Creating a Threat Protection Policy for API Data Protection

Creating a Threat Protection Policy for API Data Protection

Netskope can scan files stored in your cloud storage applications for malware. To do this, you must configure the API Data Protection settings and enable malware scanning for your application instances.

Note

API Data Protection now supports scanning files up to 128 MB for DLP and threat protection. The default file size is 32 MB. Contact Netskope support or your sales representative to configure a larger file size for your tenant. A few points to consider before enabling this enhancement:

  • With larger files, there may be an increased end to end latency for policy processing.
  • Plan for a increase in forensic/quarantine/legal hold data store size.

The encrypt policy action does not currently support larger than 32MB files. The action will therefore not work on files larger than 32MB.

Prerequisites

Before configuring threat protection for API Data Protection, ensure you:

  • Enable malware scanning in an API Data Protection app instance. Go to Settings > Configure App Access > Classic > SaaS, and select an existing app instance. In the Edit Setup window, under Instance Type, select Malware. Repeat for all app instances you want to perform malware scanning.
    The Malware option enabled in the Edit Setup window.
  • Create a quarantine profile.
  • Create a remediation profile.

Configure Threat Protection for API Data Protection

To configure threat protection for API Data Protection:

  1. In the Netskope tenant UI, go to Settings > Threat Protection > API-enabled Protection.
  2. Under Settings, click Edit to configure your malware settings. By default, malware remediation profiles are disabled.
  3. In the Edit Settings window:
    • Low Severity Action: Choose the action you want to take for low severity malware. Netskope recommends choosing Alert. Select Remediation Endpoints to use a remediation profile during the scan.
      • Alert: Select to generate a Skope IT alert.
      • Quarantine: Select to quarantine the file. Netskope zips/compresses the password-protected file and notifies the specified users.
    • Medium Severity Action: Choose the action you want to take for medium severity malware. Netskope recommends choosing Alert. Select Remediation Endpoints to use a remediation profile during the scan.
      • Alert: Select to generate a Skope IT alert.
      • Quarantine: Select to quarantine the file. Netskope zips/compresses the password-protected file and notifies the specified users.
    • High Severity Action: Choose the action you want to take for high severity malware. Netskope recommends choosing Quarantine. Select Remediation Endpoints to use a remediation profile during the scan.
      • Alert: Select to generate a Skope IT alert.
      • Quarantine: Select to quarantine the file. Netskope zips/compresses the password-protected file and notifies the specified users.
    • Quarantine Profile: If you chose the Quarantine action, choose the quarantine profile used to store the files infected with malware.

      Note

      You can only use one quarantine profile for a specific app to store the malicious files. For example, if you create a quarantine profile on Box, Netskope will use it to quarantine malicious files for the rest of the app instances with Enable Malware Scan selected (see Step 5).

    • Remediation Profile: If you selected Remediation Endpoints, choose the remediation profile, which leverages endpoint detection and response (EDR) to remediate the malicious file.
    • File ZIP Password: Enter a password for the ZIP file. Netskope quarantines and protects infected files with this password to prevent users from accidentally downloading infected files to their device.
    • Notify: Select who to notify when Netskope quarantines malicious files.
      • Users in quarantine profile: The users or admins specified in the associated quarantine profile.
      • Owner: The owner of the file.
      • Admin: All tenant admins configured for your organization.
      • Collaborators: The collaborators of the file.
    The configured Edit Settings window for API-enabled Protection.
  4. Click Save.
  5. Caution

    Netskope has removed the Malware Instances table under Settings > Threat Protection > API-enabled Protection. Users can avail the same functionality to enable malware from Settings > Configure App Access > Classic > SaaS, enable the malware checkbox under Setup Instance.

    Under Malware Instances, select Enable Malware Scan for the app instances you want to perform malware scanning.
    Enable Malware Scan switch under Malware Instances on the API-enabled Protection page.

You can view scanned malware for your app instances on the malware and malicious sites pages.

Share this Doc

Creating a Threat Protection Policy for API Data Protection

Or copy link

In this topic ...