Skip to main content

AD_4nXeBrlTOEgp65EkcEhnpNBP9pC3FDgqWKh9jXal94xLjAUHpW6JTc2tbk5kSC9J_pSwsOpe8gucCxa4DDJjMXrQ6aiSg7ebTHG-LyivBXnfUb7ms-adINgmlhnLEVyHThk4-zUKZlw?key=tV5Ko4Phg1lwpkl59pn24Tr-

Netskope Global Technical Success (GTS)

Netskope Security Check - Threat Protection

 

Netskope Cloud Version - 124

 

Objective

Understanding & enhancing your Netskope Cloud Security with Netskope Security Check

 

Prerequisite

Netskope SWG / NG SWG license is required

 

Context

Kindly Review Parent Article 

Under Reconstruction

Will be updated soon

 

Details

AD_4nXcmA_gFGaEaKJyeDEcEXXA0bPHDpUXQC0xMX2R7T5beyH1KRjj3UomGaBDqQtx78mYDCFMN6X_ekKC5mUL4GDEXilnoOLcr9TbHKZn_vgifdf4zqSfyGe4WkQPxeM789WGXR8xlXA?key=tV5Ko4Phg1lwpkl59pn24Tr-

 

Assessment Name

URL Accessed

Activity Performed

Predefine Web Category

Recommendations

Ref. Link

Block crypto-mining

ns-catid-589-sn.netskopetools.com/stop-icon.png

Browse

  • Security Risk
  • Security Risk - Cryptocurrency Mining

Security Risk and its sub-categories should be blocked

Link

Link

Block malware over HTTP

netskopesecuritycheck.com/tests/execute/6

Download

  • Security

Malware Block Policy should be configured

Link

Block malware over HTTPS

netskopesecuritycheck.com/tests/execute/7

Download

  • Security

Malware Block Policy should be configured

Link

Block malware download from cloud app

netskopesecuritycheck.com/tests/execute/8

Download

  • Security

Malware Block Policy should be configured

Link

Block file-based exploit

netskopesecuritycheck.com/tests/execute/9

Browse

  • Security
  • Security Risk
  • Security Risk - Compromised/malicious sites

Security Risk and its sub-categories should be blocked

Link

Link

Block ransomware

netskopesecuritycheck.com/tests/execute/10

Download

  • Security

Malware Block Policy should be configured

Link

Block files utilizing HTML smuggling

netskopesecuritycheck.com/tests/execute/11

Browse

  • Security
  • Security Risk
  • Security Risk - Compromised/malicious sites

Security Risk and its sub-categories should be blocked

Link

Link

Block malicious .exe files

netskopesecuritycheck.com/tests/execute/12

Download

  • Security

Malware Block Policy should be configured

Link

Block malicious .dll files

netskopesecuritycheck.com/tests/execute/13

Download

  • Security

Malware Block Policy should be configured

Link

Block malicious .dll files

netskopesecuritycheck.com/tests/execute/14

Download

  • Security

Malware Block Policy should be configured

Link

Block malicious .lnk files

netskopesecuritycheck.com/tests/execute/15

Download

  • Security

Malware Block Policy should be configured

Link

Block malicious .xls files

netskopesecuritycheck.com/tests/execute/16

Download

  • Security

Malware Block Policy should be configured

Link

Block malicious .hta files

netskopesecuritycheck.com/tests/execute/17

Download

  • Security

Malware Block Policy should be configured

Link

Block malicious .doc files

netskopesecuritycheck.com/tests/execute/18

Download

  • Security

Malware Block Policy should be configured

Link

Block malicious .reg files

netskopesecuritycheck.com/tests/execute/19

Download

  • Security

Malware Block Policy should be configured

Link

Block malicious .zip files

netskopesecuritycheck.com/tests/execute/20

Download

  • Security

Malware Block Policy should be configured

Link

Block malicious .chm files

netskopesecuritycheck.com/tests/execute/21

Download

  • Security

Malware Block Policy should be configured

Link

 

Author Notes

  • Netskope provides a test URL for each assessment. If any assessment fails during testing, it does not indicate that any malicious data was downloaded to your machine.
  • The primary objective of the Netskope Security Check is to ensure that the customer has the necessary real-time policies properly configured.

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the default settings may be altered. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

Be the first to reply!