Design Use Case
Design Use Case
Distribution
Name Organisation Role
Project Manager
1 Introduction
The purpose of this design is to describe the detail design and configuration of the Netskope Cloud
Security Platform for <customer> Remote Worker Laptops.
Strategically, <customer> is leveraging cloud-based services as part of their core technology capability to
support the ongoing transformational business change. In parallel, the workforce is increasingly more
mobile and will be utilizing laptops for workers to be used remotely.
With adoption of these services, comes increased concern around the trustworthiness of services, the
security posture of endpoints and real-time governance of access to services. A set of security
capabilities are required to allow the <customer> business to safely adopt these services and operational
modes and place less reliance on traditional on-premise network oriented controls as the primary risk
mitigants. Furthermore the capability needs to allow for easy on boarding of current and future cloud
based services to provide flexibility and value realization:
Glossary of Terms outlines acronyms that are used throughout the document, and the Scope,
Constraints, Dependencies, Assumptions and References are also outlined.
The Solution Design provides a summary of the capability for the solution as outlined in the HLD and is
included for reference.
The Application Architecture covers the capabilities and application settings of the solution.
The Infrastructure Architecture describes the configuration and builds of any on-prem component within
customer infrastructure.
The Network Architecture covers networking, application specific flows and other operational aspects.
Following table shows the coverage and deployment methods for the Netskope Cloud Security Platform
for maximum coverage. It shows the different access method, whether the machine is managed or
unmanaged and whether user accesses sanctioned or unsanctioned cloud apps.
TBD
2.3 Dependencies
The dependencies below are specific to this design:
TBD
2.4 Assumptions
The assumptions below are specific to this design:
TBD
Note: All users must have a value populating the Mail attribute field in AD, and this value must be in email
address format. This will be used as the primary identifier for Netskope client user validation (optional
use UPN if matches email address).
OR
Netskope SCIM integration will be used to on-board/off-board user and group attributes from <enter IDP>
into the Netskope tenant; this is a one-way sync only from <enter IDP> to Netskope.
3.3.2 IPSec/GRE
IPSec/GRE tunnels will be established between the firewalls/routers and Netskope datacenters to forward
traffic from Guest WiFi and Servers for real time visibility and policy control.
3.9 Reports
Netskope reporting functionality provides a deep level of visibility to satisfy various regulatory standards.
Insight gained through reports can help you determine how to best steer traffic to protect your
organization.
The Netskope Cloud Security Platform enables a variety of advanced security services to be deployed
and administered seamlessly as microservices across SaaS, IaaS and Web environments
The following diagram is a holistic overview of the various Netskope components that will deployed in the
environment. There are more comprehensive diagrams throughout the document for each of the deployed
components.
PLATFORM / DESCRIPTION
TECHNOLOGIES
Netskope Tenant A tenant provisioned in Netskope cloud to proxy cloud applications & web traffic
Netskope Adapter Connects to a domain controller (DC) and periodically fetches user and group
(Directory Importer) attributes from Active Directory and syncs to the Netskope tenant
Netskope Client The Netskope Client steers HTTP/HTTPS for cloud apps & web traffic to the
Netskope tenant
IPSec/GRE Site to Site tunnel for policy based routing or PAC file steering of web traffic to
Netskope POP
Netskope API- Uses an out-of-band API connection into sanctioned cloud services to provide
enabled Protection visibility of sensitive content, enforce near real-time policy controls, quarantine and
malware detection.
On-Premise Log The OPLP Virtual Appliance (VA) is used to parse log files from the perimeter
Parser (OPLP) virtual devices. All log processing happens locally, and only the extracted events are sent to
appliance the tenant in the Netskope cloud
Netskope REST API Used to retrieve Alerts, Applications, Audit, Client and Connections events
Netskope Reverse Reverse Proxy services to apply inline controls for unmanaged devices for
Proxy sanctioned applications within Netskope tenant
5.1.1 Netskope UI
The Netskope UI provides full access to deploying and managing the Netskope solution. It provides
administrative controls for account management and traffic steering, visibility into network activities, and
analytics to help you define policies to protect your enterprise from security violations.
Netskope Dashboard: Provides the overall enterprise risk score and also allows you to drill-down
further to analyze user and app risk.
Incidents: Provides views into DLP, anomalies, compromised credentials, malware, malicious sites,
quarantine, and legal hold incidents.
API-enabled Protection: Provides views for all of your API-enabled Protection instances.
Policies: Provides views of your Real-time Protection and API-enabled Protection policies, profiles,
templates, and encryption.
Netskope Tenant provides support for both local account and integration with Single Sign-On Identity
Providers for authentication. The Netskope tenant for <customer> will be configured with SAML based
authentication for Single Sign-On (SSO) with Azure AD. This will support the management of
administrative users within the tenant as users will be managed using Active Directory groups.
The below local accounts will be required for tenant access in case of SSO with Azure not available and
assistance from Netskope Support.
To login with a local account the following URL would need to be used:
https://<tenantname>/locallogin
Netskope Roles:
There are several predefined roles within the Netskope tenant. Each admin will be assigned a specific
predefined role or a custom role which has different admin privileges. All activities performed on the
Netskope UI are logged and accessible only to the Tenant Admin role.
Admins can also be kept from viewing sensitive data by creating custom roles which applies to Events,
API-enabled Protection, Reports, Incident Management and Malware functional areas. Below fields can
be obfuscated:
Below Netskope roles and IDP settings will be configured for SSO to the Netskope Tenant UI.
