Configure Microsoft 365 SharePoint for the Next Generation API Data Protection

Configure Microsoft 365 SharePoint for the Next Generation API Data Protection

To configure Microsoft 365 SharePoint (Commercial & GCC High) for the Next Generation API Data Protection, follow the instructions below.

Microsoft 365 OneDrive (commercial) and SharePoint (commercial) apps are now available on the Next Generation API Data Protection platform. Please note the following important points:
  • If you currently use the classic version of Microsoft 365 OneDrive and SharePoint apps, no action required. You should continue to use the classic version that you use today. Netskope will notify you via a banner message on the Netskope tenant UI when you can switch over to the Next Generation apps.
  • If you currently do not use the classic version of Microsoft 365 OneDrive and SharePoint apps, Netskope will make these apps available to you in phases. To check if these apps are available on your Netskope tenant, follow the instruction below:
    1. Log in to your Netskope tenant and navigate to Settings > Configure App Access > Next Gen > CASB API.
    2. Locate the OneDrive or SharePoint apps from the list.
    3. For OneDrive & SharePoint, click either of the apps, then click the SETUP INSTANCE button. Under the Office 365 Environment drop-down, if you see Commercial, you are eligible to configure the app on the Next Generation API Data Protection platform.

If you do not see the apps, stay tuned, the apps will be made available in due course. In the meanwhile, you can continue to set up these apps available under Settings > Configure App Access > Classic > SaaS.

Prerequisites

Before configuring Microsoft 365 SharePoint (Commercial & GCC High) for the Next Generation API Data Protection, review the prerequisite.

  • A global administrator account is required to grant access to Netskope. Post-grant, you can either delete or downgrade this account.

    The way permissions work in Azure/Office 365 is that Netskope requires an administrator to grant enough privileges for Netskope to perform specific actions. Note that the Netskope app does not receive global admin permissions. It only receives permissions for the scope Netskope requests.
  • You must turn on audit logging in Microsoft 365 admin center. To enable audit logging, follow the steps below:

    1. Log in to https://compliance.microsoft.com/.On the left navigation, click Audit.

      If auditing is not turned on for your organization, a banner is displayed prompting you to start recording user and admin activity.

      Enable Audit Logging In Microsoft 365 Admin Center
    2. Click the Start recording user and admin activity banner.

      It may take up to 60 minutes for the change to take effect. After enabling, the first application event contents can take up to 12 hours to show up in Skope IT.
  • If you have guest or external users in your SaaS environment belonging to domains considered internal, you must set the appropriate internal domains for Netskope to classify exposure accurately. To set up internal domains, follow this article.

If you have set up SharePoint sites using Microsoft Loop, Netskope can scan the Microsoft Loop top level site, but not the sub-sites or contents within the Microsoft Loop site. This is because Microsoft API does not provide available permissions for Netskope to scan content within the Microsoft Loop site.

Configure Netskope to Access your Microsoft 365 SharePoint Account

To authorize Netskope to access your Microsoft 365 SharePoint account, follow the steps below:

  1. Log in to the Netskope tenant UI and go to Settings > Configure App Access > Next Gen > CASB API.

  2. Under Apps, select SharePoint and click Setup CASB API Instance.

    The Setup Instance window opens.

  3. Under Office 365 Environment, select either GCC High or Commercial.

    GCC High is designed for U.S. federal, state, and local government customers.
  4. Under Administrator Email, enter the email address of the user who will receive an email notification when a policy violation or event triggers. This step is optional.

  5. Under Instance Name, enter a name of the SaaS app instance. This step is optional and if left blank, Netskope will determine the name of the app instance post grant.

  6. Click Grant Access.

    The Microsoft Login window opens.

  7. Enter the global administrator username and password.

  8. Keep Consent on behalf of your organization unchecked and Accept the permissions.

    SharePoint Commercial

    Justification for Permissions Requested

    Permissions required by NetskopeDescriptionPurposeTrade-off if not allowed
    Sign in and read user profileAllows

    • users to sign-in to the application,

    • the application to read the profile of signed-in users,

    • the application to read basic company information of signed-in users.

    Allows sign-in and to obtain information about signed-in users.Required for sign-in workflows.
    Read directory dataAllows the application to read data in your organization's directory such as users, groups, and applications.Allows Netskope to read users, groups and apps data in the configured OneDrive or SharePoint instance.Cannot obtain user/group-related information and affects subsequent inventory and exposure computations.
    Have full control of all site collectionsAllows the application to have full control of all site collections.Allows Netskope to receive and process permission changes required for core capabilities such as sharing detection, exposure computation and subsequent policy-processing.Without this permission, the Microsoft Graph API would return errors whenever a folder permission changes. These errors cause significant delays in detecting changes and impact next-gen platforms efficacy in tracking exposure changes for folders/files in near-real time.
    Read activity data for your organizationAllows to retrieve information about user, administrator, system, and policy actions and events from Office 365 and Microsoft Entra activity logs via the Office 365 Management Activity API.Allows Netskope to retrieve audit logs and events from Office 365 and Entra activity logs.Cannot provide visibility via Skope IT application events and other UEBA capabilities.
    The Netskope CASB API for OneDrive [GCC High] app now require you to allow the Have full control of all site collections permission. This permission replaces the earlier Read items in all site collections permission. The new permission now allows the following:
    • Policy actions: Allows Netskope to revoke permissions from files that have violated a policy.
    • Activity scan: Allows Netskope to get notifications of the latest and most accurate permission updates for files & folders from the Microsoft Graph API.

    The Netskope CASB API app is installed in Microsoft Entra ID with additional permissions once you grant access to the Microsoft 365 SharePoint app.

  9. After accepting the permissions, you will be redirected to the successful result page. Click Close.

Refresh your browser, and you should see a green check icon next to the instance name.

To identify if the SaaS app instance is GCC High or commercial, a GCC High app instance name will be suffixed by .us.

Post grant, you can either delete or downgrade the global administrator account. To know more: Delete or Downgrade the Global Administrator Account.

Next, you can view the Next Generation API Data Protection Inventory page to get deep insights on various entities on your Microsoft 365 SharePoint account. For more information on the Inventory page, see Next Generation API Data Protection Inventory.

The Inventory page may display entities for the Microsoft 365 SharePoint GCC High version. However, this is still in beta stage.

You can receive audit events and standard user behavior analytic alerts in Skope IT. To know more: Next Generation API Data Protection Skope IT Events.

Next, you should configure a Next Generation API Data Protection policy. To do so, see Next Generation API Data Protection Policy Wizard.

Share this Doc

Configure Microsoft 365 SharePoint for the Next Generation API Data Protection

Or copy link

In this topic ...