Skip to main content

 AD_4nXfoZ16Dn_X8rXVSquldq40Grhvs39zR8U8j6kKh_NicdDlp3f2UMZu1JLMECoxhkH_pDamcNd6jCymhzRUwmF0kpi1YJtmtpjzOkq93qF_zM37mIwng7Vv9dOAD6j3PByiSj-AEmg?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Netskope Global Technical Success (GTS)

Best Practices - Managing RealTime Policy Structure

 

Netskope Cloud Version - 124

 

Objective

How to manage Netskope real-time policies using best practices.

 

Prerequisite

SWG or Next Gen SWG License

 

Context

This knowledge base (KB) offers a comprehensive guide on how to effectively manage Netskope real-time policies, incorporating Netskope best practices. It provides valuable insights and recommendations to ensure optimal policy configuration, improved security posture, and efficient management within the Netskope environment.

 

Author Notes

  • This document is intended for individuals with an intermediate level of knowledge of Netskope.
  • Each customer has unique use cases and requirements. Please consider this knowledge base (KB) as a reference when managing the real-time policy structure. I’m confident you will find valuable insights from your reading.
  • There are multiple ways to manage a real-time policy structure, but the one I’ve outlined in this knowledge base (KB) is, to my understanding, the best approach. I have tested this methodology with several customers and consistently found it to deliver satisfactory results.
  • This methodology is based on Netskope's Realtime policy structure best practices, making it especially useful for customers who manage a large number of policies."
  • This version improves clarity, flow, and consistency while keeping the meaning intact.

Note - It is recommended that all new policies be tested with test users first.

 

Details

  • To ensure minimal risk and streamlined management of your Realtime Policy structure, it's essential to configure the policies according to best practices. Properly structuring your policy groups can reduce operational risks and make ongoing management more efficient for your organization.

AD_4nXcdLJgsIG1YEMmhTg7UlrqnVP5vLm_9G1_pfUHig9Az18oRsbgIXonjkXBp3GspZ8q5imYGXZpdGMV6xGOEmALEPcKYXG9trvSpW0FVVNeM-_TKU_MUX8DeQIoyDitt_h48T7jD?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Image 1

  • By default, each Netskope Tenant comes with three policy groups:

- Header Policies
- Default Policies
- Footer Policies
 

  • However, to improve your policy management and reduce potential risks, I recommend expanding the structure by creating additional policy groups with the following format:

AD_4nXdyt4j-kdVvN6E63Dkzsn_6OWnjLG0_yfOX2mOO3PIEp-u5Ye1s60rQfcYPJ49xlP7Ncoa9Ywa8RVttZxIxivC0Eee3LUFIThg_W8_fD4kfW6f994M15p9WuHDHuArnfltXKvbgMQ?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Policy Group Number

Policy Group Name

Policy Number

Policy Name

Action

Profile

Description

Ref.

1 Header            
2 Threat 2.1 nThreat] DOH - Global Block Block

 

Block DNS over HTTPS

Link - Click
2.2 oThreat] Patient Zero - Global Block Block

Threat Protection Profile

Zero day threat policy

License - Advance Threat Protection

Link - 

Click

Click

2.3 gThreat] Malware Protection Policy - Global Block Block

Threat Protection Profile

Threat Protection Malware protection policy

License - Standard Threat Protection

Link - Click
2.4 gThreat] Security Risk - Global Block Block

 

Block Security Risk Destinations Link - Click
2.5 kThreat] ITAR - Global Block Block

 

Block Countries - International Traffic in Arms Regulations

Link - 

Click

Click

3 RBI 3.1 aRBI] RBI Policy Isolate

 

License - RBI Link - Click
4 Global Allowlist 4.1 bCloud] IT Team Exceptional Access Alert   IT team has always access to the tools which are not allowed to the end-users  
4.2 =Cloud] Executive User Alert   Executive users need open access to Internet  
4.3 lWeb] Custom Allowlist - Global Allow Alert

 

Allow domains via Custom Web Categories  
5 Global Blocklist 5.1 tWeb] Online Ads - Global Block Block   Block Online Ads Link - Click
5.2 sWeb] Restricted Destinations - Global Block Block   Block Web categories such as Gambling, Marujuana, Alcohol, Pornography and etc.  
5.3 nWeb] Custom Blacklist - Global Block  Block   Block domains via Custom Web Categories  
6 Webmail         Kindly review the section ‘Detailed overview Policy Group number 6 - Webmail’  
7 Cloud Storage         Add all policies attached to Cloud Storage  
8 Collaboration         Add all policies attached to Collaboration  
9 Generative AI         Add all policies attached to Generative AI  
10 Social Media         Add all policies attached to Social Media  
11 Streaming Media         Add all policies attached to Streaming Media  
12 Business Apps         Add all policies attached to Business Sanctioned Apps  
13 Online File Converters 13.1 0Web] Sanctioned - Online File Converters - Global Allow Alert   Assuming that there is a Business approved online file converter

Link - Click

Follow Approach 2

13.2 0Web] Online File Converters - Global Allow Block   Block all other Online File Converters
14 Web - General         Add Policies attached to Web Categories  
15 Firewall Policies        

Add Policies attached to Cloud Firewall

License - Cloud Firewall

 
16 NPA - Netskope Private Access        

Add Policies attached to NPA

License - NPA

 
17 Default            
18 Footer            
 

 

  • Detailed Overview Policy Group number 6 - Webmail

- Consider a customer named Netskope, whose sanctioned webmail application is Google Gmail. They will allow their end-users to access the Netskope instance of Google Gmail, but they also want to enable access to personal Google Gmail accounts. However, they need to restrict activities that could lead to data exfiltration.

