Netskope Global Technical Success (GTS)
Use Case - Zoom Web Access Global Block
Netskope Cloud Version - 117
Objective
Zoom is a leading Collaboration platform accessible via both a browser (web access) and a native application. This document outlines the steps for blocking access to Zoom web access.
Prerequisite
Netskope CASB Inline license is required
Context
Some customers have restricted the installation of the Zoom native app using MDM or Group Policy settings. They also wish to block access to Zoom via web access. This can be achieved by configuring a Netskope Real-Time Protection Policy.
Do You Know?
- Netskope acknowledges Zoom Web as a Cloud Application and provides a pre-defined cloud app connector.
- As of Aug 6, 2024 with Netskope’s Zoom predefined connector, customers can exercise control over the following activities:
- The controls will be applied to traffic directed towards the highlighted domains listed below -
- zoom.com
- zoom.us
- By default, Netskope categorizes Zoom under two distinct web categories: Collaboration and Web Conferencing. When creating real-time policies for Zoom, ensure that traffic for both Collaboration and Web Conferencing categories is steering over Netskope.
Lab Recreate
- Realtime protection policy
Path: Netskope Tenant UI >>> Policies >>> Real-time Protection
Verification
- End-user tried accessing Zoom Web, received the below message
Note - User Notification format used above Link
- Check Policy Hits
Terms and Conditions
- All documented information undergoes testing and verification to ensure accuracy.
- In the future, it is possible that the application's functionality may be altered by the vendor. If any such changes are brought to our attention, we will promptly update the documentation to reflect them.
Notes
- This article is authored by Netskope Global Technical Success (GTS).
- For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.