Skip to main content

AD_4nXeT4sKUWaGHSwMfDht7bV8EU-zV1ZChLEKkTNBjnql_V8TvRKfAaMDeQ1vWJIGS44WYqdyaquQ42hH3wRjst0LGE0LI1XuEDSghIjJVKMCNiQrz22E6dZxu0cPh8r4gqns2clB-zw?key=wFrqOaLtDkYZKcdQmsv1yV9w

Netskope Global Technical Success (GTS)

Netskope Offering to Threat Management

 

Netskope Cloud Version - 126

 

Objective

This article aims to guide customers on how to effectively leverage Netskope’s security capabilities to prevent threats across their cloud and web environments.

 

Context

  • In today’s hybrid work environment, organizations face an increasingly complex threat landscape—ranging from insider threats to risky web destinations, security risk Websites access, etc.  As cloud adoption continues to rise, the need for visibility and real-time threat protection across all user activity has never been greater.
  • Netskope provides a modern, cloud-native security platform designed to help organizations prevent threats without compromising performance or user experience. This article walks you through key Netskope features and configurations that can significantly reduce your attack surface and enhance overall security posture.
  • We’ll explore critical tools that Netskope Offers to protect users on managed and unmanaged devices. Together, these capabilities help Netskope customers build a proactive and adaptive defense strategy tailored to today’s cloud-first world.

Netskope Features to adopt for Threat Protection:

Offering

License Required

Real Time Threat Protection Policy

SWG or Next-Gen SWG along with Standard/Advance Threat Protection

UEBA - Protection against Insider Threats

Standard/Advance UEBA License

Netskope Enterprise Browser on Unmanaged devices for Managed Apps

Enterprise Browser License

Targeted RBI - Protect against unknown web threats

Standard/Extended RBI

DNS Security for malicious DNS queries

Cloud Firewall along with DNS Security License

Partner EDR Integration with Cloud Exchange Threat Module

SWG or Next-Gen SWG along with Standard/Advance Threat Protection

Dedicated Egress IP

Regional/Global DEIP License

 

Details

Real Time Protection Policy

  1. Creating a DNS over HTTP (DoH) Policy 

DoH encrypts DNS requests, preventing eavesdropping and manipulation of DNS traffic. While good for ensuring privacy in home networks, DoH can present risks to enterprise networks if it isn’t appropriately implemented. Therefore, Netskope recommends configuring a policy to steer and block this traffic.

AD_4nXfs_8sRjueVnkSl8gZlhts-pSV-C5aeXxTxBqbTC-AXC_9Si8c2HrmbB4kyznpQ4g2Vv7FnrXA1bHEhY2HjkI2Z6uuXjNu-GBEO8IJpTz0UbfO4QrDIeOernPK4qpNxxFldzZDYhQ?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

  1. Creating a Threat Protection Policy for Patient Zero (Please note: A Patient Zero Policy requires Advanced Threat Protection License)

A patient zero event occurs when a user downloads a file that’s not detected by signature-based analysis (e.g., Netskope AV engine) in Standard Threat Protection. However, if you have Advanced Threat Protection, you can prevent patient zero events by creating a Threat Protection policy that only releases unknown files to users after the Netskope advanced threat engines determine they’re benign. Netskope's threat database is updated frequently (every 15 minutes) to keep up with the latest threats

AD_4nXf7AtZxN9JHO5V5ThOHaxovakDaY4uRdAkUs0Gg2KJSLODM88dVdVBrtN4x_Tm73RVm3Ubep5mdUKRnE3RorWeOCCuYkWqPqzEvhvr_WpXpXFAamLwMRD0jtDsSCn8mGTJAvA7B6Q?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

  1. Creating a malware policy to block upload/download of malicious files across all the Web categories.

Netskope recommends selecting all users and categories with the Activity set to Upload and Download and selecting a Default Malware Scan (predefined) because it automatically scans across all Threat Protection engines based on your organizations license.

