Hello, I'm not an advanced user or deployer but I don't know where else
to ask this question. My workplace is using Netskope. Can anyone tell me
why only the Waterfox browser is blocking most websites? Even
ahdictionary.com is blocked as a security r...
Is there anyone who has success creating dlp rules using the canned
identifiers for PHI? I'm struggling to get a basic combination of First
Name, Last Name, Medical Condition to match my test file. I can match
and have policy hit for individual ident...
We've opened a support ticket as we believe we've found a bug where
devices are not honoring the fail close option in the Client
Configuration. We have fail closed unchecked, yet we notice almost all
our systems in the UI (as well as logs) having fai...
So we have the agent deployed out to our widows and Macs in our
environment. We have followed the Best practice guides for bypassing the
VPN traffic with Netskope but we are still having issues connecting to
the VPN on the Mac's. Anyone else run into...
Having NS Client deployed/installed pre-Big Sur works great. We've even
managed to update the install script to grab the local user logged in,
append our email domain and auto enroll with iDP. The challenge now is
upgrading to Big Sur relies on a use...
API-enabled Protection provides policy and access control, risk
anomalies forensics, and data governance. The following sections walk
you through each key benefit of API-enabled Protection and how to get
the most out of your API-enabled Protection po...
Cisco Meraki is a lower cost cloud managed alternative to the
traditional Cisco Network equipment. The solution is quite popular
because of its ease of deployment and management and is marketed as a
solution which offers SD-WAN capabilities to small ...
Looking to find best practice configurations when Netskope is
integrating with 3rd party vpn vendors such as Palo Alto, F5 or Cisco
Anyconnect? Check out the following link -
Though we built the Cloud Threat Exchange module of Cloud Exchange
originally to facilitate the automated sharing between plugged-in
security stack components of customer-specific threat indicators of
compromise, including malURL, IP addresses involv...
End user Performance monitoring is quickly becoming essential to IT
Operations teams. While approaches vary, typical capabilities include
information on response time, latency, and availability. Overall, the
goal of end user Performance monitoring is...
This 2 minute video walks through a Crowdstrike ZTA Integration. The
scripts identified in the video can be downloaded from the attached "zta
crowdstrike sensor reading.docx". Credits: Thanks to Dave Toth for the
creation of this video Thanks to Rami...
One of the most common cases our support organization receives is
related to application certificate errors/breaking when traffic is being
steered via Netskope, related to certificate pinning for the
application. Below are a few Support kb articles w...
Welcome to the Additional Discussions board! This is a place for us to
discuss Advanced Analytics, DLP, Threat Protection, IaaS, and all other
things cyber security & networking. Once we have critical mass around a
conversation, we can create a new d...