Skip to main content

8abCMNak_crNUd35-BERV3V72_1LLBJrBF9drcU4FGO2SkTipHLgTP2uUWD2csozUNU-I8jFfF7E5259YHOkEg_Z2sUfai91MkcNez0o9ewd4cAXbLxwix9rUnqDWa8Jd_vrHqA1yDpAYL3ra633qJc

Netskope Global Technical Success (GTS)

Google Gmail - Block Personal Instance Access

 

Netskope Cloud Version - 124

 

Objective

Google Gmail personal account access should be blocked

 

Prerequisite

Netskope CASB Inline license is required

 

Context

Some customers use Google Suite, with Google Gmail as their official webmail application. They might want to allow only their business Google Gmail instance and block personal Gmail accounts. This document will discuss how to achieve this.

 

Do You Know?

  • Netskope acknowledges Google Gmail as a Cloud Application and provides a pre-defined cloud app connector.
  • As of April 11, 2025, Netskope's Google Gmail predefined cloud app connector can identify instances.

AD_4nXfT80Uqkw-vPLqzzFNsAIZv7CGwqDDO_PH5HTrAqyK55BCfDuTRLG7HUHrk1-ZkWMZebCbU0aiD14pN4sdY7e9d21Xg6F9mHvQdKNzWqgA4uogYINJAdigsVzgflcpHRLjrdulGZQ?key=4_wnRNH5jG2Ka6yBFJWVS2M5

 

Configuration

  • Step 1 - Instance Tagging

Path: Netskope Tenant UI >>> Policies >>> Profiles - - - App Instance >>> New Custom App Instance >>> New App Instance

QTgmuxXnup0inF3HLSkBM4s1NvCzMYu9qpuk-m7hs0TKL5cdsU6wuT_RdH8sC2v50cnT9KdY9RV6UXA0LrTNswFnizkye4bUcqlqM7NYGeBT557K31LTO5CPzSY9__mmTc3X8i33BDTzBTPukzZCppU

Note - Netskope enables administrators to name application instances using Application Events.

 

  • Step 2 - Real-time protection policy

Path: Netskope Tenant UI >>> Policies >>> Real-time Protection >>> New Policy

mr7Hi6Bvwbw-01LyQXxden62TN5M74qzQ5Tuax2Oz930q5UeVAVGAyJqkpetBncSjCaV3TviCoPmJ7-beVStsZ8EIdAe7U89vEPcUtFsrpq0O2gPvWaA4RAnBUSiEaiEqYdI3e4KL7AA5UvfrUQdUYI

Note - User Notification format used above Link

 

Verification

  • Step 1 - Try to access Google Gmail via personal account

bb1rW-1O7whvgNCjRcn7aClC39XkqgMvLSuqbg7iaQwUhsvpps84OXN6S9QhpqroQ5ogrwen9234pJ5j8jo6ITBMiw5eOr9OcLTatNCOTzM-Mh_FJapmWfTc-CY1Si7iU1HykJE7Ruo9vCBPnZvE8tc

 

  • Step 2 - Check policy hits

7AInWl6D5QFz_tC9ajmE0JF2f-8gu0xAJmumXkNPFtxhaCoJUezBx0EybaIUwXYxiRyf_9rgDOIC6bZLna40nWUoSMornXmJDsO8miH-XfhSmJKLU6Yi5ILHdNxeuBkgeIKokBA6QguQ5J6HftPYi1w

 

kBDgp5tURyZvPH2-Vvqn0X8z3IwGbZkQoPv0BImD8JjWCfOwaSkus98u0j70EMl9cy677UswRZ4G16C_9qR7V_Vx4SVzcwFHvHUyc4PQIA6hEhRGGuaKZrDJtmaetgS8goNlONpQW_zGOOCR09EKGPM

 

lNaPzVxGIXyYsWxG3leRXqosthrD9VuSNIj-7NU6krOCoYRzTqAsX1aK009hW76LQQ8R5KSvDo0yL4_amSXD07eNpBjDPO_CsymGNDYxsrRnrdCgriDW11VkQY-5d92twJj2Ao0VYAsqU1XPZgv7Znc

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

Be the first to reply!