the user, which are not required anymore after testing the working of Forensics.

User: Alex Wilber

  • Revoke Files.ReadWrite.All permission in Azure Portal:

Navigate to “portal.azure.com ” → “Enterprise Applications” → Search for the Netskope Common Application & Click on it → “Permissions” → Select “Files.ReadWrite.All” permissions → Click on “Revoke Permissions”. Refreshed token won’t contain the “Files.ReadWrite.All” permission.

AD_4nXdSdoPyaC88FiDRc6EFXLOtTxw6eXg8PjQ1RNs6KcDDVC03_nl3ZGx0uAfmM412wZhznPTxBGZQb4jkqxNspQ9zHS6aPTIht0KIEIIoudiST8gkIU3CvAwqazuhwL56Nugm0vUP?key=Qvp4VY6fAjsc91U1C2FRzg

AD_4nXfihrCmCkhBfmqEhHkzavjYQgatHdGQYyoob_AP_PHeTnTj_eTUo1Rz599uUQmWv8T25knvgd-HPqXud9SaTJ7tDKDt3dl2WdHBNdQ9LOvi5i3eocFdkx35ALuQrSfFAlHu7a5JXg?key=Qvp4VY6fAjsc91U1C2FRzg
 

  • Once revoked the permissions will be removed

AD_4nXcyvM3GzKRpkP97P0y45xCAvh0hjcYLbwJK8fVABr3vB9L0JUjY4bR2ZugZ-5cbNSlTg_KignnrcTxU0ZjsYhIXy6lh09hY_IrbHQm6GwnBSV2IYjoGaRFGvGGLtQw18TRfk6TkRg?key=Qvp4VY6fAjsc91U1C2FRzg

  • Manually provide Write permissions to Netskope Common App:

User has to use Graph Explorer (Graph Explorer | Try Microsoft Graph APIs - Microsoft Graph), to make the APIs to provide the permissions. Sample API call & response are below:

  1. Determining Site ID ("id" in the API response)
  • The user has to manually fire the GET API call to determine the site ID. Graph API - doc

https://graph.microsoft.com/v1.0/sites/<instance>.sharepoint.com:/sites/<site name>

Example: GET | v1.0 —> 

https://graph.microsoft.com/v1.0/sites/m365x22270441.sharepoint.com:/sites/test1

AD_4nXfD4qjDC7fzwn6irt84TuTBamcAtj1Jv8a9hscJ5-yf3sEEclyWmYxLV5LasAdeJpWzNPPj8T5RNNyJdFZeuLSoVcClIixEN3fSUaiDuKeOtmQOCbZuyPM5Ms2ueMWAOUZIUSU1Tw?key=Qvp4VY6fAjsc91U1C2FRzg

  1. Custom permission with the forensic site ID
  • Users have to manually trigger the POST API call to provide the write permission of the Site for the application “Netskope - Forensics for SharePoint”. Graph API - doc: oOutput of previous API will be used here for Site-ID]

https://graph.microsoft.com/v1.0/sites/<site ID>/permissions

Example: POST | v1.0 —> https://graph.microsoft.com/v1.0/sites/m365x22270441.sharepoint.com,a82818ed-ced7-4957-a119-135d1c377279,5ca4a866-7bfa-4994-9cf6-cbd7f9841072/permissions

AD_4nXdY5NDrtr93ofcWPuiYXwtGFitf07yGFRV8R_B6ij_oi5CD8ZfpjpdcnTdq396GhHO5NlSLmoGOLzXVFA2jK8SwzYuIt2pPzXjOkv1J4sqmmsdpUhGRCrpzs2jWoV8Zlgfhr7QWoA?key=Qvp4VY6fAjsc91U1C2FRzg

Explore


Next Gen Forensics - Netskope


Link


Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, If any such platform changes are brought to our attention, we will promptly update the documentation to reflect them.

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.
Be the first to reply!