Skip to main content

AD_4nXdvtfxxZTfm0v-46hw_hkZcgS6ORbpyG3ppKDjKzrAyTbrCVKcX1gqbPqIDEadJB6vwCgHgaXwqO7dQ6jVecd7pNWbmvmB4gH7WomfIbt9OSNrXZ-0sGHosbutoWqm1YYiVhzoLYg?key=ajvYj_EgdmFhkSStK-lfvA

Netskope Global Technical Success (GTS)

Microsoft 365 Copilot (Corporate) - Allow Only Corporate Instance

 

Netskope Cloud Version - 129

 

Objective

Microsoft 365 Copilot (Corporate) - Allow Only Corporate Instance

 

Prerequisite

Netskope Next-Gen SWG license is required

 

Context

Microsoft suite customers want their end-user to access Microsoft Copilot but only their instance. All other Microsoft Copilot instances should be blocked.

 

Do You Know?

Microsoft Copilot is available for Personal and Corporate. Netskope has 2 predefined cloud app connectors for Microsoft Copilot.

  • Microsoft Copilot for Personal Instances
  • Microsoft 365 Copilot for Corporate Instances. 

 

Author Notes

  • Microsoft is integrating Copilot capabilities at the operating system level, within Office apps, the Edge browser, and many other applications. This article focuses specifically on browser-based traffic directed to Microsoft 365 Copilot, and highlights the types of traffic where SSL decryption is possible.
  • It is recommended to review the foundation parent first.

 

  • Since this article is about Microsoft 365 Copilot, a few details need to be better understood.
  • Microsoft 365 Copilot cloud app connector

AD_4nXeQWYnss6oacYhmX9FasPfZxA78IONq9WBSenwOr-4PEvJ9oPaeTUobMZjLdnKBtty_3fiAPEjeTNqZaj9pVK4pvS0pBhMs-CnOgQsQsEoZlTHUHZIUQ3fPqcqUATWGaglYejZQ?key=ajvYj_EgdmFhkSStK-lfvA

  • With the current Microsoft 365 Copilot cloud app connector, the ‘Post’ activity is supported only for DLP (Data Loss Prevention) use cases. It will not be detected in non-DLP scenarios.
  • To enable detection of non-DLP ‘Post’ activities in Microsoft 365 Copilot, the ‘WebSocket for Non-DLP Activities’ feature flag must be enabled for each individual tenant.

Note - Raise a support case with Case Type - How-to-Question with Netskope GTS to enable WebSocket for Non-DLP Activities’ feature flag.

 

Configuration

To implement this use case, Four distinct policy sets are required:

Given that Netskope enforces policies in a top-down order, the policies should be configured in the following sequence:

  • Policy 1: Allow or monitor activity specific to the corporate instance of Microsoft Accounts.
  • Policy 2: Block Post activity on Non-Corporate Instance of Microsoft 365 Copilot.
  • Policy 3: Allow user traffic going to Microsoft 365 Copilot URLs, based on specific HTTP referrer headers.
  • Policy 4: Block access to the broader Generative AI category, while making an exception for the corporate Microsoft 365 Copilot URLs (copilot.cloud.microsoft and m365.cloud.microsoft/chat).

 

Let’s start Configuring Real Time Policies

Policy 1: Allow activity specific to the corporate instance of Microsoft Accounts.

Step 1 - Instance Mapping for Microsoft 365 Copilot (Corporate) Organization account. AD_4nXfhzFVXrtLilzQRIIROdXy9Ydk56LNEUaddZWcUtMLA0G0MHiLTR7ohlAs8JHAABGSmHILME8PkKs1Z8Lt9z62Hsbrtg5IEwyXguuuPcNKO7SqEynZR7FaTVu78E9y5yC8FXWw4Bg?key=ajvYj_EgdmFhkSStK-lfvA

 AD_4nXcKC3ZqXlVt0Jt3Xau-aqazw2jAqLSbL5D4g9cKlhpGWVCXthvGv-IGR8UunzKDAWqrBHE8JjSKjqMoCXOfa3YrenMi3r-qZkRUgRAqtC9G8Ns6n-ShnPNIyUl-NwZlVpA4GHuw?key=ajvYj_EgdmFhkSStK-lfvA

 

Step 2 - Real-time protection policy

Path: Netskope Tenant UI >>> Policies >>> Real-time Protection >>> New Policy

AD_4nXfGPWZd_y5XEEsoBebhMlXTFrbyrOu-v945z-_sd8OCKE8wfiaw4wDG32V_6mtao4aC19jjzG5elTE_0yg5dXqIXZ6Xke7Uia4h3DKoBrKHIEPFalFstPEOdFlHDIXLQP81fL2g?key=ajvYj_EgdmFhkSStK-lfvA

 

 

Policy 2: Block Post activity on Non-Corporate Instance of Microsoft 365 Copilot

In addition to Policy 1, this policy will block post activities from all instances of Microsoft 365 Copilot, except the organization’s own instance.

