Microsoft and Netskope SSE Coexistence
Microsoft and Netskope SSE Coexistence
Microsoft’s Security Service Edge solution provides a robust set of capabilities to increase security and improve performance of your Microsoft 365 products. Some of these capabilities include:
- Prevent data exfiltration to untrusted tenants.
- Verify users and conditions before giving access to the network.
- Revoke access to Microsoft 365 products when conditions change by using continuous access evaluation.
- Apply location-based conditional access, risk detection, and enhanced activity logs by taking advantage of source IP restoration.
- Protect Microsoft 365 apps against token infiltration and anonymous access.
These capabilities are unique to Microsoft Entra Internet Access for Microsoft 365. You can use these features for Microsoft 365 and use Netskope Security Service Edge (SSE) solution at the same time.
When leveraging Microsoft and Netskope’s Security Service Edge (SSE) solutions in a unified environment, users can harness a robust set of capabilities from both platforms to elevate their SSE journey. The synergy between these platforms empowers customers with enhanced security and seamless connectivity.
This document contains steps to deploy these solutions side-by-side, specifically, Microsoft’s SSE for Microsoft 365 applications, such as Exchange Online and SharePoint Online, and Netskope’s SSE for all other web traffic.
Solutions Tested
Default
- Microsoft SSE configuration: Microsoft 365 traffic is captured. Enable Microsoft 365 traffic forwarding profile, disable Internet Access and Private Access traffic forwarding profiles.
- Netskope SSE configuration: Internet Access traffic is captured. The Microsoft 365 traffic is excluded.
- Microsoft and Netskope clients installed on Windows 10 or 11 Entra joined device.
Netskope Inspect
- Netskope SSE configuration: Microsoft 365 traffic is inspected.
- Microsoft SSE configuration: Enable Microsoft 365 traffic forwarding profile.
Configuration Summary
In Microsoft Entra, you enable the Microsoft 365 traffic forwarding profile and disable the Internet Access and Private Access traffic forwarding profiles. Only Microsoft 365 traffic is captured. In Netskope, you capture Internet Access traffic and exclude Microsoft 365 traffic.
Note
The Clients must be installed on a Windows 10 or Windows 11 Microsoft Entra joined device or Microsoft Entra hybrid joined device.
Microsoft
To configure Microsoft’s SSE for Microsoft 365, follow the steps in this getting started guide for Microsoft Entra Internet Access (Steps 3 and 4 are optional for this testing):
- Enable the Microsoft 365 traffic forwarding profile.
- Install and configure the Global Secure Access Client on end-user devices.
- Enable universal tenant restrictions.
- Enable enhanced Global Secure Access signaling and Conditional Access.
Netskope
To configure Netskope’s SSE for web traffic:
- Create Network location profiles to bypass Microsoft 365 destination IPs and MSFT SSE service IPs.
- Create a Steering Configuration to steer all web traffic to Netskope except Microsoft 365 by adding exceptions for IPs and domains.
- Install the Netskope Client.
Once configurations are complete and clients are installed side by side, verify clients’ connectivity and configurations.
Configuration Steps
Microsoft
Enable Microsoft 365 Traffic Profile
- Sign in to the Microsoft Entra admin center as a Global Secure Access Administrator.
- Go to Global Secure Access (preview) > Connect > Traffic forwarding.
- Select the checkbox for Microsoft 365 access profile.
- Block QUIC traffic with a local firewall rule on your end device: The Global Secure Access Client currently only supports TCP traffic. Exchange Online uses the QUIC protocol for some traffic over UDP port 443 force this traffic to use HTTPS (443 TCP) by blocking the QUIC traffic with a local firewall rule. Non-HTTP protocols, such as POP3, IMAP, SMTP, aren’t acquired from the Client and are sent direct-and-local.
Install and Configure Global Secure Access Client
The most current version of the Global Secure Access Client can be downloaded from the Microsoft Entra admin center.
- Sign in to the Microsoft Entra admin center as a Global Secure Access Administrator.
- Go to Global Secure Access (Preview) > Connect > Client download.
- Select Download Client.
Organizations can install the client interactively, silently with the /quiet switch, or use mobile device management platforms like Microsoft Intune to deploy it to their devices.
- Copy the Global Secure Access Client setup file to your client machine.
- Run the setup file, like GlobalSecureAccessInstaller 1.7.376.1214. Accept the software license terms.
- After the client is installed, users are prompted to sign in with their Microsoft Entra credentials.
- After users sign in, the connection icon turns green, and double-clicking on it opens a notification with client information showing a connected state.
Netskope
Create Network Location Profiles to Bypass Microsoft 365 Destination IPs and MSFT SSE Service IPs
- Go to Policies > Profile > Network Location > New Network Location > Single Object.
- Add these IPs, name them as MSFT SSE Service, and save the network location:
150.171.19.0/24, 150.171.20.0/24, 13.107.232.0/24, 13.107.233.0/24, 150.171.15.0/24, 150.171.18.0/24, 151.206.0.0/16, 6.6.0.0/16
- Repeat steps 1-2 above to add Microsoft 365 IPs and save them as MSFT SSE M365 (Please note that we are working on acquiring additional Microsoft 365 traffic. Refer to M365 URLs and IP address ranges for a complete list):
132.245.0.0/16, 204.79.197.215/32, 150.171.32.0/22, 131.253.33.215/32, 23.103.160.0/20, 40.96.0.0/13, 52.96.0.0/14, 40.104.0.0/15, 13.107.128.0/22, 13.107.18.10/31, 13.107.6.152/31, 52.238.78.88/32, 104.47.0.0/17, 52.100.0.0/14, 40.107.0.0/16, 40.92.0.0/15, 150.171.40.0/22, 52.104.0.0/14, 104.146.128.0/17, 40.108.128.0/17, 13.107.136.0/22, 40.126.0.0/18, 20.231.128.0/19, 20.190.128.0/18, 20.20.32.0/19
- Go to Policies > Profile > Apply Changes on the top right side of your screen.
