Skip to main content

AD_4nXeU_ghAwjTVFwIOrzyGXC55dSruNbXcVOuB9g41Ihhib5bmsv9XeKHH9cKJ2XErhC9CHDbUUdxes16HdKY-UkxAFLYzBh93jK1Oy7kv2kZiLioXUXulN-s3N5HFYvFUrLokGAU3otEfdQ9URcflerNKCF3307CylA7LRrAeYhCUPQw-lgLxMck?key=9iMUDjYPe9b_fwZrYbAdlA

Netskope Global Technical Success (GTS)

EPDLP -  Content Control USB Storage Devices

Netskope Cloud Version - 113

 

Objective

Netskope's current abilities to apply content to USB storage devices

 

Prerequisite

Netskope Endpoint DLP license is required

 

Context

In this knowledge base article, we'll explore Netskope's capabilities regarding Endpoint DLP Content control. We'll go through a use case to provide insights into its capabilities.

 

Do You Know?

 

Endpoint DLP allows you to manage and govern endpoints to prevent sensitive content from being transferred to USB storage devices or printers. You can:

  • Govern endpoint devices by creating device control, content control, and file origin policies.
  • Monitor endpoint activities and block or trigger alerts when users insert or remove USB storage devices, transfer sensitive files to USB storage devices, set up and configure printers, and print documents.
  • Respond to incidents and alert the user of their actions.
  • Coach the user through custom notification messages by allowing them to justify their actions or cancel them.

Use Case 1 Block all Device Storage Accees

 

Step 1: Go to Settings >> Security Cloud Platform >> Client Configuration >> Select The client configuration where you want to enable Endpoint DLP >> go to Endpoint DLP>> Check the Endpoint DLP Checkbox and Save.

 

AD_4nXeortpaN_NZVXHIJZQZfAPFXQPXJOF0HhcrJyO43-ChIn6GhbW7tPMK5wJ8HarRxNYh0fU2M7FUxbPy5dayokhOD5WAd3gGYx3s-pLzMO8dJJfczmTfqsHl2sSZ3UcuTikgngOtf0oSKqdmcn3v1A7zPr0otWYwFglBE_wJ8tX-04AynMV8sA?key=9iMUDjYPe9b_fwZrYbAdlA

Note: make sure to restart the device after the EPDLP activation.

 

Step 2: Go to policies >> Endpoint Protection >> Select Device Control

AD_4nXdFZcK-P-sKswLmUqDicUXMSDqsy3i4wgPuhHwGKqmWOCXT-9SU8mJGlVnr-JgG7VPoN9e6KlQ9wawKBapSxJ8pUr-SuqxseIuitwmSSQdgUFuXjg9jxRHU6781DIqi-9NY9X3wQbhjekEilNQDEht4ZHWMJaOTJ37HxlP6tAuxYhjKkRLQkXc?key=9iMUDjYPe9b_fwZrYbAdlA

On Devices, select USB Storage Devices, On USB Storage Devices select Any and select action Block click Save.

AD_4nXcxzsMwweLHK2OJDDDzx1CvrSr6P0UYBtkoU8vcMv9rmJ8ENnLZlnpfk0GcoKjN2gfOK9l5431S1Qi-F50il0VqCCfUhJPaKURyNTZuNB0N-fwzaYbGN9CNo0XuZr-9STiK227OzDu9yvRkZT48gO0ar5OghyQP3lEkiBQhPH4bfh0c2qdPtQ?key=9iMUDjYPe9b_fwZrYbAdlA

AD_4nXeYv9_-DSy5PYpcIyJUe38tuJxERmheFYX9Lv48e6ONbUnuLyW92vcndM9XT0cNoO-Z_w0oyjU0js3Yxowq9iVA5pkhGzOSSazVS-mZVdnlmMahQELDqJjJHplbxos4cqS0DE5p9bBdFlwR1t3098688qmR5T79SjhE2Dy8XLbnyAytIAJy4FA?key=9iMUDjYPe9b_fwZrYbAdlA

 

Verification

Insert any USB storage device and a blocking message will appear.

AD_4nXf1DFjszAQ9xT-wZXwcte7Oev3fvTpJwcod0axdpjrsO8z4CC1X75Een7hQs1ZVULKb2eW_xAQUdC2LddwIq-Kxdb6AxFnJ0rBFccsSTv2Pbe4B-uwADo9RueBjvnbC4VHNf1ot2_TcSv1qhv4sjRMkyONrwQLRbFvkVuBpP-MuUTdfSI-g5A?key=9iMUDjYPe9b_fwZrYbAdlA

Go to SkopeIT >> Endpoint Events and confirm the block is logged.

AD_4nXf22RC9x9EW_iFhJPPFfSNq61HnGPKs4lUfeUjhy60sqFgs2Hfe_qpqd0u46DhZCXV1ye2gvccXclKB7fh5O9Z_LWFuNS2Rnj5LPPOc4-9CzfJ4gOmtJjgLL4GdXvoy-v-rotx_Ul4r7FFY_5Arr74APMRV7tg_8j-ciAOCHmOUJyd64NCKvUA?key=9iMUDjYPe9b_fwZrYbAdlA

 

How can I confirm the block action in NSlogs?

A: After downloading the NS logs, you will notice a file named “epdlp-diagnostics.zip.log.” Please remove the “.log” part, and the file will now appear as a zip file. Once you unzip the file, you will find a log folder inside, and the logs are located in the “epdlp_sys_log.txt” file.

