Skip to main content

AD_4nXegsthnemLd4H3wKdqfYONVAtS5WZUuN5A-mL32z0mZS_wQDyQUDaMzFMGyQ9F9rddLt25_4y1ddOVgFUYdqL2jsHoie8VVOfadKjeLldsWasJUwoTkpDyhZCgr6-lQ0mc9jr91Ng?key=wFrqOaLtDkYZKcdQmsv1yV9w

Netskope Global Technical Success (GTS)

Netskope Offering to Threat Management

 

Netskope Cloud Version - 126

 

Objective

This article aims to guide customers on how to effectively leverage Netskope’s security capabilities to prevent threats across their cloud and web environments.

 

Context

  • In today’s hybrid work environment, organizations face an increasingly complex threat landscape—ranging from insider threats to risky web destinations, security risk Websites access, etc.  As cloud adoption continues to rise, the need for visibility and real-time threat protection across all user activity has never been greater.

  • Netskope provides a modern, cloud-native security platform designed to help organizations prevent threats without compromising performance or user experience. This article walks you through key Netskope features and configurations that can significantly reduce your attack surface and enhance overall security posture.

  • We’ll explore critical tools that Netskope Offers to protect users on managed and unmanaged devices. Together, these capabilities help Netskope customers build a proactive and adaptive defense strategy tailored to today’s cloud-first world.

Netskope Features to adopt for Threat Protection:

Offering

License Required

Real Time Threat Protection Policy

SWG (Secure Web Gateway) or Next-Gen SWG along with Standard/Advance Threat Protection

UEBA (User and Entity Behaviour Analytics) - Protection against Insider Threats

Standard/Advanced UEBA License

Netskope Enterprise Browser on Unmanaged devices for Managed Apps

Enterprise Browser License

Targeted RBI (Remote Browser Isolation) - Protect against unknown web threats

Standard/Extended RBI

DNS Security for malicious DNS queries

Cloud Firewall along with DNS Security License

Partner EDR Integration with Cloud Exchange Threat Module

SWG or Next-Gen SWG along with Standard/Advance Threat Protection

DEIP (Dedicated Egress IP)

Regional/Global DEIP License

 

Details

Real Time Protection Policy

  1. Creating a DNS over HTTP (DoH) Policy 

DoH encrypts DNS requests, preventing eavesdropping and manipulation of DNS traffic. While good for ensuring privacy in home networks, DoH can present risks to enterprise networks if it isn’t appropriately implemented. Therefore, Netskope recommends configuring a policy to steer and block this traffic.

AD_4nXcx_QmjJKH6-SFNoc-x8HJpVIaePycwf8Pt5GrMzWUF0nau8bTwWU8TesPZAgZAK107Oop__bswvM2tYkEe1URgbEXLilLjt4H8bEabxeoFLuFvhO0dr7aGq55KNNfECd2dpJIfZw?key=wFrqOaLtDkYZKcdQmsv1yV9w

Please find the article here for the reference.

 

  1. Creating a Threat Protection Policy for Patient Zero (Please note: A Patient Zero Policy requires Advanced Threat Protection License)

A patient zero event occurs when a user downloads a file that’s not detected by signature-based analysis (e.g., Netskope AV engine) in Standard Threat Protection. However, if you have Advanced Threat Protection, you can prevent patient zero events by creating a Threat Protection policy that only releases unknown files to users after the Netskope advanced threat engines determine they’re benign. Netskope's threat database is updated frequently (every 15 minutes) to keep up with the latest threats

AD_4nXd68yA1LUCPpoH6oPR_tLNm_hBMpBv6LyTMY38oTQdPlAEkZreFzBxomfSFfZhUopZRwA-8bXmTjRw9JliGW_zSiQGSjqKDdzuigCimhcafkZSrhfUaEJqIhioeCD8JOuK4hhu-pg?key=wFrqOaLtDkYZKcdQmsv1yV9w

To learn more about Patient zero. Click here

 

Please find the Standard Threat Protection & Advanced Threat Protection feature support matrix:

Feature

Standard

Advanced

Real-time PE file ML-based detection for patient zero threats

Y

Y

ML-based real-time phishing detection in web traffic

Y

Y

All AV/ML detections sandboxed to corroborate detections

Y

Y

All files not detected by AV/ML are analyzed for sandboxing (30+ file types, including zero-day threats)

 

Y

Sandbox reports, detailed forensics, MITRE ATT&CK mapping, and advanced heuristic analysis

 

Y

Patient zero alerts from new sandbox detections

 

Y

Sandbox API for file submissions

 

Y

RetroHunt API by file hash

 

Y

Patient zero protection (hold file until sandbox clean status)

 

Y


 

  1. Creating a malware policy to block upload/download of malicious files across all the Web categories.

Netskope recommends selecting all users and categories with the Activity set to Upload and Download and selecting a Default Malware Scan (predefined) because it automatically scans across all Threat Protection engines based on your organization’s license.

