Skip to main content

Netskope Help

Identify Malware in data repositories and action per defined policy

Prerequisites for the API protection use cases

Roles/actors in the use cases

  • Tenant creation 

  • User accounts created

  • CASB API Protection connected to CSP (Cloud Service Provider)

  • CSP (Cloud Service Provider) administrator

  • Cloud governance team

  • Security Analyst

To enable malware scan in data repositories which are API protected services, follow the steps shown below:

  1. Navigate to Settings > Threat Protection > API enabled protection.

  2. Under Settings, click ‘Edit’ and select the options for actions to be taken based on severity of the malware.

  3. Enable the Malware scans for instances of the API protected services.


Edit Settings:


To learn more: Understanding API Protection