Name
Netskope Role
TenantAdmin
DelegatedAdmin
ReadOnly
L1Support
All privileges except Read only Access to
Role Top level admin has all managing other all sections except Read only Access to
Description privileges admins admins Events and Users
Advanced
Settings View and Manage View and Manage View Only None
Settings View and Manage View and Manage View Only None
CCI View and Manage View and Manage View Only None
Events View and Manage View and Manage View Only View Only
Introspection View and Manage View and Manage View Only None
Reports View and Manage View and Manage View Only None
TenantAdmin
DelegatedAdmin
ReadOnly
L1Support
End Users View and Manage View and Manage View Only View Only
Threat View and Manage View and Manage View Only None
IaaS/PaaS View and Manage View and Manage View Only None
Identifier (Entity Id) <Get Entity ID from tenant under Settings > Administration > SSO>
Reply URL (Assertion Consumer <Get ACS URL from tenant under Settings > Administration > SSO>
Service URL)
User attributes and claims 1) NameID = user.principalname or NameID = user.mail
(use any one attribute which has email address format)
2) admin-role = <The is an AD attribute with a claim value matching
roles in Netskope tenant; e.g Tenant Admin>
SSO Enabled
Sign SSO Authentication Request
Disable Force Authentication
IdP URL <get iDP URL from Azure>
IdP Entity Id <get entity id from Azure>
IdP Certificate <get cert from Azure>
SLO Enabled
Sign SLO Request/Response
iDP SLO URL
Note: Netskope also has a built-in role Super Tenant Admin which can be configured to send email
notifications for policy alerts and can also be used as a break glass account for SSO troubleshooting.
Only one local account with Tenant Admin privileges can be assigned this additional role of a Super
Tenant Admin.
Customer can select an existing local or create a new local account. Recommendation is to set a group
email address (e.g., [email protected]) and the password can be stored in a password safe as
this account will normally not be used for any administrative tasks within the tenant.
You can specify the number of log in attempts that can be allowed before the admin user is locked out of
the UI. The default setting allows up to 5 failed login attempts.
SETTINGS VALUE
Maximum failed login attempts 5
Idle timeout 15 mins
Password expiration 90 days
Disallow concurrent logins by same admin ✘
5.1.2.2 IP Allowlist
A list of IPs can be configured as an allowlist to access the Netskope tenant. <customer> egress IP
addresses assigned to the Netskope appliances like the on-premise log parser (OPLP), DPOP and
Netskope admins egress IPs will be added to the allow list in the tenant.
Once the users and groups are provisioned in the tenant we can determine user activity in cloud and web
traffic and enforce cloud app and web policies.
Netskope Tenant Stores Metadata of Active Directory users and groups and AD attributes in
the tenant
Netskope Adapter – Directory Connects over LDAP 636 to synchronize Active Directory users and groups
Importer into the Netskope Tenant for Netskope Client user authorization and set
validation ID in Netskope tenant for AD attribute = Mail or UPN
Active Directory Active Directory stores the organizations user and group attributes
Admin Desktop Used for management of Netskope components
List of AD Groups:
SAM Account
UPN
List of AD attributes uploaded to
First Name
Netskope Management Plane
Last Name
OU
Group Membership
AD Connector
DNS Connector
User Info URL (Get URL from tenant under Settings > Tools > Directory Tools)
Directory Service:
Active Directory ✘
Specific
Filter Options:
None ✘
The Netskope client will get rolled out to <enter nos.> Windows 10 devices and MAC devices.
The NS client will be installed in multi-user mode on Windows devices.
Netskope Tenant Stores Metadata of Active Directory users and groups and AD attributes used to
authorize the Netskope clients
Netskope GTM Enabled Netskope client connects to the nearest Netskope POP and establishes a SSL tunnel
and then Netskope POP connects to the managed cloud apps or websites
Netskope Adapter - To synchronize Active Directory users and groups into the Netskope Tenant for
Directory Importer Netskope Client user validation and set validation ID in Netskope tenant for AD
attribute = Mail
Active Directory Active Directory stores the organizations user attributes
Netskope Client Steers http / https traffic to Netskope POP and exceptions go normal route
Desktop (Internal) Accesses cloud apps and websites and has the Netskope client installed on it.
Netskope Client will establish a SSL tunnel to Netskope POP
Remote User with VPN Accesses cloud apps and websites and has the Netskope client installed on it. SSL
and Netskope Client VPN connects (Split Tunnelling is not allowed) and the Netskope Client will establish a
SSL tunnel to Netskope POP
Remote User with Accesses cloud apps and websites and has the Netskope client installed on it.
Netskope Client Netskope Client will establish a SSL tunnel direct to Netskope POP
(Without VPN)
The NS Client intercepts traffic in DNS mode and in an explicit proxy environment.
<customer> is using the PAC file method to instruct the desktop machines how they can reach SaaS
applications/Internet websites and it is assumed there’s already a mechanism in place to ensure desktop
devices can determine what is the URL of that PAC file. The Netskope Client will read the PAC file
contents and detect the explicit web proxy. As soon as the proxy is detected, the Netskope Client will
intercept all HTTP CONNECT messages sent to that proxy and will tunnel that traffic through the SSL
tunnel established between itself and the Netskope Gateway component existing in Netskope’s cloud. As
Netskope is meant to be <customer> Cloud Web Proxy, all web traffic on TCP ports 80 and 443 not
explicitly configured as an exception will be sent through the above mentioned SSL tunnel.
Here are the packet flow details of how the Cloud app traffic is intercepted and sent through the tunnel
when the client is installed in an explicit proxy environment:
1. The Client establishes the SSL tunnel between the Client and the Netskope gateway. The client will
first try to connect directly through default gateway to establish the SSL tunnel. If this is blocked, then
it looks for system proxy settings, such as PAC (proxy auto-config) files, WPAD (Web Proxy Auto-
Discovery Protocol), and manual configuration. The client uses the proxy settings and connects to the
Netskope gateway via HTTP Connect.
2. The browser or native app reads the proxy settings (PAC file, explicit proxy setting) and opens a
connection to an explicit proxy server, for example: ep.customer.com.
3. The client parses the initial header of the connection.
4. If the initial header indicates the connection is a SaaS app, then the client sends the entire payload
through that SSL tunnel to the Netskope gateway.
5. If the initial header does not indicate SaaS app HTTPS access, the TCP proxy opens a connection to
and forwards the entire payload to the explicit proxy server. For example: ep.customer.com
Here are the packet flow details of how the cloud app traffic is intercepted and sent through the tunnel
when the client is installed in a non-proxy environment:
1. The Client establishes the SSL tunnel between the Client and the Netskope gateway.
2. Browser/App sends a DNS request for a managed cloud service (For example: Box.com)
3. Browser/App receives a DNS response (For example: 74.112.184.73)
4. The Client driver captures DNS response and creates a map of domain and IP (For example:
Box.com = 74.112.184.73 for cloud app domains)
5. Browser/App sends packets to Box.com (For example: DST IP 74.112.184.73)
Netskope Client will be deployed via <customer> software deployment tools. The client will be deployed in
multi-user mode and the command line to package the software is:
(Get Organization ID from the tenant under Settings > Active Platform > MDM Distribution)
Netskope exceptions will be configured for traffic that needs to be bypassed from Netskope. Configuring
any of those exceptions will have the effect of the traffic flowing according to what the PAC file
determined for a given SaaS application/Internet website.