AD_4nXdl8ki3v40GRJSHux0YjyXmTngxNgZeliI-xdVA7AtBZsEb1vUoSAyevX8jqG6pZMc30JALSSHFAJo9dowt9xi5seHu5aoR4j5U7KcgVrgPUNaemvYeQjGE1il5rCOThjjW_aKS?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

  1. Blocking Security Risk & Sub-categories:

The websites that pose potential threats to users or their data are marked under Security Risk web categories. This includes sites associated with malware distribution, phishing scams, and other harmful activities. Security Risk is the parent category, and all those preceded with "Security Risk - " are subcategories of the parent. Netskope recommend blocking these categories

AD_4nXc4jhjoUedfSek6VUI1S60r5fPIJc5T6vx2O37kvGWXxht-ZWoK598mI8NL6Lp2WuXwvBzsMmdXU5JlTBmDZOo-yueO4g6Up8R3Cau844Tw5sLhYiLuchbLl6quTpI7nZ1MBESmig?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

  1. A Custom Threat Protection Profile:

When customers create a Malware policy they would normally leverage our default threat protection profile while not noticing that you can create a custom malware profile where you can enhance the detection list as per the organization requirement:

Refer the article here to have a deeper understanding: 

 

  1. Policy to block the traffic destined to Security Risk destination

Netskope does not provide a specific, pre-defined list of High-Risk countries that should be included in the High-Risk Real-Time Protection Policy. Instead, Netskope allows organizations to define their own High-Risk countries based on their business requirements and compliance needs and block the traffic destined to these high-risk countries. 

AD_4nXdX5LU5meZX5DPcMk4AJN2pNCyk2WIQDR8pPqRf7EMyFSdtlBATGaVTVa4O2slBbGh9hi4w-bCIxeQN6Hd5ya-A1xcUiKU4l5dDd4hVUyqhLEJidiLKoWMBBBkWPzPHSrDtIKxPTw?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

  1. Block traffic to Low & Poor CCL Websites

Each app is assigned a score of 0-100, and based on that score, is placed into one of five Cloud Confidence Levels (CCL): Poor, Low, Medium, High, or Excellent. You can use the CCI score to make an app selection decision, as well as set policies based on level. Create inline policies that are meant to block risky activities in Low or poor CCL apps for a list of allowed categories. 

 

AD_4nXcPBPZTx0l4OCOwtLQm_a1LzWvR4ZEO8al7AOmNNpjqKrNpipgQt89LexJFGC7RNGx-lVmMWdBj8Vo-S2Ih8DljVK-P3fBttKjlcm5WcmNEx5T-90o5nwvCtDowq1kXbXnlbiyaBQ?key=wFrqOaLtDkYZKcdQmsv1yV9w
 

UEBA - Protection against Insider Threats

UEBA helps to focus on a typical “blind spot” which is Insider Threats. Insider threats refer to security risks caused by malicious users within a corporate network. In the case of a malicious insider, the user typically is acting with intent and likely knows that they are breaking policy and potentially the law. Use the Behavior Analytics dashboard to address some common use cases like below:

AD_4nXeVRnxO5ZriWRLTjy58zoM1poKjAPsoOiVQPH-QD3BAAe3s6yz4rKz0Wl1RXCyRROrtDrp-hwOuUitHLgE2lYuAEkqzAYyVK5JYUubPDT1RC1tozSQS17Goe0R33NW8V5QUi8ITEA?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

Netskope Enterprise Browser on Unmanaged devices

Netskope One Enterprise Browser allows companies to deliver secure browser-based access to their corporate apps to minimize the risk of data leakage even on untrusted, unmanaged devices.

  1. You may Provide BYOD users and contractors secure access to the corporate apps with DLP and Threat Protection like below 

AD_4nXd-RNMv1BqFx1pAj14voRPvUK9Tg4sopE-5Kr6d649PaQwjNFzLZV-ermWTKSZD2U8BhOGGfjxLxzl_oKmQeQizMsby2sAWeBERWSBGhaielFf58-9Lf6UG_Gvkz0Z_R4o48V6EYw?key=wFrqOaLtDkYZKcdQmsv1yV9w

  1. You can also further control the browser operations like copy, paste, print and screen sharing for your corporate apps.