AD_4nXebYDO_DsP06NVg48wGAlod8b32pOBJbop5nhLOWioFPId8hPLhSlko-URzTlwc0nm18krXtLGIlBGdK06eivyKiLROdoxVPSC3y1Q1RFDAq9MUH9KJd_iF1c6kqS_B-5pBg6gR?key=wFrqOaLtDkYZKcdQmsv1yV9w


 

  1. Blocking Security Risk & Sub-categories:

The websites that pose potential threats to users or their data are marked under Security Risk web categories. This includes sites associated with malware distribution, phishing scams, and other harmful activities. Security Risk is the parent category, and all those preceded with "Security Risk - " are subcategories of the parent. Netskope recommend blocking these categories

AD_4nXfMl4W3OkbslEtzSr7yMWWi8VNuQaSazm2nzuVOEbUf5UkLQlXozuqhrKVuW5HmI2pVKirvu_KQdyFD6JCYLs9htTmLnSGRScVeryzaXmeM-sjVjjHV0fjPcfGOq_Yb5_o6bK3KXA?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

  1. A Custom Threat Protection Profile:

When customers create a Malware policy they would normally leverage our default threat protection profile while not noticing that you can create a custom malware profile where you can enhance the detection list as per the organization requirement:

 

Refer the article here to have a deeper understanding.

 

  1. Policy to block the traffic destined to Security Risk destination

Netskope does not provide a specific, pre-defined list of High-Risk countries that should be included in the High-Risk Real-Time Protection Policy. Instead, Netskope allows organizations to define their own High-Risk countries based on their business requirements and compliance needs and block the traffic destined to these high-risk countries. 

AD_4nXe4tLCK4abDxbma25q8sH9q6er_EemTspxeVuO-uubTRQ4ken4W9jEhcM6e5PSKBLQ5JO9de_tt6qk-Ek9RRDVkv5QNN10agUkWUvYW0TOdjrbyxuYZ5_bIde1wyAZHJVa591E07A?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

  1. Block traffic to Low & Poor CCL Websites

Each app is assigned a score of 0-100, and based on that score, is placed into one of five Cloud Confidence Levels (CCL): Poor, Low, Medium, High, or Excellent. You can use the CCI score to make an app selection decision, as well as set policies based on level. Create inline policies that are meant to block risky activities in Low or poor CCL apps for a list of allowed categories. 

AD_4nXeWg20JJ3LdAe0NekQcj2Q0h7XrQ8UadPTX6v_Z2LXZPsNRqjZsRwydUuWp12s0U3p8y2AtyWA3TadRAYBrAp04j_Piq9R1cjXTnWVO0-z5blNqFCpsrvsSmTzIHVVptRRd02Nv0g?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

Here is the Netskope Malware Detection Architecture - Threat Detection Flow:

The diagram below illustrates Netskope’s malware detection architecture, detailing how customer traffic (both in motion and at rest) is analyzed for threats. The flow begins with file interception and progresses through multiple security layers including domain/URL filtering, threat intelligence, and local/inline allow/block lists. Threat scanning services apply advanced techniques such as machine learning classifiers, antivirus engines, hash blacklists, and sandboxing to detect and mitigate malware. Alerts and metadata are sent to various outputs like the admin portal, third-party tools, and APIs for visibility and response.

AD_4nXeKI4wRieBKeMWOU50mmdGjU3HyiU30VEyww0_tXZNLoj8kl4ni3JBgfHoFhiNgexy4Blr8pbcgvJLWuhle1WSsnqsApa_cfRpg91u2j-Pnc9_QjBtVcd8TWswxKrNe_11E8c4D?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

UEBA (User and Entity Behaviour Analytics) - Protection against Insider Threats

UEBA helps to focus on a typical “blind spot” which is Insider Threats. Insider threats refer to security risks caused by malicious users within a corporate network. In the case of a malicious insider, the user typically is acting with intent and likely knows that they are breaking policy and potentially the law. Use the Behavior Analytics dashboard to address some common use cases like below:

AD_4nXerZjC-Y73lh3AFGYtju_AS_W19cTNi5sFQYArtwZW_pURcIQmz2RchVEpCp0tABedc9tC4ErO5rolWr1TKEkOhh8xRPwN7waCRs5JEDCj2cdcEL2FXKurXckGR_ptpjaXSnVyutw?key=wFrqOaLtDkYZKcdQmsv1yV9w

The reference article is here to understand the offerings of Netskope UEBA in-depth.

 

Netskope Enterprise Browser on Unmanaged devices

Netskope One Enterprise Browser allows companies to deliver secure browser-based access to their corporate apps to minimize the risk of data leakage even on untrusted, unmanaged devices.

