Ask a question or share your expertise about Netskope’s Products.
Netskope Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. Get answers to your questions about app usage, data movement, and user behaviors. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
This video will show you how to monitor the trend of data movement to and from corporate vs. non-corporate application instance using the App Instance Overview Dashboard. Use this dashboard to identify: - if data is moving outside of your organization - where the data is moving from and to - what controls or actions have been applied - id additional controls or actions need to be implemented.
Understand who the top risky users are in your organization using Advanced Analytics with the Insider Threat Dashboard. The video will discuss how to access the dashboard, what does each visual tell, how to tune this dashboard in your environment, and our recommendations.
Period over Period Analysis allows you to compare measures from one period to another. E.g. view the change in total alert count from the previous month to the current month. This video will show you how to configure and use the Period over Period Analysis in your dashboards.
Need Support? Explore topics or create one!
While enjoying the seamless secure web access and data protection provided by Netskope Enterprise Browser, you may have a question - is there anything “risky” happening in Enterprise Browser? We have the same question as well. To answer this question, we developed this Enterprise Browser Usage Monitoring - Risk & Control dashboard that uncovers security concerns in Enterprise Browser and shows how your real-time protection policies are controlling these concerns. The dashboard starts with Unmanaged & Risky App Usage, which provides a great starting point for your investigations. You can leverage this section to understand:What unmanaged & risky apps are being accessed in your environment through Enterprise Browser How heavily these apps are being used Who are the users accessing these apps What activities have been performed by these users The second section of the dashboard is about Control & Monitor, which allows you to drill into insider threats in Enterprise Browser and monitor the actions taken by your real-time protection policies. There are three parts in this section. [Sensitive Data Movement]Use this part to monitor DLP policy violations in Enterprise Browser and the corresponding DLP policy actions, making sure you have DLP policies in place taking appropriate control actions on the sensitive data movement detected. [Cloud Threat]Use this part to monitor malware and malicious sites detected in Enterprise Browser and the corresponding threat protection policy actions. See policies allowing malware and malicious sites? Fine tune these policies, making sure they do not allow any malware or malicious sites to your environment. [Suspicious User Behaviors]Use this part to monitor behavior analytics alerts triggered in Enterprise Browser and understand what suspicious activities have been performed by users in your environment. As usual, the dashboard template has been attached below. Feel free to view it in your own environment and share your feedback! New to Netskope Enterprise Browser? Use this dashboard to track the deployment progress.
This dashboard helps you monitor overall activities in Google Workspace.Questions answered by this dashboard include:• How much is Google Workspace being used?• What Google Workspace instances are being used?• Who are the active users? What activities are they performing?• What are the DLP violations tied to Google Workspace?• What malware events are tied to Google Workspace?• What is the compliance posture of Google Workspace? To learn more about how Netskope enables safe collaboration in Google Workspace, watch this video.Thanks @bob for creating this insightful dashboard and the great demo video!
Use Case: Create reporting to show users who are and those who are not using paid subscriptions Assume there's three AD groups, each targeting a specific AI tool. For this example, we can say Copilot 365, Claude and ChatGPT. Please help provide guidance to create resorting/dashboards for this example use case.
■ご質問内容・F/Wなどで除外しないとIntune条件付きアクセスでMacOSが正しく判定できない場合のNetskopeの設定方法 ■大前提条件・Jamf ProとMicrosoft社のIntuneを連携して利用しております。 ■問題点1)MacOSに限りEntraID時でNetskopeを無効化しなければデバイス情報をMicrosoft社に渡せなく EntraIDの準拠がされない状況が発生しております。 ⇒対応策:弊社ではEntraIDに登録時にはNetskopeを無効化して準拠している。 準拠後はNetskopeを有効化している。 2)Microsoft社 Intune条件付きアクセスで準拠したMacOSに限りSharepoint上のページにアクセスする場合 デバイス情報をIntune側に渡せなくてデバイス登録をしてくださいとエラーが発生してしまいます。 ⇒対応策:一時的に条件付きアクセスのサイトでアクセスする場合はNetskopeを無効化しております。
Thanks @scarlile and @Kousain Raza for sharing this great idea and creating the step-by-step instructions!Advanced analytics allows you to build a dashboard with visual content from it’s widgets, as well as add some commentary.For key messages, diagrams, slides which may go alongside an AA dashboard, it is possible to insert images which have been encoded.See below for examples of the types of images which could be inserted. This can be done by using Base64 :-Base64 Encode and Decode - OnlineNote the images are not hosted anywhere - a code is given for the image & this code is inserted into the AA dashboard. InstructionsGo to Base64 Encode and Decode - Online and select “Encode” Upload image file to Base64 Encode and Decode - Online and select “Encode” Download the encoded file The encoded file will be in text format Take a copy of this text In Advanced Analytics, add a Text box and insert this text<body> <img alt="GeekforGeeks" src= "data:image/png;base64, <Insert the base64 code here>" /> Insert base64 code in place of <Insert the base64 code here> Save
Hello Everyone,Could someone guide me on how to integrate this report into our dashboard? Here's the link for reference:https://www.youtube.com/watch?v=SBQg6EaeWTU&ab_channel=Netskope I saw a topic where someone had a question about how to create one and it wasn't answered. could share the file
Already have an account? Login
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
OKSorry, our virus scanner detected that this file isn't safe to download.
OK