<customer> users will be sending traffic to Netskope Cloud in order to perform deep traffic inspection. For
SSL/TLS interception, Netskope’s PKI infrastructure will be used, with the following Certification
Authorities (CAs) hierarchy:
In order to have a successful SSL/TLS interception, Netskope’s Root CA certificate will need to be
installed in the trusted CA store of the desktop machines which are tasks performed by the Netskope
Client installer.
When the Netskope Client service starts up, it must also retrieve from the client configurations from the
tenant. That configuration is setup in the WebUI in the ‘Settings -> Security Cloud Platform -> Devices ->
Client Configurations’ section. <customer>’s standard Netskope Client configuration will be using the
default client configuration, with the following relevant settings:
PARAMETERS VALUE
Upgrade clients automatically Disabled
Allow disabling of clients Disabled
Hide client icon on system tray Disabled
Uninstall clients automatically Disabled
Password protection for client uninstallation and Disabled
service stop
Allow users to unenroll Disabled
Enable Push Notifications for iOS Disabled
Interoperate with Proxy – Static Web Proxy None
On-Premises Detection None
Enable device classification and client-based end Disabled
user notifications when the client is not tunneling
traffic
Enable DTLS Disabled
Enable advanced debug option Disabled
<customer> will also require having some selected users with further capabilities to verify and if
necessary, troubleshoot the Netskope Client behavior. In order to achieve that goal, another client
Additional parameters can be configured if the device meets the minimum requirements to be classified
as Netskope managed or unmanaged. This can then be used in Netskope policies to apply different policy
sets for managed or unmanaged devices. Currently this will be left with default settings as not configured
as there are no use cases to have this feature configured.
Netskope Tenant Stores Metadata of Active Directory users and groups and AD attributes
Netskope Dataplane IPsec tunnel connects to the nearest Netskope datacenters
Maximum Bandwidth:
50 Mbps
100 Mbps
150 Mbps
250 Mbps
This deployment option doesn’t have any infrastructure dependencies and, as such, is simple to deploy.
Target applications are configured to grant access from the Netskope tenant using an OAuth token. This
technology is referred to as API introspection and uses the native API interfaces from SaaS applications
to inspect activity, newly added content, and content that already resides in the sanctioned app.
Control is out-of-band, therefore policy enforcement actions occur shortly after the event has
happened but not in real-time
Only selected sanctioned cloud services are supported. Unsanctioned cloud services cannot be
scanned with API policies.
The API policies capabilities are not uniformed and vary from application to application as it is very
dependent on the SaaS application API capabilities.
Secure sensitive content: Depending on the application APIs, sensitive content can be protected by
generating alerts, encrypting data, removing external links, quarantining or legal hold the data for
further review, and / or by removing it from the cloud. Availability of the corrective action depends on
the native API provided by the sanction application, different applications provide different level of
functionality.
Audit activities: API enabled dashboard provides insight into who has access to data, or what
actions have been performed by various parties (download, share, edit, etc.).
Discover sensitive data: Allows discovery of sensitive data in sanctioned services using either
predefined or custom DLP profiles, (e.g. personally identifiable information (PII), protected health
information (PHI), payment card industry information (PCI), or other confidential profiles). Discovered
sensitive data can then be secured, for example encrypted as per above, or collaborators /
administrators notified of the policy violation, so that action can be taken.
Netskope’s API integration uses OAuth tokens with O365; webhooks mechanism for OneDrive,
SharePoint and Outlook to detect changes and events that occur in the endpoint application.
Netskope Tenant Use an out-of-band API connection leveraging OAuth tokens into your sanctioned
cloud services to provide visibility of sensitive content, enforce near real-time policy
controls, and quarantine malware
O365 OneDrive for OneDrive API provides introspection, quarantine, legalhold, malware, forensic
Business API
O365 SharePoint API SharePoint API provides Introspection, quarantine, legalhold, malware, forensic
O365 Outlook API Outlook API provides Introspection
Admin Desktop Used for management of Netskope components
Profile Name
Site
Profile Name
Site
Notification Emails
Profile Name
App
Instance
Site
User Email
Notification Emails
Encrypt
Tombstone Text
Use Default Text
Use Custom Text <enter text>
Malware Tombstone Text
Use Default Text
Use Custom Text <enter text>
Customer Provided Tombstone File
Low Severity
SkopeIT Alert
Quarantine File
Remediation Endpoints
Medium Severity
SkopeIT Alert
Quarantine File
Remediation Endpoints
High Severity
SkopeIT Alert
Quarantine File
Remediation Endpoints
Quarantine Profile <select quarantine profile>
Remediation Profile <select remediation profile; if applicable>
Zip Pasword -
Notify
Netskope REST API endpoints are available to provide alert, event, and client data, manage quarantine
and legal hold files, update hash file and URL lists, and perform several other functions. The following
endpoints are available via the Netskope Platform APIs:
Get Alerts Data: This endpoint returns alerts generated by Netskope, including policy, DLP, and
watch list alerts. Policy alerts are triggered when traffic matches policy. DLP alerts are generated
when there is a DLP violation triggered by the policy. Watch list alerts are triggered when watch list
matches.
Get Events Data: This API call returns events extracted from SaaS traffic and or logs.
Get Client Data: This endpoint returns information related to the Netskope Client.
Get Reports Data: This endpoint returns the result of a report generated on one of the fields in the
summarization database.
Get Steering Configuration List: This endpoint returns all the Steering Configuration names and the
Steering Config IDs associated to them. Use this API to get the Steering Config name or Steering
Config ID to get values about the configured steering configuration(s) to use in the Get Steering
Configuration Information endpoint.
Get Steering Configuration Information: This endpoint is used to get details about a particular
steering configuration.
