Skip to main content

dM8EuJ_ZbG6ImYOm9ge6Zzo8iyjGyFzCnS0fmTs1C1mdsepP-sQl1a0w_PK6blQwOjNLcsoslM0TYuN1WjoO8lsZIHYT69OdIpm7QpoTVC7ehKqkoDSjmsgMZ-HeKOtHhLPDDW5myHokpuFbYRDLfKw

Netskope Global Technical Success (GTS)

Case Insights - Secure Enrollment

 

Netskope Cloud Version - 126

 

What is this article about?

As a new initiative, this report examines the most recurrent “How-to” questions raised by customers which are handled by Netskope Global Technical Success (GTS) Team.

 

Secure Enrollment

Questions and issues related to Secure Enrollment, including its impact on existing devices, troubleshooting expired tokens, and understanding the enrollment process.

 

The most important part about secure enrollment is understanding its purpose, which essentially is adding an extra layer of security when accessing our provisioner service in cloud that is located behind each tenant under:

 

addon-<tenant name>.<region>.goskope.com

 

Addon comes into the picture when Netskope Client is installed for first time on a device, which it will query addon service to fetch and download configuration files from users, meaning that if the user is found, then provisioner provides the enrollment file to the Netskope Client who is asking for it.

 

Now, when authentication token is enabled (mandatory and sufficient to cover the vulnerability found upon enrollment), it will add an extra layer of security on addon service, meaning that if any Netskope Client attempts to access addon without presenting the authentication token, it will receive an access denied.

 

In addition to new installation (requires fetching User configuration files for first time), there is an additional scenario where we will expect Netskope Client to query addon service, which is in multiuser mode, let’s check the below scenario:

 

UserA has logged in to WorkstationA, then its config files were downloaded.

UserB has logged in to WorkstationA, then its config files were downloaded.

UserC has logged in to WorkstationB, then its config files were downloaded.

 

Post enabling Secure Enrollment (Authentication token is sufficient),

 

UserA will not have any impact when connecting to WorkstationA.

UserB will not have any impact when connecting to WorkstationA.

UserC will not have any impact when connecting to WorkstationB.

 

However,

 

If UserA who has never logged in to WorstationB tries to log in, its Netskope Client will attempt to fetch its configuration files, this will only be successful if the authentication token is present on the device, otherwise it will get an access denied and its Netskope Client will remain disabled.

 

If UserB who has never logged in to WorstationB tries to log in, its Netskope Client will attempt to fetch its configuration files, this will only be successful if the authentication token is present on the device, otherwise it will get an access denied and its Netskope Client will remain disabled.

 

If UserC who has never logged in to WorstationA tries to log in, its Netskope Client will attempt to fetch its configuration files, this will only be successful if the authentication token is present on the device, otherwise it will get an access denied and its Netskope Client will remain disabled.

 

You can notice that lateral movement is restricted after enabling authentication tokens unless the token is given to the device.

 

After enabling the Authentication token, customers should take two main actions.

 

  • Edit any script used to deploy Netskope Client on new devices and append the following:

 

enrollauthtoken=xxxTokenGivenByUIxxx (mandatory)

enrollencryptiontoken=xxxTokenGivenByUIxxx (optional)

 

For example in Windows:

 

msiexec /I NSClient.msi host=addon-<tenant name>.<region>.goskope.com token=ORGANIZATION_ID mode=peruserconfig enrollauthtoken=xxxTokenGivenByUIxxx enrollencryptiontoken=xxxTokenGivenByUIxxx

 

  • On already installed devices you must insert the token if they are multisession

 

116.1.0 or later:

Option #1 - Re-run the MSI with authentication and encryption tokens

ℹ️ This option is not supported if the “Protect Client configuration and resources” feature is enabled in the Client Configuration.

 

Option #2 - Leverage nsdiag.exe located in "C:\Program Files (x86)\Netskope\STAgent" with command line:

Command: Nsdiag.exe -e enrollauthtoken=xxxTokenGivenByUIxxx enrollencryptiontoken==xxxTokenGivenByUIxxx

ℹ️ The above command line must be run as an administrator.

 

116.0.0 or earlier:

You will need to uninstall and reinstall Netskope Client with tokens within the context of the installation.

⚠️ Important:
 

There was an important behaviour change between R120 (and earlier) and R120.1 and later, where Netskope Client fails fetching enrollment file while Authentication token is set to “Not Enfonced”
 

For example:
 

While the Authentication token is created and not enforced, R120.1 and later, it will not have any impact, enrollment will still proceed.

On the other hand, while the Authentication token is created and not enforced, R120 and earlier, the enrollment fails.

 

 

Reporting (For Windows)

This configuration uses Netskope Device Classification rules, examining specific values observed in practice. Introducing this reporting based on device classification is recommended only if no real-time policies are currently using Device Classification labels.

 

Step #1 - Create a new Device Classification

Path: Netskope Tenant UI >>> Settings >>> Manage >>> Device Classification

  • Click on “New Device Classification”, add a name, and select “to the top” as position

 

Step #2 - Create a new Device Classification rule

Path: Netskope Tenant UI >>> Settings >>> Manage >>> Device Classification

  • Click on “New Device Classification rule”, add a name, select your device classification, add the following registry keys, and save

AD_4nXcXYviiBTm4KM_K_wFNXRT6aSY0BLu2Pj_bgmPXBrGGztLhbU4uNsE0h-WPD6qnZHcbx1ltAcvullZ-2QbLOeB6oMK29m1BIGmeBqryKZNZCT05UyJUE5Yn0LY3t0MUHj9expU5Xw?key=9INncnlrLkXUWt_sn9R4Gw

 

ℹ️

  • Key: SOFTWARE\Netskope\SecureToken\AuthenticationToken
  • Value: size
  • Data: 178, 106, 262
 

Once saved, this is how it should look

 

AD_4nXcXheFLTgYA1rjJUTJJed_AvQhZZ1_Lp-OfKal2-LJoSzMQYSDBojnmteS-GG1pgy4g-5IhnvHwyzckm_pTvHEFhGPVIFNz01wCp2WmxNZaMSl4nsnVQ0hQm8kzhOEdypz21BDJpg?key=9INncnlrLkXUWt_sn9R4Gw

 

Step #3 - Pull the list of devices with the device classification

Path: Netskope Tenant UI >>> Settings >>> Security Cloud Platform >>> Devices

  • Click on “+Add filter”, select “Device Classification” and add the classification previously created.

AD_4nXe1xkzYG2PWs2BOx53SkFrYDtM11tgG_17THWNweSvzrXUZI7pLhbdTFTW081PCtxOQoN5QLR2ymjv_mPCJ_s50PDuBQx0M60CDFYHKpFdTg-dJhgkxS5Sx3dMwDGZkgqsLbEeUXw?key=9INncnlrLkXUWt_sn9R4Gw

Helpful content: Secure Enrollment


Terms and Conditions
 

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.
Be the first to reply!