Skip to main content

AD_4nXdFch-yCi-66dPhW5chQtkqbldDlc_jfEQhPw4qxXLsYFDmCj6ceB65nWAs9sKuHFVOZ1dZDe0D9NRdWBfrm_lYb1Jk87z4IsFPZHyNDJLqXVtYZ1inMGiVK-npAzDE9AtEj8n-mTRmrzyk7ElIggkY45E?key=8zsjkNyyh4Xj7I5kVOFdZg

Netskope Global Technical Success (GTS)

General Q/A Attached to: Managing Access to Traffic Destined for High-Risk Countries

 

Netskope Cloud Version - 120

 

Objective

Managing Access to Traffic Destined for High-Risk Countries: Q&A Guide

Note - Request you to read parent article first Link

 

Prerequisite

Netskope CASB Inline/SWG license is required

 

Context

We'll discuss the Q/A attached to ‘Managing Access to Traffic Destined for High-Risk Countries’

 

Q/A Section

  • Question 1: How does Netskope identify the country where a web destination is hosted?

Answer: Netskope identifies the country where a web destination is hosted using Geo-IP mapping. This method maps the IP address of the destination to its physical location, based on databases that associate IP ranges with specific countries. These databases are regularly updated and maintained to reflect changes in IP address allocations

 

  • Question 2: Does Netskope use any third-party tools for Geo-IP mapping?

Answer: Netskope leverages multiple third-party feeds for Geo-IP mapping, including services like MaxMind, IP2Location, NetAcuity, and Netstar. These feeds are updated regularly to ensure accurate location identification.

 

  • Question 3: Does Netskope provide a list of High-Risk countries that should be included in the High-Risk Real-Time Protection Policy, with all traffic to those countries blocked?

Answer: Netskope does not provide a specific, pre-defined list of High-Risk countries that should be included in High-Risk Real-Time Protection Policy. Instead, Netskope allows organizations to define their own High-Risk countries based on their business requirements and compliance needs.

A customer in Africa may identify different High-Risk countries compared to a customer in the APAC region. Each country has its own regulations concerning high-risk countries. For example, the U.S. government enforces the International Traffic in Arms Regulations (ITAR), while Australia adheres to the Export Control Act of 1982.

 

  • Question 4: What about the default Risky Countries policy listed under Behavior Analytics (UBA)?

Answer:

Path: Netskope Tenant UI >>> Policies

AD_4nXcTjYiRORtQDGMuN6h4XA5SLTKdhJSOV4H5aUsxTVshnEM9iZKb9_dg4ijyfR3y-4oeSsiSvGpcgclxIJRxzC_X2QH06EHOqUQxad71xb0haydwbz4zfwdsWT3MTjzicQZOeb3fVF6LDvUL2598z0xgYosH?key=8zsjkNyyh4Xj7I5kVOFdZg

 

This is a default policy that includes over 25 countries. Any traffic directed to these countries will trigger a User Behavior Analytics (UBA) informational alert. It is recommended that customers review this default policy and modify it according to their specific business requirements and compliance needs.

Customers seeking real-time protection policies to restrict traffic to High-Risk countries should consult this list. For the initial days or weeks, it is advisable to set the policy action to 'Alert.' This allows Netskope administrators to review alerts and determine whether traffic related to any sanctioned applications is being directed to High-Risk countries, enabling them to plan subsequent actions accordingly.

 

  • Question 5: What should a customer do if the Geo-IP mapping is incorrect?

Answer: Any Geo-IP mismatches should be reported to Netskope Customer Support.

 

  • Question 6: Can a customer map an IP address to a country directly from the Netskope Tenant UI?

Answer: Customer cannot perform any such action from the Netskope Tenant UI.

 

  • Question 7: Does Netskope provide information about the country where a web destination is hosted?

Answer: Yes, this information is accessible under the Skope IT

Path: Netskope Tenant UI >>> Skope IT

AD_4nXdwkUECpALrr8dNgi3qww4ZTS51EIwR9zrengsSrKUIMNrT2y5vSTtE9_hTbTYCOMCall3UeGsBBsOCic4PvJd4SCLJjo5YwqjnEv0Ma0JSt0UCxgqiIr7Dba76dongAYM7aMfFRWWEPpC0V6KvGnnn4ck?key=8zsjkNyyh4Xj7I5kVOFdZg

 

AD_4nXfIJRBCRxBOkydGH5RCHEqt6Hknxm2BG31iQlZdfk6i6RnJf7D9SDXiRKBm4qeeVZDmiXqE4AUck0B-w8a-9yNnLgQtINsMLXUaPo8pL3Z6VRk5YjKnEKgJsMLvqznDtAPhStG0xD_fe3VAgruRCEMSqPo?key=8zsjkNyyh4Xj7I5kVOFdZg

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, should any changes to Netskope best practices come to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

What to Read Next?

Control Youtube traffic with Netskope

Link
All about - ‘WhatsApp’ Link
Netskope & Gen AI Link