Get User Configuration Data: This endpoint returns the user configuration items for specified users.
Allows retrieval of the iOS mobile profile or Netskope Client config for a user.
Get Log Upload Token: This endpoint returns the log upload token. Only the token parameter is
needed.
Manage Quarantine Files: This endpoint allows different operations to be performed on quarantined
files.
Manage Legal Hold Files: This endpoint allows different operations to be performed on legal hold
files.
Update File Hash List: This endpoint updates the File Hash List with the values provided. This
overwrites the existing values with the new values, so include any existing values to be kept in the
list.
Update URL List: This endpoint updates the URL List with the values provided. This overwrites the
existing values with the new values, so include any existing values to be kept in the list.
Acknowledge Anomalies: This endpoint should be used to acknowledge the anomalies for a user or
a list of users.
Acknowledge Compromised Credentials: This endpoint can be used to acknowledge a user whose
credentials had been compromised, and subsequently changed their passwords. Note that when a
request is made for users with compromised credentials, this user will not be returned, preventing a
multi-factor authentication being invoked again for this user.
Netskope will store <customer>’s Metadata and Summary of events for 90 or 365 days. To keep events
for a longer period of time <customer>’s will configure their on-premise SIEM to download the Netskope
application, alerts, connection and client events via Netskope REST API.
Alert ✘
Application ✘
Clients ✘
Limit 5000
Interval (s) 60
Index -
Proxy Name -
Netskope REST APIs use an authentication token to make authorized calls to the API. Netskope REST
APIs provide access to resources via URI paths as shown in the table below. The token must be used in
every REST API call for the tenant. For each tenant, a separate token must be generated in the
respective Netskope tenant UI by going to Settings > Tools > Rest API. The same menu can be used to
revoke the token.
The table below lists the API endpoints that will be initially used to retrieve data from the Netskope tenant.
REST API SETTING (GET TOKEN FROM TENANT UNDER SETTINGS > TOOLS > REST API)
Events
Application events https://<enter tenant url>/api/v1/events?type=application&token=<enter
token>&timeperiod=<enter time period>
Page events https://<enter tenant url>/api/v1/events?type=page&token=<enter token>&timeperiod=<enter
time period>
Audit events https://<enter tenant url>/api/v1/events?type=audit&token=<enter token>&timeperiod=<enter
time period>
Alerts
Anomalies https://<enter tenant url>/api/v1/alerts?type=anomaly&token=<enter token>&timeperiod=<enter
time period>
DLP https://<enter tenant url>/api/v1/alerts?type=dlp&token=<enter token>&timeperiod=<enter time
period>
Malware https://<enter tenant url>/api/v1/alerts?type=malware&token=<enter token>&timeperiod=<enter
time period>
Policy https://<enter tenant url>/api/v1/alerts?type=policy&token=<enter token>&timeperiod=<enter
time period>
Clients
Client Status https://<enter tenant url>/api/v1/clients?token=<enter token>&timeperiod=<enter time period>
There are 4 types of policies that can be applied to SaaS, IaaS and Web traffic.
Alerts. Generates alerts on the SkopeIT > Alerts page when a policy matches.
Change Ownership. Designates the administrative owner of files and folders for which the policy is
applied.
Encrypt. Encrypts a file if it matches policy criteria and is enabled in licencing.
Quarantine. Quarantines a file if a user uploads a document that has a DLP violation.
Legal Hold. Preserves all forms of relevant information when litigation is reasonably anticipated. A
copy of the file can be saved for legal purpose if it matches policy criteria.
Forensic. Applies forensic profile that flags policy violations and then stores the file in a forensic
folder.
Real-time policies apply to the cloud apps and web traffic that is steered via Netskope Cloud Security
Platform.
Source: This element defines the subject to whom policy applies. Users and groups that were
provisioned into the Netskope Tenant can be selected in the policy. When a user is added into a
synchronised AD group that is referenced by a real-time policy, it will enforce the policies for that user
as per others in the common group.
Destination is the SaaS cloud app (or group of SaaS cloud apps) to which the policy applies.
Types:
Cloud App is used to identify individual cloud application (all instances) for example
Google Drive, MS OneDrive etc.
Category is used to identify cloud applications of certain type, for example Cloud
Storage, Webmail etc.
App Instance is used to identify a particular instance of the same service, for example
the corporate instance of MS One Drive, and distinguish it from any other non-
corporate managed instances.
Any Web Traffic is all traffic destined to cloud applications.
Destination Activities are the action that user can perform in cloud application such as
Browse, Download, Upload, Share etc. Those activities can be further filtered by applying
constraints, for example Share action can be constrained to users from certain email
addresses.
Profile and Action: Action item that is enforced when conditions are matched. Action items vary for
different Activities and they could be Alert, Allow, Block, User Alert etc.
Profiles:
Data Loss Prevention Profile – either pre-defined to meet regulatory or other common
requirements (PCI, PII, etc.), or custom defined based on regex patterns.
Threat Protection Profile – either malware scan profile (default), or custom defined.
Policy Name. Free text descriptor for the policy. It is recommended to name the polices as per the
following convention: <Action>-<Activity>-<Profile>-<App/App Category/Instance>-<User or Group>-
<Misc> for example Block-Upload-DLP-PCI-Cloud Storage Unmanaged-Finance
Risk prevention-oriented policies (Threat Protection and DLP related policies used to prevent risky
activities) should be implemented at the top of the inline policies.
Cloud App (Activity oriented) policies should precede Web/Secure Web Gateway, SWG (Access
oriented) policies.
Policies should be implemented from more specific to less specific.
Below is a list of Web and Cloud App categories that are allowed/blocked:
APP-CAT-04 Business Process Business Process Management applications enable companies to design, implement, Allow
Management and track workflows for various organizational functions. BPM applications also help
analyze process efficiency through various metrics in order to enable users to fine-tune or
change processes. Features include: PLM, CPQ, Q2C, compliance, business process
associated with legal like docket management, and process around travel (not travel
sites), etc.
APP-CAT-06 Cloud Storage Cloud Storage applications are used both by enterprises and consumers for storing all Allow
types of data and file formats. Pricing is typically a function of capacity utilized or
reserved. Cloud storage applications typically provide capabilities like sync (with a native
client such as on a desktop, laptop, or mobile device). Also, some cloud storage
applications provide basic social features like sharing via popular social networks. Cloud
storage vendors targeting enterprise customers provide additional security capabilities
such as encryption of data-at-rest.