 

Sample

2024/08/22 15:17:04.781 PolicyWorker.cpp:1456 7816 24792 kinfo] PolicyWorker 7: evaluated event 60ceb07f-3a1b-4b9d-880b-a4ec433b8a3f with result "match" with action "block" for rule "USB storage Block" 

AD_4nXduhQPQGq5-_4JGd7hYI8SeX5azzuUfFpUEY2edRj8T9INeGYGykijBQ4jWX1Rb6m8woxlJiBohcTpKckqDRnlTf2jo6faThWoAXVgL1uo2rO-jupYpzNh2AyCIjTiei7hEKXxIKy8FMWKV5XM0GjAcCeLssRcC3_PtJY3EK0nZ-ZMORPHDSRc?key=9iMUDjYPe9b_fwZrYbAdlA

Use Case 2 Make Read-Only 

Follow Use Case 1 Step 1 and Step 2 but on step 2 change the USB storage device Action to Make Read-Only

AD_4nXd7_GMLB_iHYCj_CP3Qkw1k1QdAc75ztTuGZvCAbG2hlbhLp6EgvEfEpsljX2XgOx7W1zXkcT4YVarIpyWqh1rA8dGweBb3wU4T1enWlwwk08Gz7rprd8lD5g7ZZD9FdIIoD79qQbo2GIZXqSjVVtrdV3Nh1aimhHfZLgLV1bDNJ7ozdFUZwQ?key=9iMUDjYPe9b_fwZrYbAdlA

 

Note: WPD/phone devices do not support Read-Only policy actions. These devices will be blocked.

Verification

Go to SkopeIT >> Endpoint Events and confirm the Read only events are logged.

AD_4nXfcBImtMFZlQYHA8TpGvY_Ei1kQgIPwYWyr2BrEuotRzBJDzQC4rJi2FZLQYvH9zuxN6dcxyHu2yOZ40JBp_hDMNJjZ0k8ixgCzrvory6DYvTbOT-boEu_AK84Zc7mAIGcDegiT69EAEmQFtLnw1aBp9o3X4O34bpcnuEfrAdFB6pnJFvmjQvI?key=9iMUDjYPe9b_fwZrYbAdlA

Note: Read Only prevents modify the USB content or add content to the USB, Its allowed extract from content from the USB to your device.

 

How can I confirm the block action in NSlogs?

A: After downloading the NS logs, you will notice a file named “epdlp-diagnostics.zip.log.” Please remove the “.log” part, and the file will now appear as a zip file. Once you unzip the file, you will find a log folder inside, and the logs are located in the “epdlp_sys_log.txt” file.

 

Sample

2024/08/22 16:49:44.429 PolicyWorker.cpp:1456 7460 11716 :info] PolicyWorker 0: evaluated event a289ce88-6911-4984-93f8-ae07babad753 with result "match" with action "readonly" for rule "USB storage Make-Read-Only"

AD_4nXcc_LUMwB6I6k5RZCEA42meNODudP7WIJzWYyS74FD8P5Bz7tJOO-g3GoogVqwnhs4Gc6FmUaA9sXh453QeiMR3qDnYckrsDaS1VlIs9WPn-D8NkyCqY8yjldQ-yr85vU03spDlENcU4Mzlql0e5WbpL21YHYeYGd0DF0AAG3AxF5QoyDErsPA?key=9iMUDjYPe9b_fwZrYbAdlA

Constraints

In the Netskope UI, go to Policies > Profiles > Constraint and select the USB Device tab >> In the USB Storage Device tab, click New Device Constraint Profile

AD_4nXflrdvEjJZHuT4m3OTmzEsS2pXVfxOpu2735M0dfjodrjY2QW0ZUgbaJNsCEOK_6og2tBg0djMN3P8m0uDn6vVJcqsb2ITooOTCFFCi8jJAEdtbjdTVkdu4GNfzXr2AD0oYGBCUTlp9kYa9cOXlgsAcikd3ztXZw4G5WcRFapZup_Pt1hAUJ8s?key=9iMUDjYPe9b_fwZrYbAdlA

 

In the New USB Device Constraint Profile window, enter a profile name.

AD_4nXc87zLFpQQ-t8ByJDvKDrD29sFbXSsLB0w-1oQjcXXR7eREd9Mx4a566Wn-M7yoK8tPvhZl95WDRaBQ62a5yuLTYqAk6av1HuVQ6c7Hdx3ExT46JU-pg0GN2GrR5YhLv9JGLLGXDYFZTzr6pIDZ9jHkqeMVagJl_GuMoaRVpdIfjBDvO7Wx4Gs?key=9iMUDjYPe9b_fwZrYbAdlA

Provide the list of USB storage device manufacturers, IDs, models, and serial numbers. Select each tab and enter the values or upload a list as a CSV file. You can upload a maximum file size of 6 MB in each tab. Ensure the following:

Manufacturer and Model are partial matches. For example, enter “Sandisk” as the manufacturer to match USB device names such as “Sandisk”, “ Sandisk USB”, “Sandisk Electronics, INC”, etc.

The ID must be in the format idVendor+idProductiSerialNumber.

Serial_Number and ID are exact match fields.

 

Note: Device Control, policies are prioritized first, followed by Content Control. For example, when it comes to USB devices, if Device Control determines that a device is not allowed on an endpoint, it will block the device. This means the filesystem is never mounted, and the user has no opportunity to copy files to the device, effectively preventing any data transfer.

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

Be the first to reply!