Getting Started
Getting Started
The following articles provide guidance for using Netskope products.
- About the Admin Console
- Deployment Options
- Quick Start
- Secure Tenant Configuration and Hardening
- Microlearning Video Library
- Netskope Security Cloud Features
- Netskope Success Resource Center
Articles
- About the Admin Console
- Deployment Options
- Quick Start
- Access the Admin Console
- Create Local Administrators
- Integrate an Identity Provider (IdP)
- Check Firewall Policy
- Bypass Netskope from your VPN
- Configure a Steering Profile
- Add Bypasses in Netskope
- Configure Netskope Client Settings
- Deploy the Netskope Client
- Allowlist the Netskope Client
- Validate Traffic Steering
- Create and Validate a Security Policy
- Next Steps
- Secure Tenant Configuration and Hardening
- Microlearning Video Library
- Netskope Security Cloud Features
- Netskope Success Resource Center
- Vendor Risk Assessment
- Observe Cloud App Activities (OPLP) and Risk Insights
- CASB API Protection
- Understanding API Protection
- API (Observe for Managed App Activities)
- Create a list of publicly accessible documents in an API-Protected service
- Create a list of externally shared documents stored in an API-Protected service
- Create a list of private documents stored in an API-Protected service
- Create a list of executable or other files stored in an API-Protected service
- Create a list of users with most public files stored in an API-protected service
- Create a list of users with non-expiring links to files stored in an API-Protected service
- Create reports on activity or incidents in an API-Protected service
- API (Monitor for Managed App Activities)
- Alert when a file is shared with large number of users (internal/external)
- Alert when a file is shared with specific groups
- Investigate specific external user activity to determine risk posture
- Investigate specific internal user activity to determine risk posture
- Identify and act on individual files or folders on a case by case basis
- Alert when a file is made public
- Alert when a file is externally shared
- API (Protection for Managed App Activities)
- DLP – Protect state for Managed App Activities
- Create a DLP policy to search an entire data repository and apply predefined labels per Enterprise data classification rules
- Create a policy to identify sensitive data in specific locations (public, external or non-approved groups)
- Create a policy to alert or block sharing of sensitive data with external Teams
- Create a policy to find encrypted or password protected files
- Create and apply a legal hold policy if required
- Threat Protection – Protect state for Managed App Activities
- Cloud Inline Protection
- Inline monitoring for Cloud apps
- Apply policies based on AD users, groups, or OU
- Apply policies based on the source of traffic
- Apply policies based on the source of traffic, trusted, or untrusted networks
- Apply policies based on the source of traffic, forward, or reverse proxy
- Apply policies based on the application instance
- Apply policies based on the constraint profile
- Apply policies to enforce step up authentication as required
- Analyze user activity, such as uploads or posts, in cloud apps that create or shares content
- Analyze and report on using corporate credentials on non-sanctioned apps
- Inline protection of Cloud apps
- Allow access to a sanctioned instance of a supported corporate app
- Allow access to a sanctioned application based on app tag
- Block risky activities to Unsanctioned/non-IT purchased apps
- Block risky activities to Low / Poor CCL apps
- Alert/block upon detection of password protected files
- Coach users away from unsanctioned applications and allow justification of required use
- Inline monitoring for Cloud apps
- Unmanaged Device Protection
- IaaS
- SWG Web traffic
- Advanced Threat Protection
- Protect against unknown malicious websites
- Protect against unknown web threats
- Protect against viruses and malicious files
- Protect against network-based attacks
- Protection against Insider threats
- Protect against Unmanaged S3 access
- Shadow IT – Identifying unsanctioned AWS accounts using Skope IT
- Shadow IT – Identifying unsanctioned AWS accounts using Advanced Analytics
- Control AWS apps using Instance IDs