Skip to main content

AD_4nXdkH-Kbbu5ohzJst3lKkVk-lgsQ5O70V7BYyy5gBSbg88EmNextcNoRu_X_OQk_980qsMa5BC0kbcfdiw_JFziDWON9loSo2bKUeDOLCsXE1Kr1a1EARuWq5GrBUyD-l9jmjEUMyA?key=4Zd7CUje1kkgkEb3zmUbXg

Netskope Global Technical Success (GTS)

Best Practices - Guide to Maintaining Steering Configuration

 

Netskope Cloud Version - 126

 

Objective

Establishing best practices to effectively maintain steering configurations via the Netskope Web UI.

 

Context

This document outlines the set of best practices to ensure that your Steering configuration is aligned as per Netskope’s best practices.

 

Basic Definitions

  • What is a Steering configuration?
  1. A steering configuration defines what type of traffic will be steered towards Netskope platform for Analysis. Netskope can only inspect and take action on the traffic that has been steered using a Steering configuration located.
  1. A Steering configuration can be found under Settings - Security Cloud platform - Steering configuration.

AD_4nXfg7tDIb4yVUupqi-uZCl7tkX9aQGb11NmtGlg0J_HxwRoEes4gMPBVERIbq_o1ENztoWTUOr_TpiKDeIF7ASchoYGsOZW4hK3DgyQnXUzyS0fbHCWG_gzw5GnikZ3g-Ts_RCNU?key=4Zd7CUje1kkgkEb3zmUbXg

 

  1. Depending on your entitlement with Netskope, you can steer the below type of Traffic using a Steering configuration -
  • Cloud Apps
  • Web Traffic
  • All Traffic (HTTP, HTTPs + Non Web Traffic)
  • DNS traffic

It is essential to ensure that appropriate traffic is steered to the Netskope platform and best practices for steering configuration are followed because misconfigurations can lead to some amount of traffic bypassing inspection, creating blind spots and exposing the organization to threats like malware, data exfiltration, or policy violation.

 

Best practices

  1. Steering Mode set as per Entitlements
  • Ensure that your traffic steering is set as per Entitlements.
  • Eg if you are entitled to steer “All Traffic” ensure that the steering configuration is set to steer “All Traffic”
  • This will ensure that Netskope has visibility into the required traffic for inspection

 

  1. Redundant Steering configuration : 

AD_4nXfmWd5f9cGzIhn2szwkidogdDHnZLYZVAPLId5qJxHqRQ9jaH2J3A21Bhuv7av_oSUMseiZT3MjhVepZ7cagJfN93lA580A_NDBFBHbViueQUbTvsoqshz79J1e3EilgZOP7rde?key=4Zd7CUje1kkgkEb3zmUbXg

  • Ensure to have a redundant steering configuration to test steering changes
  • This allows administrators to test steering changes to a subset of users before rolling out the changes in production

 

  1. Exception review : 
  • Steering configurations come with a default set of exceptions. It is essential to review the exceptions and potentially remove any entry that does not align with the organizations policy as the exception traffic is exempted from any kind of deep inspection thereby creating security loopholes
  • Therefore, periodic review of exceptions is essential to ensure that only necessary entries are added to this list
  • Ensure that there are no broad categories within the exception list

AD_4nXeSVMhky1fCha2ykBRzhmP16TmG4LyTbaEgvpcSIFrWc-SQRtJa8nHdAqqgjqXPwZfRhcg-k6EZp-lNBri8day4BKKh5fXkk8oFeWaZqXAN33Me2hl8K1k9Y7v5E6wKR0iVmH25?key=4Zd7CUje1kkgkEb3zmUbXg

 

  1. Unsanctioned Certificate pinned application
  • The steering configuration comes with a pre-defined set of certificate pinned applications
  • Review the list of these applications to remove the entries for unsanctioned applications or set them to “Block” instead of “Bypass”
  • Setting them to Bypass will bypass the connections from the processes of these applications thereby preventing any visibility from these applications

AD_4nXfP3w43IFy4L7m98UgPAX6cL7koU-reObWlDKn27Vn9Sl0iMJ3XA8zlBT-EWwuivz6P_QZdJ3wr88qOM323q012vaVLlHHjBJPFw9PuTbY4vCVXy4RnZvjyEl9wxn9eKuzSgybRkA?key=4Zd7CUje1kkgkEb3zmUbXg

 

  1. Adding notes to the exception entries
  • The list of exceptions keep increasing over a period of time which leads to exceptions getting lost when the UI is handed over from one Admin to another
  • Adding notes within the exception can better define the purpose of adding the entry helping with better exception management
  • This will allow for ease of management and removal of unnecessary exceptions when the list is periodically reviewed

AD_4nXdAhdBSuAD7tc9Nwm8Bgx9lGX2DmOzmSUxgzMoR_KAOmN5KisFdAjj8E8fJKTrXvJSTwjeE869Hn9Om2knFpfRwVpDqjo1YfZXUzVAS5F0oH-hqGbXTKlLkO9BkCtUFjTS9xL7gdg?key=4Zd7CUje1kkgkEb3zmUbXg

 

  1. Bypass Traffic Logging
  • Ensure to keep the setting to Log Bypassed traffic
  • This setting ensures that when certain types of traffic is bypassed at the Netskope platform, the events get recorded in the Page events when this setting is configured to “Log”. This allows some level of visibility into the traffic that gets bypassed as a result of steering exceptions. Note that only the traffic that gets bypassed at Netskope gateway (Not Netskope client) gets logged as a result of this setting

AD_4nXdzuQyaHCBdJMUFFeM5guQGkXE8wHf8hxBNWbf9W8-Q8PNaHAwXYuoYM66ghIcCUXnDwV5BDp5zNel8enJTN5zQRY1YVoignP5qovZhlKNrmTbd39pCQ9zGsdTIETzBviKp8kX8vg?key=4Zd7CUje1kkgkEb3zmUbXg

 

AD_4nXeRR-QbZcAcK3iFhwdtucKE9OPatiQ0rndS0kwrvX58AOpfr97zFhVtBHP0bNQ39UEtvace055ZyG1iGamBVOV-paHfLlTCGLahNz8w4MkJWBlC6B58YL1t2a9y_cBLlH2S__4rWQ?key=4Zd7CUje1kkgkEb3zmUbXg

 

  1. Setting preferences for addition of certificate pinned application
  • On an ongoing basis, Netskope keeps adding additional certificate pinned applications to the steering configuration
  • This setting allows you an administrator to decide what happens when a new certificate pinned application is released by Netskope to be added under the exceptions
  • The various set of options are discussed in this document
  • The best practice is to leave the setting to “Ask me” which provides a notification to review the new predefined certificate pinned app in the Web UI and allows administrators to make a decision to act upon it.

AD_4nXerd2Pp55zWjZpxuct-wK97vlMFn8G-W4NJ5AkWHemCN2kC5ziM__NOdx9bc4HZah_CTS7IwH2r2XBfSgSx2rSlQEOJsIuEDtl6ibD2Bnbzxbbsknd6dILE1vquPG2dp9txbwBMEw?key=4Zd7CUje1kkgkEb3zmUbXg

  • Below is an example of a notification that is received on the Web Ui

AD_4nXfigzaUO_leIvD-6LLSX8OGddXilmOv8IxrovPJ0P76_2yLsWy00FiswEkZoUtQXkw2-1wwhkWWqeRyUoBX78ge1lYsEfEPEGE5122LooZBKGHIDJkrn5--JV2wtVeDimo-tbHEvQ?key=4Zd7CUje1kkgkEb3zmUbXg

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.
Be the first to reply!