Create a Steering Configuration to Steer All Web Apps Traffic to Netskope except Microsoft 365
- Go to Settings > Security Cloud Platform > Traffic Steering > Steering Configuration > New Configuration
- Add a name like MSFTSSEWebTraffic, assign to a user group or OU and select “Web Traffic” for the kind of traffic to steer. Leave the configuration disabled and Save.
- Click the newly created configuration MSFTSSEWebTraffic and select Exceptions > New Exception > Destination Locations.
- In this Exception, add MSFT SSE Service and MSFT SSE M365 in Destination Locations, and select the Bypass and Treat it like local IP address options.
- Add exceptions for domains for MSFT SSE service and MSFT M365. Click Exceptions > New Exception > Domains. Add these exceptions:
*.globalsecureaccess.microsoft.com, *.auth.microsoft.com, *.msftidentity.com, *.msidentity.com, *.onmicrosoft.com, *.outlook.com, *.protection.outlook.com, *.sharepoint.com, *.sharepointonline.com, *.svc.ms, *.wns.windows.com, account.activedirectory.windowsazure.com, accounts.accesscontrol.windows.net, admin.onedrive.com, adminwebservice.microsoftonline.com, api.passwordreset.microsoftonline.com, autologon.microsoftazuread-sso.com, becws.microsoftonline.com, ccs.login.microsoftonline.com, clientconfig.microsoftonline-p.net, companymanager.microsoftonline.com, device.login.microsoftonline.com, g.live.com, graph.microsoft.com, graph.windows.net, login-us.microsoftonline.com, login.microsoft.com, login.microsoftonline-p.com, login.microsoftonline.com, login.windows.net, logincert.microsoftonline.com, loginex.microsoftonline.com, nexus.microsoftonline-p.com, officeclient.microsoft.com, oneclient.sfx.ms, outlook.cloud.microsoft, outlook.office.com, outlook.office365.com, passwordreset.microsoftonline.com, provisioningapi.microsoftonline.com, spoprod-a.akamaihd.net
- Ensure that the MSFT SSE configuration is at the top of the list of steering configurations in your tenant, and then enable this configuration.
Netskope Client
Install theTo set up the Netskope Client, there are a lot of options, like tying in Entra ID to create your accounts. Steps can be found here.
For the most basic setup, you can just add your email address to the Netskope Security Cloud Platform.
- Go to Settings > Security Cloud Platform > Netskope Client > Users.
- Add the user’s email address that you want. The User will get an email to set up the Client.
Verify Clients’ Connectivity and Configurations
- After both clients are installed and running side by side and configurations from admin portals are complete, go to the system tray to check that Global Secure Access and Netskope clients are enabled.
- Verify configurations for clients:
- Right-click on Global Secure Access Client > Advanced Diagnostics > Forwarding Profile. Verify that only Microsoft 365 rules are applied to this Client.
- In Advanced Diagnostics > Health Check, ensure no checks are failing.
- Right-click Netskope Client > Client Configuration. Verify steering config and traffic steering type match configurations in the earlier steps. Validate that configuration is up-to-date or update it.
- Right-click on Global Secure Access Client > Advanced Diagnostics > Forwarding Profile. Verify that only Microsoft 365 rules are applied to this Client.
Test Results
Default
- Netskope SSE configuration: Internet Access traffic is captured. The Microsoft 365 traffic is excluded.
- Microsoft SSE configuration: Enable Microsoft 365 traffic forwarding profile, disable Internet Access and Private Access traffic forwarding profiles. Microsoft 365 traffic is captured.
- Access an internet site, like bing.com.
- Sign in to Microsoft Entra admin center and browse to Global Secure Access (Preview) > Monitor > Traffic logs. Validate traffic related to bing.com missing from Global Secure Access traffic logs.
- Sign in to Netskope Cloud Account and browse to Skope IT > Events > Application Events or Page Events. Traffic related to bing.com is present in Netskope logs.
- Access Outlook Online, SharePoint Online and verify traffic is captured by Microsoft SSE. Validate traffic in the Global Secure Access traffic logs
- Validate traffic related to Outlook Online, SharePoint Online, and Teams is not in the Netskope logs.
Troubleshooting
For deeper troubleshooting information, please review this deep dive video: https://youtu.be/-gdaqLAwVt4?si=7c2-mvkR_yhBm5Io.
[Optional] Netskope Inspects Microsoft 365 Traffic
Occasionally customers want to use the single, unified policy engine by Netskope to inspect traffic across all applications, including Microsoft 365. This is especially applicable when customers wish to enforce consistent content management for data protection. To support this, a customer would need to disable the bypass settings to redirect all traffic to Netksope.
- Netskope SSE configuration: Microsoft 365 traffic is inspected.
- Microsoft SSE configuration: Enable Microsoft 365 traffic forwarding profile.
Netskope Inspect Setup
A small change needs to be made to the Steering configuration for Netskope to receive the Microsoft 365 traffic.
- Sign in to Netskope Cloud Account and browse to Settings > Security Cloud Platform > Steering Configuration and click the same configuration name as shown in Netskope client’s Steering Configuration value. (In our case, as shown here, it is Group A.)
- Click Add Steered Item and Cloud Apps.
- Add a Steered Item as shown below and click Add.