APP-CAT-07 Collaboration Collaboration applications enable teams to create, share, and manage content, plus meet Allow
online via audio/video towards a common goal such as a project. Collaboration features
include change tracking of documents, project management capabilities, common storage
space, roles and access management, etc.
APP-CAT-08 Consumer Consumer applications are built for individuals for personal use such as fitness Allow
management, personal effectiveness, etc. Applications in this category are categorized by
the lack of any serious data security or business continuity features that would make
them suitable for enterprise use.
APP-CAT-09 Content Management Content Management applications are built to enable organizations to build, publish, and Allow
manage web content in a collaborative environment. Features include blog publishing,
version control, content replication, web-based form building capabilities, etc.
APP-CAT-10 Customer Customer Relationship Management (CRM) and SFA applications provide a wide variety Allow
Relationship of features for custom relationship management and salesforce automation. Features
Management include contact management, lead management, website live chat, etc.
APP-CAT-11 Development Tools Software development applications in the cloud enable teams to work together by Allow
providing code repositories, review boards, branch management functions, bug tracking,
flowcharts, and UI mockups. They reduce complexity and boost productivity by
maintaining the version control infrastructure and tools required to develop software.
APP-CAT-13 Education Education applications are targeted at school and college administrators and enable the Allow
automation of administrative tasks such as admissions, course content maintenance,
grading, fee details, etc.
APP-CAT-14 Enterprise Resource Enterprise Resource Planning (ERP) applications cover a broad range of enterprise Allow
Planning functions. ERP applications aim to integrate data from multiple functions and/or include
features like procurement, inventory management, supply chain, manufacturing, service
delivery, etc.
APP-CAT-15 Finance/Accounting The Finance/Accounting category covers applications that cover functions like fund Allow
management, accounting, enterprise expense management, budgeting and tracking, etc.
APP-CAT-16 Forums Community site services are cloud-based applications that enable companies, non- Allow
profits, and civic communities to create forums and online communities.
APP-CAT-17 General General is a placeholder for Netskope's internal functions to enable the Netskope Allow
Universal Connector.Applications are not placed in this category.
APP-CAT-18 Help Desk Help Desk Management applications are intended for enterprises that serve existing Allow
Management customers via online portals. They offer customers the ability to design support
workflows, open tickets, build a knowledge base, create FAQs, define escalation rules,
etc.
APP-CAT-19 HR Human Resource applications offer features that enable HR professionals and people Allow
managers to perform administrative functions like recruiting, keeping employee records,
managing benefits, etc.
APP-CAT-20 IaaS/PaaS IasS and PaaS includes application hosting providers, platform-as-a-service, virtual Allow
machine, and bare metal services.
APP-CAT-21 Identity Access Identity Access Management applications provide features such as single sign-on (SSO), Allow
Management password management, multifactor authentication, etc. They enable enterprises to
manage a unified list of users across multiple applications.
APP-CAT-22 IT Service/Application IT service management and application management includes IT operations, app Allow
Management deployment, license management, app management, app maintenance and upgrading,
and app scenario testing.
APP-CAT-24 Logistics Logistics and transportation applications enable enterprises to automate the processes Allow
that move people and goods. They provide features such as label printing, order tracking,
vehicle tracking, route optimization, driver payment, etc.
APP-CAT-25 Marketing Marketing applications in the cloud cover a wide variety of marketing functions like Allow
marketing analytics, brand management, email marketing, social media management,
campaign management, and SEO tools.
APP-CAT-26 Security Security applications in the cloud provide services such as encryption and anti-virus Allow
protection.
APP-CAT-27 Social Social networking applications allow users in their capacity as individuals or employees to Allow
connect with friends, colleagues and others with a shared interest. Such connections
enable users to receive updates from others in their network.
APP-CAT-28 Survey Solutions Survey Solutions collect data from users based on a predefined question set. Features Allow
include: target audience selection, branching and skip logic, analytics and visualization
tools, and multi-language support.
APP-CAT-29 Telecom and Call Telecom applications use the VoIP protocol to enable telephone connectivity in inter- Allow
Center office and intra-office environments. Vendors create virtual PBX in their data centers to
handle multiple customers. Call Center applications provide enterprises with the features
and tools to automate the process of receiving and responding to customer phone calls.
Features include: call tracking, monitoring, multimedia recording, employee evaluation of
call handling capabilities through automated feedback, multi-site routing, voice
recognition, etc.
APP-CAT-30 Web Analytics Web Analytics applications are used to track website usage and aid in web design Allow
decisions. Features include: click analysis, conversion tracking, A/B testing, behavioral
data like clickstreams, time spent per page, exit points, etc.
APP-CAT-31 Web Design Web design services offer custom design and templates for web sites on a subscription Allow
basis.
APP-CAT-33 Webmail Webmail covers consumer email and hosted enterprise email services. Block
WEB-CAT-01 Abortion Sites that discuss abortion from a historical, medical, legal, or other not overtly biased Allow
point of view. Examples are abortion pill, pregnancy termination, fetal abortion etc.
WEB-CAT-02 Adult Content - Other Sites with adult content ( Sex, Nudity, Gambling,Gay, Lesbian or Bisexual,Violence ) are Block
categorized under this category.
WEB-CAT-03 Adult Content - Pornography sites are the ones which allow portrayal of sexual subject matter. Block
Pornography
WEB-CAT-04 Advocacy Groups & Industry trade groups, lobbyists, unions, special interest groups, professional Allow
Trade Associations organizations and other associations comprised of members with common goals. These
organizations typically use public relations campaigns, advertising, political donations,
and/ or lobbying to achieve those goals. Also includes groups formed to achieve
standardization and collaboration between companies in a particular industry. Examples
are lawyers association, lobby group, human rights group etc.
WEB-CAT-05 Aggressive Sites that do not fall to any specific category under Aggressive belong to this category. Block
Also includes web pages that have three or more aggressive categories should be under
this category.
WEB-CAT-06 Alcohol Sites that show alcoholic drinks (cocktails), beers and wine. Examples are whiskey, Block
vodka, merlot, ale, etc.
