Netskope Global Technical Success (GTS)
KB - How to block Zip files via Netskope Realtime Protection Policy
Netskope Cloud Version - 119
Objective
How to block Zip files via Netskope
Prerequisite
Netskope SWG license is required
Context
Zip files can be harmful by concealing malware, creating zip bombs that crash systems, facilitating phishing attacks, enabling data theft, and bypassing security measures. Their ability to compress and hide content makes them a tool favorite for cybercriminals, despite their legitimate uses in file compression and organization.
Do You Know?
Threat Protection scans -
- upto 10 layers for popular archives such as zip, rar, tar and 7zip.
- upto 8 layers are scanned for Tar-gz.
Configuration
Step 1: Create a Real-time protection policy
Path: Netskope Tenant UI >>> Policies >>> Real-time Protection >>> New Policy >>> Web Access/Cloud App Access 7Depending on Requirement]
- Select User/User Group as required.
- Under Destination, choose the required category. In this example we are selecting Cloud Storage for Google Drive, Activity as Upload
- Click on Add Criteria and Constraints >>> Activity Constraints >>> File Type
- Click on Select File Type and select the expansion icon next to Archive and Compressed
- Search for Zip and click on Select All, and then Save. nThis can be modified based on required file types]
- Set Action to Block, and Save the policy
Verification
When the end user tries to upload a zip file to Gdrive, they get a Pop Up from Netskope client that the activity is blocked.
This activity is logged in Netskope Tenant UI >>> Skope IT >>> Alerts
Recommendations
- Consider setting the policy to “Alert” before “block” to monitor the impact
- Exceptions can be made based on User/Project Justification.
Terms and Conditions
- All documented information undergoes testing and verification to ensure accuracy.
- In the future, it is possible that the application's functionality may be altered. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.
Notes
- This article is authored by Netskope Global Technical Success (GTS).
- For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.