Skip to main content

AD_4nXdG0GRVu76G-hxAXoQjwzeTO_PHxwqMfnTOlC3Pc2D7GUd1C1UdabYskx0UGvmlSqzpTtS-qtQlTdf0hhVqy1sR-2NgIW9CuXR7QihkgQfYzJ044IB_DE5qwycuafDDDwVxZFEnCSw9WIT2zN3GuxXAdWMIbIKiu-mz0bZV3nrs2spxW90Vxvw?key=ccWiC4hySVNW-XSCTOrQxQ

Netskope Global Technical Success (GTS)

Block Telegram Native Application Access on Windows

 

Netskope Cloud Version - 118

 

Objective

Block Telegram Native Application Access on Windows

 

Prerequisite

Netskope Inline CASB or SWG license is required

 

Context

Telegram is a chat and instant messaging platform accessible via both a browser (web access) and a native application. End-users at customers' end may be utilizing Telegram on their machines. This document outlines the steps for blocking access to Telegram's native application on Windows through Netskope

 

Do You Know?

  • Telegram native application uses Certificate pinning.
  • What is Certificate pinning?

Certificate pinning is a security technique used to enhance the protection of network communications by ensuring that an application only trusts a specific SSL/TLS certificate or a set of certificates. 

  • Because the Telegram native application employs certificate pinning, Netskope cannot perform SSL decryption on traffic generated by Telegram.
  • Without SSL decryption, the following controls cannot be applied:
  1. Netskope Data Loss Prevention (DLP)
  2. Netskope Threat Prevention
  3. Netskope Real-time Policy Controls
  • In short, visibility on traffic generated by Telegram native application is also very limited

 

Configuration

Step 1 -  Create a new certificate pinned application

Path: Netskope Tenant UI >>> Settings >>> Security Cloud Platform >>> App Definition  >>> New Certificate Pinned App

AD_4nXc_UCW7usi7tCs94l00ufCXaCRWOqyOzSafCkNtTzu0Lj6h7sOrYsFWJnO-NhRMDEobrqyUOBk-osCQ8OYq4-UfO8nf1kGoNaie74Bayd5x0hgKkZvfFVNKCRu7PkktP5p03l_zYzlIr3X71QCiUTc4rDR_vuR1uv2P1CPZlA?key=ccWiC4hySVNW-XSCTOrQxQ

 

Step 2 - Add the following executable: Telegram.exe

AD_4nXeuAHB8LrCjJDn7eDUAzx_HFy39rHAHVmjW2V7s6sqiFa6NFCFlk5i5dB_9auVB8i6YO9DA9c8zYIajAPs0Z2AlD4dh99kCnT5RJ3g210Of4qiuAB5jzV_zZKLn0uZ3BJ01Ssc3vyMRePx6vWdpPC34QH2bn6VKZub6agZOIg?key=ccWiC4hySVNW-XSCTOrQxQ

Note - Here you need to define the Platform where the application will be used, if needed for another platform then need to repeat the process.

 

Step 3 - Create an exception, while the action will be set to block as following:  

Path: Netskope Tenant UI >>> Settings >>>  Security Cloud Platform>>>Steering configuration>> Select the configuration >>> Exceptions >>> New exception Certificate Pinned App

AD_4nXf8y7d43VjaBEoG139isNCRmIYMiVqjB0L70FPUlLcEheHyJhRx7U0cU0l2kE3pcyQsVZLQ9s-zhkbooxMVEVZolX6TaRttxQ9_KPiy8-t1riGgFfjDcT2u7QRqyalzJeVAZKMzX8o5AfX6wL3IQz_lqC3uEXslutVT3LYx6w?key=ccWiC4hySVNW-XSCTOrQxQ

 

AD_4nXe1LeyKTM3Dsnhg9BLVuvbTKK6mkAYAKOmN0MElWeLZgJKvvrzAY764ssaHaDFpfs08dn1nKsEtgirom5umrLJV4MH3QCImNuIbfCx39KvKtyckcpc68vAwu0W3Ta9i_CyLCp-gBUJHKGHcsDKpPziX64cjgKECbNbELswB_Q?key=ccWiC4hySVNW-XSCTOrQxQ


 

Verification

Note: If the telegram app is running please make sure to kill the telegram process, after kill the process run the application again and test.

AD_4nXcrbgoy8DhwYwqy3FHRf368-E2zWEdjkgx8KfhmMasnBnPRWvKTm3cC8o4O4RMEzfOai8b5FdvGunTUIkQ_g-_BRgrWvVTyQXE7pjQTqFUgga9haC-LfWMiaUx31wJvZsMj5Fs80zrZ7F02ONeYZqBdeDIcfCzK-f-7uMxubQ?key=ccWiC4hySVNW-XSCTOrQxQ

 

You can verify the block action at Netskope logs:

Question - How can I determine that the telegram.exe is attempting to connect?

Answer

Netskope Client logs

filename - nsdebuglog.log

Sample

AD_4nXedByn723nsJLyxH6re-JxSbra19kqJgIqERRzeClwazBq9uYJHhY-sLKdQUPfwuJzn3p7siJNkhb9f4LJcXno9kQ-JBBzVsUZtyOTxk0gyby9AnPBbuI6fpSnIzlNp7fip4DzAnxqRr9VFmvVm7AQf4Ig8ysjYx8WVaGNETQ?key=ccWiC4hySVNW-XSCTOrQxQ

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.

 

Be the first to reply!