WEB-CAT-07 Arts Sites that contain creative art judged solely for its intellectual or aesthetic components. Allow
Cannot be combined with any other category under Arts group. For two Arts categories,
use Arts-Other.
WEB-CAT-08 Auctions & Person to person selling or trading of goods and services through classifieds, online Allow
Marketplaces auctions, or other means not including traditional online business-to-consumer models.
Excludes buying and selling of vehicles which falls under Automotive - Buying/Selling
Cars and real estate homes and properties which belong to Real Estate - Buying/Selling.
Examples are online classifieds, swap, trade etc.
WEB-CAT-10 Business Sites that do not fall to any specific category under Business belong to this category. Also Allow
includes web pages that three or more categories should be under this category.
Examples are airport parking, funeral homes, florists etc.
WEB-CAT-11 Chat, IM, & other Sites with real-time chat rooms and messaging allowing strangers and friends to chat in Allow
communication groups both in public and private chats. Includes Internet Relay Chat (IRC). Examples are
chat room, group chat, IRC etc.
WEB-CAT-12 Child Abuse Discovery of any such sites should also be reported by email to a supervisor or manager Block
for passing on to law enforcement. Web pages that show the physical or sexual abuse of
children. Cannot be combined with any other Criminal Activities categories. Examples are
kiddie porn, pedophilia, child abuse, Pre-Teen Hard Core, etc.
WEB-CAT-13 Content Server Web servers without any navigable web pages typically used to host images and other Allow
media files with the purpose of improving web page performance and site scalability.
Includes businesses that provide content servers and content delivery networks such as
Akamai. Examples are web application acceleration, media server etc. Sample web
pages are img0.tuita.cc, img01-otodom.sogastatic.pl, pics.taobaocdn.com etc.
WEB-CAT-14 Criminal Activities Sites that do not fall to any specific category under Criminal Activities belong to this Block
category. Also includes web pages that have three or more Criminal Activities categories
should be under this category.
WEB-CAT-15 Dating Online dating, matchmaking, relationship advice, personal ads and web pages related to Allow
marriage (not weddings). Examples are dating advice, blind date, etc.
WEB-CAT-16 Drugs Sites that in any way endorse or glorify commonly illegal drugs, the misuse of prescription Block
drugs, the misuse of inhalants, or any positive references to the culture of drug use
whether specific drugs are mentioned or not. Includes sites giving non-clinical
descriptions or stories about being high as well as blogs and other posts about getting
high. crack, heroine, morphine, etc.
WEB-CAT-17 Dynamic DNS DomainDynamic DNS Domain sites provide a method of automatically updating a name server in Allow
the Domain Name System (DNS), often in real time, with the active DDNS configuration
of its configured hostnames, addresses or other information.
WEB-CAT-20 Fashion Sites that discuss additional fashion elements such as fashion models, agencies and Allow
others. Examples are modeling agency, fashion modeling, etc.
WEB-CAT-21 File Repositories Sites with collections of downloadable software and applications, various of types of files, Allow
etc. Includes repositories of screen savers, wallpapers, web templates, ringtones, and
any site with a collection of files. Excludes downloads of themes which falls to Hobbies-
Themes. Can be paired with Piracy & Copyright Theft if it involves non-licensed
downloads like web templates, file collections, etc.
WEB-CAT-22 File & Software Computer users need different software to meet different needs all the time. This is where Allow
Download Sites the software download websites are helpful. They not only host the software on their own
servers, so that its available for download 24/7, but also categorize them properly so that
its easy for users to explore and find the software they are looking for.
WEB-CAT-23 Financial Aid & Sites that assist to debit loans, credit loans in case of job loss or unemployment. It is also Allow
Scholarships an unemployment benefit in some countries. Other forms of assistance for which
unemployed people might qualify include food stamps, medicaid, assistance with utility
bills, assistance with rent and assistance paying for job training. This category also
include web pages that show relevant information on scholarships or grants for the
jobless, laid-off workers or low-income employees, which can either be a partial or a full
coverage.
WEB-CAT-24 Food & Drink Sites that do not fall to any specific category under Food & Drink belong to this Allow
category. Also includes web pages that have three or more Food & Drink categories
should under this category.
WEB-CAT-25 Gambling Games that involve the winning or losing of money based on strategy and chance. Block
Includes information, tips, strategies, and rules for gambling games. Examples are
bookie, betting, lotto, etc.
WEB-CAT-26 Games Sites for all games and sports. Examples are Board Games, Roleplaying Games, Video & Allow
Computer Games.
WEB-CAT-28 Health & Nutrition Sites that discuss information, tips, guide and others related to health and wellness, plus Allow
eating healthy and diet plans.
WEB-CAT-29 Hobbies & Interests Sites that do not fall to any specific category under Hobbies & Interests belong to this Allow
category. Also includes web pages that have three or more Hobbies & Interests
categories should be under this category. Examples are indoor hobby, outdoor hobby,
competition hobby, observation hobby, paper modeling, tapestry, origami, etc.
WEB-CAT-30 Home & Garden Sites that do not fall to any specific category belong to this category. Also includes web Allow
pages that have three or more Home & Garden categories should be under this category.
Example is home cleaning (tips).
WEB-CAT-31 Insurance Covers any type of insurance, insurance company, or government insurance program Allow
from medicare to car insurance to life insurance. Examples are accident insurance, travel
insurance, life insurance, etc.
WEB-CAT-32 Internet Telephony Sites that allow users to make calls via the web or to download software that allows users Allow
to make calls over the Internet. Also called Internet Telephony and Voice Over IP.
Examples are IP voice, skype, VOIP system, Viber, etc.
WEB-CAT-33 Investors & Patents Sites that include investing on startup inventions made by hobbyists. It also can be Allow
related to kickstart which refers to funding of new creative projects all of sorts. Once
investing of funds are done, patents follow. Can be combined with other categories under
Hobbies. Examples are kickstart, crowd funding, patents on inventions, patent, patent
registration, patented invention etc.