AD_4nXdUyXPBtq17xaRGjLkRRLlp-k5GYhCp4kzjZwNIrStccCBO2YGt1TeYVaxOH4MIWqpbsXVIZhwEY-h7teQSE6neyWe1LIYVTClM-NPIylcy0DJA3Bpr1YVCZvqUiqDfLIMJ_wG_?key=ajvYj_EgdmFhkSStK-lfvA

 

 

Policy 3: Allow user traffic going to Microsoft 365 Copilot URLs, based on specific HTTP referrer headers.

  • The M365 Copilot Applications relies on few of the M365 back-end services for log-in and post activity of Copilot. It is not a user facing site instead, Microsoft 365 apps and services communicate with it in the background. 
  • The following URLs also need to be whitelisted when they are referenced by the Microsoft 365 Copilot application during transactions.

                  substrate.office.com

                  events.data.microsoft.com

                  res.public.onecdn.static.microsoft

                  login.microsoftonline.com

                  www.microsoft.com

 

Application Events reference for few URLs:

AD_4nXdMMQH3_ECIzK-OZFvt9C9TYHH6pJ4Ic6JmCr7vIX_N9o9wyqzDNx4_tE0lpshLt8_U1DxQ6GfvIqRMRhNmi84LHfob5AHU6B1ioB8vr23LMsvGQnerX3OCDu5-wgCqjy87paRjzw?key=ajvYj_EgdmFhkSStK-lfvA

 

AD_4nXfhzA-ODEGsTWCqCBcbtU6AJWyJdmPZXU0r4ACQ-OqsKSZ1JRtkJVbO9HduOdPC62-WRb6mHUlagzraNUYfeGhieFge6nILWbcOZBtfTZQLpfPH0bImG4Sg6JRp_7StrX_-JjIsoQ?key=ajvYj_EgdmFhkSStK-lfvA

 

Step 1 - Create an HTTP Header profile for the Microsoft 365 Copilot URLs (copilot.cloud.microsoft and m365.cloud.microsoft)

Path: Netskope Tenant UI >>> Policies >>> HTTP Header

AD_4nXcuoCWq7LC1CPZvP8a1tqiIU6vJbQThyx7HCCIRXY1M_SVHDtYe5ZTF2Va9TqE06zOO4YfHHKO0cjjOXDLju8RwbyQPK_3cx1ffzfeS8VTXLsxDJP9d8nbMAJ2wC0MmLtiehUGp?key=ajvYj_EgdmFhkSStK-lfvA

 

Step 2 - Create Custom URL Category for the above listed URLs

Path: Netskope Tenant UI >>> Profiles >>> URL Lists

AD_4nXfHyt0JQuKxJGfT1ZF4SOd1V1x7434Iw9TCwzZeNcAKqVsJuXFkc6kaoXn7FOv0E3xCcCQJhqnO3lvKTM7dsB_wZbHuGhZyamREv6CUBS8Njbn4lPdWTpc6JfUOfQTS1W0NwLTBzQ?key=ajvYj_EgdmFhkSStK-lfvA

 

Path: Netskope Tenant UI >>> Profiles >>> Custom Categories

AD_4nXfSJxFfwkJ9vbi8uHLoQOUoaEZITXIdThUGNOMuJubNhK3I6JBO2PrHs-4arP1helSBCjZREMBq9AU9QOnq_kNDT3xPtjO5OgcY5Qsacztsx8wEIHSX5TidJHHynqlW4pesN0XMiQ?key=ajvYj_EgdmFhkSStK-lfvA

 

Step 3 - Create a Real-Time Protection Policy

Path: Netskope Tenant UI >>> Policies >>> Real-time Protection

AD_4nXcs5LHpWBfiZ2LqYKcibnVpi5wlQ2zuAy_kSerY6tuFLlWLHwY35NpZTdkqPeq3xW-VUpH305ncvl_5laKCDC8G9iC4kHAeT1dMff9FC40DQ5y8SRyThCSGkSfP5GhGK2s61sIrtA?key=ajvYj_EgdmFhkSStK-lfvA

 

Policy 4: Block access to the broader Generative AI category, while making an exception for the corporate Microsoft 365 Copilot URLs

Step 1 - Create a custom URL category to add the below M365 Copilot URLs as exclusion from Generative AI Category 

