Configure Directory Importer
Configure Directory Importer
Directory Importer connects to all the domain controllers (DC) selected in the Select Domains dialog box if the selected Directory Service is Active Directory; otherwise, Directory Importer connects to the LDAP server configured and periodically fetches users and groups information to post that info to your tenant instance in the Netskope cloud. If you are using DPoP and/or the Netskope Client, you can utilize user and group membership information to send invites for Netskope Client installation and to configure cloud app policies.
– If accounts have been Disabled but not deleted in Active Directory, it can also be deleted from the Netskope tenant; if required (optional feature, please contact support to get this enabled).
To watch a video about how you can use email identifiers to import users, click play.
When the Netskope Adapters open, the first tab displayed is for Directory Importer.

The options in this tab are:
Userinfo URL
The URL to synchronize user info with the Netskope cloud. This URL can be obtained from Settings > Tools > Directory Tools in the Netskope tenant UI.
Directory Settings
Directory Settings inncludes the following options:
Directory Service
Includes the following options:
Active Directory
Directory Importer automatically detects all of the domains in the forest and starts fetching information. The Select Domain button opens this dialog box so you can select any domains you want to include.

Active Directory V2 (AD v2)
While Active Directory queries all data from the domain forest, it may adversely affect query performance. The AD v2 option improves query performance by querying only the changed users or groups from all the domains. The use of AD v2 is dependent on the following:

-
LDAP Server Capability: 1.2.840.113556.1.4.417(LDAP_SERVER_SHOW_DELETED_OID) ([MS-ADTS]: LDAP_SERVER_SHOW_DELETED_OID ).
-
uSNChanged (USN-Changed attribute – Win32 apps ) attribute.
-
ADImporter service account credentials: Requires admin privileges with the following access:
-
Read permission to all the OUs where the users or groups resides.
-
Read access to the deleted objects.
Adding read permission of “Deleted Objects“ for specific users
-
-
Login to any domain controller in the domain with a user account that is a member of the domain admins group.
-
Go to Start > Run and type cmd.
-
Type the following command: dsacls <deleted_object_dn> /takeownership where, deleted_object_dn is the distinguished name of the deleted directory object.
For example: dsacls “CN=Deleted Objects,DC=gng,DC=local” /takeownership
-
Type the following command to grant permission to view objects in the Deleted Objects container to a user or a group: dsacls <deleted_object_dn> /G <user_or_group>:<Permissions> where, deleted_object_dn is the distinguished name of the deleted directory object and user_or_group is the user or group for whom the permission applies, and Permissions is the permission to grant.
For example: dsacls “CN=Deleted Objects,DC=gng,DC=local” /G GNGuser1:LCRP
Run this command for each domain in the forest, before configuring the user for service command.When an Organizational Unit (OU) is renamed in Active Directory, the distinguishedName (DN) attribute of all objects (users, groups, and so on) within that OU changes to reflect the new OU name. The distinguishedName is a critical attribute in AD that uniquely identifies the object in the directory, and it includes the object’s full path in the directory hierarchy.
For example, if you have an OU named ‘Technology’ under the domain example.com, and you rename it to ‘Technology & Transformation’, all users and groups in that OU will have their DN updated to reflect the new organizational path (OU= Technology & Transformation,DC=example,DC=com).The uSNChanged (Update Sequence Number) is an attribute used by AD to track changes to objects in the directory. Active Directory V2 relies on this attribute to track changes done in the AD environment. When an OU is renamed, the DN of all objects within that OU (users, groups, etc.) is updated to reflect the new name of the OU. However the uSNChanged attribute of the objects in that OU (for example, users and groups) is not updated. Hence Active Directory V2 fails to identify these objects as changed. This leads to inconsistencies in the data between AD and Netskope.
When OU is renamed, distinguishedName of its child users and groups are impacted. Any Active directory updates impacts attributes like (distinguishedName , member, memberOf ) attributes of child users and groups and its parent groups and members(in case child is a group object) without updating the uSNChanged of it.
As a workaround, make some dummy update on the impacted users/groups to update the uSNChanged on the active directory.
If the number of impacted users and groups is known and less in number, you can avoid resync by just updating the uSNChanged of specific users and groups by doing some dummy update to the user/group in the active directory by modifying the description attribute of specific impacted users/groups.
Sample powershell command which can help as reference for this purpose. Following sample command updates all the user object in a OU.Get-ADUser -Filter * -SearchBase "OU=Technology & Transformation,OU=Service Lines,OU=Users,DC=DOMAIN,DC=LOCAL" -properties StreetAddress,Description | foreach-object {Set-ADUser $_ -ExtensionAttribute1 ($_.Description)}
Other Directory Services
Directory Importer connects to the LDAP server specified in the Directory Attributes dialog box, and then starts fetching all the user and group information. Click Set Attributes to open this dialog.