WEB-CAT-34 Job Search & Careers Job posting pages on company websites, job search sites, interview tips, job-related Allow
classifieds, temp work, contract work asked or offered, etc. This also includes web pages
that show information, tips or guide on career advice; sites that provide information or
step by step process and analysis on how to achieve good career plans; web pages that
show places and/or events full of job hunters and seekers; and sites that do not fall to any
specific category under Careers belong to this category. This also includes web pages
that have three or more Careers categories.
WEB-CAT-35 Kids Sites that do not fall to any specific category under Kids belong to this category. Also Allow
WEB-CAT-37 Login Screens Web pages that are used to login to a wide variety of services where the actual service is Allow
unknown, but could be any of several categories (like Yahoo and Google login pages).
WEB-CAT-38 Marijuana Sites that promote or sell marijuana products. No longer combined with drugs as it is legalBlock
in many states.
WEB-CAT-39 Military Sites sponsored by or devoted to the armed forces. This typically refers to the ownership Allow
and/or funding of the web page in a similar way to Government Sponsored, however,
private companies, non-profits, and newspapers that are 100% or nearly 100% dedicated
to the armed forces should also be categorized as Military in addition to any other
applicable categories. Examples are Air Force, Marines, Navy, etc.
WEB-CAT-47 Peer-to-Peer (P2P) Sites that provide peer-to-peer (P2P) file sharing software. Note that this does not apply Block
to online repositories of files for download over P2P, but only to the P2P software itself
and any company that provides that software. Examples are emule fileswire, file sharing
software, frostwire, etc.
WEB-CAT-48 Personal Sites & Blogs are a format for individuals to share news, opinions, and information about Allow
Blogs themselves in a date-stamped web log and they are inevitably written in the first-person.
Personal pages are web pages about an individual or that individuals family (also written
in the first-person). May be combined with other categories when the blog focuses mainly
on a single topic such as politics. These sites are typically written in the first person. This
category is incompatible with Community Forums and the social networking categories.
Examples are about me, blog, wordpress etc.
WEB-CAT-49 Pets Sites that do not fall to any specific category under Pets belong to this category. Also Allow
includes web pages that have three or more Pets categories should be under this
category.
WEB-CAT-50 Philanthropic Charities and other non-profit philanthropic organizations and foundations dedicated to Allow
Organizations altruistic activities intended to increase the quality of life for groups or individuals.
Excludes incest support and divorce support. Also includes web sites that rate and review
charities or act as conduits for online donations to selected charities. Examples are
charitable giving, fund raisers, disaster reliefs, etc.
WEB-CAT-51 Photo Sharing Sites that host digital photographs or allow users to upload, search, and exchange photos Allow
and images online. Also includes galleries or albums of photos hosted on businesses or
personal websites. Includes also online photo printing where photographs may be
uploaded and ordered as prints. Examples are photo album, photo gallery, photo sharing
etc.
WEB-CAT-53 Private IP Address Private IP addresses are those reserved for use internally in corporations or homes. Allow
Includes link-local self-assigned zero-conf addresses. Web Analysts should not use this
category. Examples are self-assigned IP, private IP, etc.
WEB-CAT-54 Professional Social networking sites intended for professionals and business relationship building. Allow
Networking These sites are generally more accepted in the workplace than standard social
networking websites. Examples are professional networking, professional networking
tools, etc.
WEB-CAT-55 Real Estate Sites that do not fall to any specific category under Real Estate belong to this category. Allow
Also includes web pages that have three or more Real Estate should be under this
category.
WEB-CAT-56 Religion Sites that do not fall to any specific category under Religion belong to this category. Also Allow
includes web pages that have three or more Religion categories should be under this
category.
WEB-CAT-57 Remote Access Sites that provide remote access to private computers or networks, internal network file Block
shares, and internal web applications. Examples are VPN, SSL, team viewer, etc.
WEB-CAT-58 Science Sites that do not fall to any specific category under Science belong to this category. Also Allow
includes web pages that have three or more Science categories should be under this
category.
WEB-CAT-59 Search Engines Sites primarily intended to search the Internet and find other web pages. Excludes Image Allow
Search and Engines under Shopping group. Includes also white pages, yellow pages,
and business search directories whether global or local. Examples are business listings,
find people, people finder etc.
WEB-CAT-60 Security Risk Sites security risks are pervasive and can pose a direct threat to business availability. A Block
risk management site is essential for managing vulnerabilities and other risks.
WEB-CAT-61 Security Risk - Ad Block
Fraud Sites that are a security risk because ad fraud detected.
WEB-CAT-68 Security Risk - Sites security risks are pervasive and can pose a direct threat to business availability. A Block
Hacking risk management site is essential for managing vulnerabilities and other risks.
WEB-CAT-69 Security Risk - Sites security risks are pervasive and can pose a direct threat to business availability. A Block
Malware Call-Home risk management site is essential for managing vulnerabilities and other risks.
WEB-CAT-70 Security Risk - Sites security risks are pervasive and can pose a direct threat to business availability. A Block
Malware Distribution risk management site is essential for managing vulnerabilities and other risks.
Point
WEB-CAT-71 Security Risk - Sites security risks are pervasive and can pose a direct threat to business availability. A Block
Phishing/Fraud risk management site is essential for managing vulnerabilities and other risks.
WEB-CAT-72 Security Risk - Spam Sites security risks are pervasive and can pose a direct threat to business availability. A Block
sites risk management site is essential for managing vulnerabilities and other risks.
WEB-CAT-73 Security Risk - Sites security risks are pervasive and can pose a direct threat to business availability. A Block
Spyware & risk management site is essential for managing vulnerabilities and other risks.
Questionable
Software
WEB-CAT-74 Shareware & Sites that offer licensed download on software for evaluation, after which a fee will be Allow
Freeware requested for continued use. It also includes companies offering free use of their software
for life. Examples are free software downloads, trialwires, free trial software, demoware
etc.
WEB-CAT-77 Sports Sites that do not fall to any specific category under Sports belong to this category. Also Allow
includes web pages that have three or more Sports categories should be under this
category.
WEB-CAT-78 Streaming & Sites with repositories of music or that provide streaming music or other audio files that Allow
Downloadable Audio may pose a bandwidth risk to companies. Examples are internet radio, mp3 downloads,
shoutcasts, etc.