- What kind of real-time policies should they implement to achieve this use case? Let’s explore

Policy Group Number

Policy Group Name

Policy Number

Policy Name

Action

Profile

Description

Ref.

6 Webmail 6.1

Block

Or

User Alert

DLP

 

An end-user is sending or uploading data that violates the DLP policy.

Image 3
6.2 >Cloud] Google Gmail Netskope Instance - Constraint Policy

Block

Or

User Alert

 

An end-user is sending an email from the Google Gmail Netskope instance to an email address that belongs to *@gmail.com

 

Image 4
6.3 tCloud_Ins] Google Gmail Netskope Instance

Allow

Or

Alert

  Create an access policy that allows end-users to use the Google Gmail Netskope instance Image 5
6.4

Block

Or

User Alert

 

Activities - ‘Create, Edit, Attach, Send, Upload, Download’ are blocked

Image 6
6.5

Allow

Or

Alert

 

CCI Tag Policy

Mark Google Gmail as Sanctioned Application in Netskope

Image 7
6.6 Web] Unsanctioned Webmail Applications Block  

CCI Tag Policy

Block all Unsanctioned Webmail Applications

Image 8
 

 

  • Snapshot - Policy Group number 6 - Webmail

AD_4nXdV3cpDwNJrmJIH7Agg_n8gk-DtKxk685I5H_0tUTciKYeRRIpyiYfFnGvs5zk74VUTFUWqAobEtQqlOyYEnBgE9qzbx3R2Q5VlSq4TWetiT8XoLy-T8yRPPTtPNTm3EZ3fY0zA?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Image 2

____________________________________________________________________

AD_4nXdg6R6naHeRmC7Itwtxg5jVo17Rd0VsETrzJim3tEs6tcbf_W6iD0nOpIWP5SSgdLCCjTs-ytdC2eygMCgxKcySYmsz0SKkmL7XWld68wxJpFvHr57SPkGnyyfCiK_lmus70QYjUQ?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Image 3

____________________________________________________________________

AD_4nXeQm9quUz2XlXG9IV0KuJ_2sq77c6KhmKgvAGtOcdYr7w2zArPp3FcYKIbuamPyNXFrZNm5MBeAnrhhYtsX2ssAU0AO0ubpdZsUWI8awHwJvqK2TZqRU3cBJsCIYfi-t6r9fi6urA?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Image 4

____________________________________________________________________

AD_4nXdDjwk9_glDR9VglF1jsHZ7WZd7__sx1OgCVkcUX9QED-4n-e58iUDZa_UvgPAGo86lNVJIn6I5rYuHbntXT_lxXwp8uoGKFtybgD8A_DFaMSEYWEGM-ms3xUs-krGiBeNJ2JXYBA?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Image 5

____________________________________________________________________

AD_4nXcNbIrDgEPG63g9ITq_0lFtQjqOD7LsbZTG-aQ4GxdemZ6MNyTX-DZaN1NFrIKlklL73nRblnh925yXXicXQ6RNryeFAEgWUu-K-KVLpmgAUroPbvG6TrXq6uzDTuOCXlsFxVWwMQ?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Image 6

____________________________________________________________________

 

AD_4nXfbkjLxvf7yow-gM0jNt5L8L3A6xNHrdZfmfndgi1lOJ5DyerKPwbSboXlPj_WrcXItdvICabbTkhksXCnWlpK3zf3HeyOgF8wrq2SOTl-NvnplUKcTgSee9i-0DKCWhTS6jPMT?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Image 7

____________________________________________________________________

 

AD_4nXc4GCXT8N5CdspaaEv9KVWZk89Fq0kXPyjpaOBhdLEZsxpER-0YLPPW8JJsCRHnKwajOVXJSc69tjuiCGNQfSYWazZ57uEo3gmh6bRG9qAwCO69duCeEfmUl0b6LvZNsDpqjxQnig?key=s9x0EswvFEkXOIgvhyBQ-6Mq

Image 8

____________________________________________________________________

 

  • You can create policy groups based on your business needs, which will help with policy management. However, it is not recommended to create a policy group for every pre-defined web category. 
  • Categories such as Webmail, Cloud Storage, Collaboration, Gen AI, and Social Media are more likely to be tied to one or more business use cases, so attaching policies to specific policy groups in these cases makes more sense.

 

Important

  • Be very cautious when making changes or modifications to real-time policies in the production environment. It is recommended to add a new real-time policy with a few test users and monitor the results before applying it broadly.

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

 

Be the first to reply!