-
Server Name: Port Host name or IP Address and Port number of the LDAP directory server.
-
Base DN: Directory root from which the Directory Importer starts the search for users.
-
Username: The username for the account with rights to read data from the directory server.
-
Password: The password for the username account entered above.
-
Use Paged Search: Enables a paged search if the directory server supports it.
-
Page Size: The page size to be used for search.
-
Test Connection: After all of the above information is entered, click this button to test the connection and validate the username. On successful, validation, Directory Importer would try to fill User Information, Group Information and OU Information with the class names and attribute names found in the directory schema.
-
User Information, Group Information and OU Information: The class and attribute names required by Directory Importer to read user information by directory server. If the equivalent attribute names differ in other directory servers from that of Active Directory, you can select the appropriate value from the dropdown lists. When you hover the cursor over an attribute names, the meaning of the attribute is displayed in a popup message.
Connect to Directory Server using SSL
When selected, Directory Importer uses LDAP to connect to a directory server, and communications between Directory Importer and other servers are encrypted.
Filter Options
Filter Options includes the following:
Include
When selected, users that are part of the selected Groups or Domains are exported.
Exclude
When selected, users that are part of the Groups or Organizational Unit other than the ones in the filter are exported.
None
No filtering is applied while searching for users (Include & Exclude options are disabled when you select this option). All the users and their groups in the selected scope are uploaded to your tenant instance in the Netskope cloud.
LDAP Query
Select LDAP Query to open this dialog box, which enables filtering on LDAP queries. After enteing a query, click Test LDAP Query to ensure it works.

Groups
Select Groups to open this dialog box, which contains the names of the directory groups. If specific groups are moved to the right side, details of the users that belong to these groups will be exported to your tenant instance in Netskope cloud. As of release 37.0, nested groups are supported.

Organization Unit (OU)
Select Organization Group to open this dialog box, which contains the names of OUs. If specific OUs are moved to the right side, only details of the user and associated groups that belong to these OUs will be exported to your tenant instance in the Netskope cloud.

Dynamic Groups
Select Dynamic Groups to open this dialog box, which has the options to specify an LDAP query to create a dynamic groups.

Advanced Settings
This includes the following options:
-
User Info Collect Interval: Enter the interval in minutes that the user details are exported to your tenant instance in the Netskope cloud.
-
Log Level: Select the granularity and detail level of logs written to the files specified in the Log File Path location. Log levels represents the severity of the message. There are four different log levels, ERROR, WARNING, INFO and DEBUG.
-
Proxy Settings: Use when an explicit proxy is present in the Directory Importer to Netskope cloud traffic flow.
By default, Directory Importer uses the proxy settings for the user for which the Directory Importer service is installed to communicate with the Netskope Cloud. Alternatively, you can define a proxy setting to be used for Directory Importer that communicates with the Netskope cloud.
-
Use Internet proxy settings of the Directory Importer user: Uses the proxy settings defined for the user account for which Directory Importer service is installed.
-
Use PAC file script: Uses the proxy settings defined by the PAC file from the URL entered here.
-
Proxy Server: Uses the explicit proxy server address and port number entered here.
-
-
Manageability: Stops AD Importer synchronization and sends the tenant admin a notification if the percentage of users deleted exceeds the number specified.
-
Additional User Attributes: When Directory Importer contacts an AD or LDAP Server, in addition to getting the standard user information, it also reads the custom attributes added here. Like other information, added, modified, or deleted custom attributes are also sent periodically to the provisioner.
-
Send User Identity for Proxy Chaining: Select when the Netskope proxy chaining feature is used to steer traffic from the enterprise Bluecoat proxy to Netskope.

Log File Path
Shows the system location where the Directory Importer sends corresponding Netskope logs.
Status
Shows the status of the selected component.
Service Name
Shows the name of the active Directory Importer.