WEB-CAT-79 Streaming & Sites with repositories of videos or that provide in-browser streaming videos that may Allow
Downloadable Video pose a bandwidth risk to companies. Examples are flv, movie downloads, streaming
movies, etc.
WEB-CAT-80 Technology Sites that do not fall to any specific category under Technology belong to this category. Allow
Also includes web pages that have three or more Technology categories under this
category. Examples are design web templates, robotics, cloud computing software,
drones, etc.
WEB-CAT-81 Telecommuting Pages that depict working remotely. Employees do not need to commute to a central Allow
place of work. Examples are remote work, telework, home-based jobs, etc.
WEB-CAT-82 Tobacco Sites that promote or sell tobacco products such as cigarettes, cigars, shisha, and chew. Allow
Cannot be combined with any other category under Adult group.
WEB-CAT-83 Trading & Investing Sites assisting in investing, trading, stock and share dealing fall under this category. Allow
WEB-CAT-84 Translation Translate sites from one language to another. Examples are translator site, language Allow
translator, translator, online language translator, etc.
WEB-CAT-85 Travel Sites that do not fall to any specific category under Travel belong to this category. Also Allow
includes web pages that have three or more Travel categories should be under this
category. Examples are Uber, Lyft, GrabCar, public transportation, etc.
WEB-CAT-86 Unreachable/No Only use this category when the browser gives an error, such as Network Timeout. Allow
Content
WEB-CAT-87 Utilities Sites that include tips, information and guide to computer utilities such as disk backup, Allow
etc. Examples are disk performance, system utilities, PC performance tools, etc.
WEB-CAT-89 Web Conferencing Sites that provide information, guide, and research on net conferencing. Examples are Allow
web conferencing, online meeting, video conference etc.
WEB-CAT-90 Web Hosting, ISP & Web hosting and blog hosting sites, Internet Service Providers (ISPs), and Allow
B2Telco telecommunications (phone) companies. Examples are ISP, internet access, cable
modem, etc.
The Netskope Client will generate notifications in the form of popups when a policy violation is found.
There are two types of end-user notifications:
Block notifications: make the user aware that the traffic is blocked.
User Alert notifications: inform the end user that a potentially risky activity has been detected and
allow the end user to proceed after typing a justification.
The look and feel of the notifications can be customized and the message can be used to coach the user
to use a sanctioned SaaS application or Internet website.
When a user does some activity that is against <customer>’s policy, the following will happen:
Block notifications – SaaS traffic: a Netskope client popup will appear just above the user’s system tray
notifying the user of the violation and the user will be redirected to the last page browsed in the SaaS
application right after the user click the notification button.
User Alert notifications – SaaS traffic: Should <customer> decides to use it, a Netskope client popup will
appear just above the user’s system tray notifying the user of the violation. The user will have the options
of stopping the action of typing a justification and proceeding. If the user decides to stop the action, the
user will be redirected to the last page browsed in the SaaS application.
The block and end-user notification templates can be configured in the Netskope WebUI’ section ‘Policies
> User Notification’.
The Netskope Directory Importer will be deployed on a 64-bit Windows server. The specifications for the
VM are as follows:
Item Specification
Processor 2 CORES
RAM 4 GB
Disk 100 GB (Dynamic Provision)
Network 1 IP address required for network connectivity
Domain Joined Yes
Location <enter dacaenter location>
● 64 bit Windows machine running either Windows 7, Windows Server 2008 R2 or Windows Server
2012/2016
For the Netskope Directory Importer the following account and permissions are needed.
<enter <Get value from Tenant > Settings 443 Outbound For uploading AD attributes to
hostname> > Tools > Directory Tools> the Netskope Tenant
Maximum Bandwidth:
50 Mbps
100 Mbps
150 Mbps
250 Mbps
Netskope data centers, hardware, software, and processes are secure, redundant, meet the most
rigorous standards and deliver the high performance.
Netskope maintains all global data center infrastructure configured with a high availability (HA)
architecture using Global Traffic Management (GTM) and regional disaster recovery (DR) sites and
continues to expand adding additional regional Points of Presence (POPs). Full POPs are backed up to a
designated regional POP location. Micro POPs only host the Netskope data plane systems and are also
used as regional Full POP backup locations. All of the POPs are configured with GTM, and should any
POP be unavailable user traffic is automatically directed to the next closest available POP.
At the time of onboarding and provisioning Netskope services, customers can select one of Netskope’s
Full POPs as their designated “Home” POP. Through this designation, the customer is assured that all
user data and metadata generated by Netskope is stored only in the selected Home POP location and the
corresponding DR POP for backups. Currently, each customer can select only a single Home POP
location per Netskope tenant.
Netskope does not store cloud service data on its systems or in its data centers
Netskope processes cloud service data in memory only. Data residency for this data is dependent on
the cloud application provider, i.e. Office 365, Box, Amazon, etc., and the enterprise infrastructure
and account data residency configurations for these services. Once data residency is defined for a
cloud service, Netskope policies can be configured to manage the cloud service’s use and DLP rules
to enforce the organization’s data residency requirements.
User ID (both enterprise User ID and any other alias the user used to login to Netskope and various
cloud applications)
Service (Application) Name
Service (Application) Instance
Category
Cloud Confidence Level (enterprise-readiness score)
DLP Profile and Rule triggered
Data Classification
Policy Name
Activities
Device
OS
Browser or Native Client Used
Device Classification
File Object (like file name or email subject)
Bytes Uploaded
Netskope does not use client metadata or share client metadata with third parties for any purposes
outside of the Netskope CASB service.
Netskope has certified its privacy practices and controls with TRUSTe and the EU-US Privacy Shield
programs.
Alerts 90 or 365
Analytics (Daily Summary) 90 or 365
Alert Summaries (Hourly and Daily Summaries) 90 or 365
Application Events 90 or 365
Audit Events 90 or 365
Dashboard 90 or 365
Page Events 7 or 365
Reports (Daily Summary) 90 or 365
Admins can also be kept from viewing sensitive data by creating custom roles which applies to Events,
Introspection, Reports, Incident Management and Malware functional areas. Below fields can be
obfuscated:
TERM REFERENCE
Netskope Admin Guide Admin Guide
11 Decision Points
Below are various decision points which were discussed and agreed upon during the course of
deployment and weekly meetings.