  • copilot.cloud.microsoft
  • M365.cloud.microsoft

Path: Netskope Tenant UI >>> Policies >>> Profile - - - URL Lists

AD_4nXdsqiE0Nii-al3mFhPP8IRhZPI8dQIXRYKv7di5Q179z3ahEM0nuUQjFAQXtzdIXJEKPI3gYoDSL_R7beyZblJ6VCSVP2GgK1_xBrbSCSYCG8E3OVpNJHyZ0B_EQL67TQzexyDQ6g?key=ajvYj_EgdmFhkSStK-lfvA

 

Path: Netskope Tenant UI >>> Policies >>> Profile - - - Custom Categories

AD_4nXeNeS9Ri3ZT6qMD7JXobDKuR4NWvJXZ3SY6wT8b_-_5m3TPqyCpA_OLTsX5gimnV4CYlG-e7HDcBG26SE5m2Xq2LqG3K3o_RLLy14WEQGpg7-9jhHKFXO3Eyj1CUo0LUNLptLCF2Q?key=ajvYj_EgdmFhkSStK-lfvA

 

Step 2 - Real-time protection policy

Path: Netskope Tenant UI >>> Policies >>> Real-time Protection >>> New Policy

AD_4nXddrWyl2z1gANGrAwhG4zOcCFOIyJyAZbvUS_yEALmVT-CUHtJcR8t6DABY5AnOwNEsnfNHR0WXf5sO0xr7Hi9mwkQ8-wb9bTOyptByWRz5LOGVzwJUf-fWjiZHeVaZnGsbSlfEkw?key=ajvYj_EgdmFhkSStK-lfvA

 

Policy Order:

AD_4nXdLpHY9Z9SEcL5y_jjJmELFaW2re4J4XWjNZwDSLPLxgiMNdurSptWHxdHwBwiSj--0mlNSTO0x6p4esL6HkTNv7OwLg5RRgnpzuRYdmmH5y8kdUwx818WvQ6fV7Ac8duHIp02G?key=ajvYj_EgdmFhkSStK-lfvA

 

Verification

  • Try posting on Microsoft 365 Copilot using any other Corporate Account: 

AD_4nXdMOEtbGn1AYTApbvMSuW4Hv1x2cknSzWHgnIu78CMf4JgOlmMIIFGjNAYHWYMNe-iOOQYePB7hFWLrVmCrqTOEV1ajjkl57joi5erxa4keSVG6nJvoOU7Fx0aEfZsP-3M4WVFRkA?key=ajvYj_EgdmFhkSStK-lfvA

 

Path: Netskope Tenant UI >>> Skope IT >>> Alerts

AD_4nXeTTuPqJ2ji6jC9i5FzAPKT0_CC_DIkNPwIXSqD7JdEGzNUxhnHP6mnmU9FG1fvKX4mI3CnpPeZyutBPk3r1tIlNK-alJY-mdp9GY8PoDYHmtWuxbf450whWHuhFOGObjHfVHxT?key=ajvYj_EgdmFhkSStK-lfvA

 

  • Try posting on Microsoft 365 Copilot using Sanctioned Organization Account:

AD_4nXfOLkezkPdRN-5bXIYY8VWWZEitKjQDld7XGF4jIlnNVOWkjhnqsD1kRFORLa18FxcnKbvPL7n0RwvHFURMCmwKvZhdxXmS-HtJHLiyxYtvWNpGzAmRb06kNe1mR6Emli1MyUeaww?key=ajvYj_EgdmFhkSStK-lfvA

 

Path: Netskope Tenant UI >>> Skope IT >>> Alerts

AD_4nXedPpQjyKBA5DuwGc1mAPXT2VPd9ymUf_Ko2Uegi8PGol2axyCjEG7MgBNJJGc750m2n2eHNuhH27CLbvZSWrTK_FzmQ-xLxPxJczQXmez_E75s6fcOw95W_rdumZ5OlFa2BQfotQ?key=ajvYj_EgdmFhkSStK-lfvA

 

  • Try accessing Microsoft Copilot (Personal) using Personal Account:

The action will be blocked.

AD_4nXcGNSxv2zQ--4qHJy1Q1nSfq8aFyEHIfijlDZBL3y6_zw0L3lZzsCBRSr-jP-9QS0mvkm4bdkWe4fjsstc8yoeGAaCRt0BWXVGezIOVzqankDUA8KiLtYE118ZXENpXnC1qFd7Ong?key=ajvYj_EgdmFhkSStK-lfvA 

Try accessing any other Generative AI App e.g. ChatGPT

The action will be blocked.

AD_4nXec_fxTh_vokqQqQefJrAp-bR28TvklrmjD5jWc5eZrFORwldvLA5JO7fP_2LU-QSctFqwjqLaGjEsXrFA84gWhHvDxMG9QHrgDOhguJtHQoG_2T38zMt4gtc7YQxtnuzbKC_H6ow?key=ajvYj_EgdmFhkSStK-lfvA

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

Be the first to reply!