  1. You may Provide BYOD users and contractors secure access to the corporate apps with DLP and Threat Protection like below 

AD_4nXdGhcmbpxo7F9857omDn0X_OR_Tlsq63B2K8NC9vU-uK6ZuroO6x6bKwQs9qBikKUKJKDELItX4zSytWUqP_lRF1cYwUhsGYEPJyS5DbeaYgJilCXBxq2S9Z0nmzdb4l8RunnrvvQ?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

  1. You can also further control the browser operations like copy, paste, print and screen sharing for your corporate apps.

AD_4nXfItV-SoAV1Z2q-VYCsIHKEID44bNL2PaiLcarFIm0W7nQ8RO9czxH8KtokXh4X9fNvpgnPy-c-32lOCuAhLDL5P3wrfqXdq2RDgNV_yBZNjlpbtEc1j670f443mSqgY8lKRD5q?key=wFrqOaLtDkYZKcdQmsv1yV9w

For more details on the Enterprise Browser, Please visit the link here

 

Netskope RBI - Protect against unknown web threats

Netskope Remote Browser Isolation (RBI) isolates uncategorized and risky websites. Known safe sites are allowed, known bad sites are blocked, and the uncategorized and risky (allowed) websites are isolated for safe viewing

You can configure an isolation policy to forward traffic from selected categories to RBI using the “Isolate” action. 

AD_4nXeD3ZTEj0RW2BpRaEkUVraWPvtj10rTxBe9BEJcXxCxSJpGvJG8u6QHYQ6If1JhUpj2lzuVh7oiTWlgjG6ELgzlt76R1y-ddss6MqC8uwOjkrXG9S5WBJhEWcpSsAg7ULxrgsjHJQ?key=wFrqOaLtDkYZKcdQmsv1yV9w

Learn more about the Netskope RBI here.

 

DNS Security for Malicious DNS Queries

Netskope DNS Security, part of its Cloud Firewall, is a key component of its threat protection framework, designed to safeguard against various cyber threats that utilize DNS services. 

Benefits of DNS Security against Threats:

  • If a domain is identified as malicious, Netskope will respond to the DNS query with a sinkholed IP address, leading the user to a block page. 

  • It helps block phishing, command and control servers, and malware that utilize DNS services. 

  • It can be used to block malicious websites and prevent data from being sent to compromised servers. 

  • By protecting against DNS-based threats, it strengthens the overall security posture of the organization. 

 

You can configure the DNS Profile to block the DNS Query sent to Security Risk category and sinkhole (redirects the malicious IP to a controlled IP Address) the queries for Newly Registered and Newly Observed Domains to a Sinkholed IP like below:

AD_4nXe_MIZyJoTEsSUjcQIx1xBIbhrnAX_YzpkeJmonUD_A-xQSZzGi0JykYnhpkCHOB2iDtREauGgT2CmzInXNN7zEy0e-mZg41sPnSLlOksuQKrRIaogLzLnc-2_EnLsV6jFox_UcPw?key=wFrqOaLtDkYZKcdQmsv1yV9w

Now, Apply the DNS Profile to the users using the Real Time Policy.

 

For more details on the DNS Security Profile configuration, Please visit the article here

Partner EDR Integration with Cloud Exchange Threat Module 

Netskope's Cloud Threat Exchange (CTXE) integrates with Third Party EDR like Crowdstrike, Carbon Black, Microsoft Defender, etc. to enhance security by sharing threat intelligence and enabling closed-loop remediation. Netskope detects threats within cloud services, while the EDR uses this information to act on endpoints, alerting on or preventing malicious activity.

Netskope Cloud Exchange is a free powerful integration tool that can be installed inside a Linux Docker environment which provides flexibility with many integrations along with the ability to detect threats.

You can refer to the article here.

 

Dedicated Egress IP to deny access from untrusted location to Corporate Apps

Use dedicated Egress IP addresses (DEIPs) to ensure that only traffic originating from authorized sources can access managed SaaS applications. This way, even if user credentials are compromised, unauthorized access attempts from unapproved locations will be blocked—because they do not originate from the designated DEIPs.

Netskope’s Dedicated Egress IP Footprint feature allocates a minimum of two IP addresses from Netskope owned IP ranges per data plane that matches your accounts NewEdge traffic management zone/region. The dedicated IP ranges are completely separate from the shared IP ranges. 

Learn more about the DEIP here.

 

Conclusion

With this article, we understood that a single-layer defense is no longer sufficient. Customers must leverage Netskope’s multi-engine threat protection offering a comprehensive and layered security approach that inspects both data-in-motion and data-at-rest across managed and unmanaged environments. The diagram below depicts the same:AD_4nXeekhP3c31WlkE4gDmhN4KKGbCryf9oygSE7vyWgsw2FyhwNhEd66txEdLigW1UWaEy8JHGXkQVLh9QADrtGVXPGYvh4mHnzYARlvPBzqCrd2DYHQ_6teRl2HXejPfAW4kQ_I6OAQ?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.

  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).

  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

Be the first to reply!