AD_4nXeK1DlRDe1r8hDkCK3hbnfffHGFqKQHRWNx2euxoesMwMza1z2fyN4YxmgYwDxx9WPlJ-KzKar8bw8ZI6nfnhqM6WFM7lZoz2xLN6Am5Xs2lSjzJEQegCB5ZvIlWjDA6urhptOE?key=wFrqOaLtDkYZKcdQmsv1yV9w

For more details on the Enterprise Browser, Please visit the link here

 

Targeted RBI - Protect against unknown web threats

Netskope Remote Browser Isolation (RBI) isolates uncategorized and risky websites. Known safe sites are allowed, known bad sites are blocked, and the uncategorized and risky (allowed) websites are isolated for safe viewing

You can configure an isolation policy to forward traffic from selected categories to RBI using the “Isolate” action. 

AD_4nXcDgbA8eMg6VFSUpvvOgUCIPzR8zhQasWmQbll23l9JS_zcEUYwr2Tao_Z-jihqQA1kvAcQ9LZ3-Fc2F3GC_HDCDB2y8ujpaGDETm-ba_AmpvwvQhoAOBLn4moaJTB6ZAS-s3P2wQ?key=wFrqOaLtDkYZKcdQmsv1yV9w

 

DNS Security for Malicious DNS Queries

Netskope DNS Security, part of its Cloud Firewall, is a key component of its threat protection framework, designed to safeguard against various cyber threats that utilize DNS services. 

Benefits of DNS Security against Threats:

  • If a domain is identified as malicious, Netskope will respond to the DNS query with a sinkholed IP address, leading the user to a block page. 
  • It helps block phishing, command and control servers, and malware that utilize DNS services. 
  • It can be used to block malicious websites and prevent data from being sent to compromised servers. 
  • By protecting against DNS-based threats, it strengthens the overall security posture of the organization. 

You can configure the DNS Profile to block the DNS Query sent to Security Risk category and sinkhole (redirects the malicious IP to a controlled IP Address) the queries for Newly Registered and Newly Observed Domains to a Sinkholed IP like below:

AD_4nXc7Qn6akDo2G3bd3RnGZvsHpH1zOk2hsBszni2ywm90ppTwyaXEai2HIoRRN8_Xn8KaZRoHY1FDTXDH1h7YWV4rlw2Fpi0Zjs1_g_TWCAxPeA9lLmEuWvwY0hdgOjHwHR0f490urA?key=wFrqOaLtDkYZKcdQmsv1yV9w

Now, Apply the DNS Profile to the users using the Real Time Policy.

For more details on the DNS Security Profile configuration, Please visit the article here

 

Partner EDR Integration with Cloud Exchange Threat Module 

Netskope's Cloud Threat Exchange (CTXE) integrates with Third Party EDR like Crowdstrike, Carbon Black, Microsoft Defender, etc. to enhance security by sharing threat intelligence and enabling closed-loop remediation. Netskope detects threats within cloud services, while the EDR uses this information to act on endpoints, alerting on or preventing malicious activity.

Netskope Cloud Exchange is a free powerful integration tool that can be installed inside a Linux Docker environment which provides flexibility with many integrations along with the ability to detect threats.

You can refer to the article here.

 

Dedicated Egress IP to deny access from untrusted location to Corporate Apps

Use dedicated Egress IP addresses (DEIPs) to ensure that only traffic originating from authorized sources can access managed SaaS applications. This way, even if user credentials are compromised, unauthorized access attempts from unapproved locations will be blocked—because they do not originate from the designated DEIPs.

Netskope’s Dedicated Egress IP Footprint feature allocates a minimum of two IP addresses from Netskope owned IP ranges per data plane that matches your accounts NewEdge traffic management zone/region. The dedicated IP ranges are completely separate from the shared IP ranges. 

Learn more about the DEIP here.

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.
Be the first to reply!