Docy

Extended RBI

Extended RBI

Important

Extended RBI requires additional licensing. Contact Support to enable this feature in your account.

The Extended RBI feature covers additional risk scenarios which are not included in Targeted RBI, i.e. additional web categories and unsanctioned cloud apps which do not require full isolation.

Extended RBI protects the browsing activity and browser for corporate users accessing unsanctioned cloud apps and websites.

Notice

The current list of Web Categories and Web Apps available for use with Extended RBI is a subset of what’s available for policies.

Extended RBI allows admins to leverage additional policy matching criteria including:

  • Policy matching based on “cloud apps” definition, to set up isolated browsing session for users as they browse the unsanctioned cloud app
  • Additional web categories in your RBI policies to isolate webpages: e.g. webmail, social, cloud storage
  • CCL – Cloud Confidence Level
  • App Tags – e.g. unsanctioned app
  • Destination Country
  • Up to 25% of the processed NGSWG traffic

Web Categories

Notice

The current list of Web Categories and Web Apps available for use with Extended RBI is a subset of what’s available for policies.

The following web categories are available to isolate unsanctioned web apps:

Chat, IM & other communication

Professional Networking

Cloud storage

Social

Webmail

Application Suite*

Tip

*Application suite is required to support log in for some of the apps in scope, which belong to cloud app suites, where log in domains have their own category (e.g. Live accounts, Google accounts).

Extended_RBI_web_cats.jpg

Cloud Apps

Notice

The current list of Web Categories and Web Apps available for use with Extended RBI is a subset of what’s available for policies.

Cloud app matching is available for narrow matching criteria (isolating the app) for the following 18 cloud apps and associated web categories.

Web CategoryCloud App
Chat, IM & other communication
  • WhatsApp
Cloud Storage
  • WeTransfer
  • Box
  • Dropbox
  • Google Drive
  • Microsoft OneDrive
  • iCloud Drive
  • Microsoft Office 365 OneDrive for Business
Professional Networking
  • LinkedIn
Social
  • Facebook
  • Twitter
Web mail
  • Google Gmail
  • Outlook Live (OWA)
  • Yahoo Mail
Application Suites
  • Google accounts
  • Microsoft Live accounts
  • Microsoft accounts
  • Yahoo accounts
Extended_RBI_Cloud_Apps.jpg

Additional Policy Criteria

The additional policy criteria are available to use:

  • App Tag (Unsanctioned only): Sanctioned is not supported and the action will revert to “Alert” if used.
  • CCL
  • Destination Country
Extended_RBI_Policy_Criteria.jpg

Extended RBI Use Cases

Use cases and recommended configurations are described in the sections below.

1- Safely enable web access to unsanctioned cloud apps in a certain web category

Sanctioned apps in these web categories are controlled by CASB controls. Protect endpoint and leverage RBI templates settings to augment data protection capabilities in the isolated session e.g. printing, copy, paste, read-only, uploads, downloads.

Use_Case_1.jpg

2 – Safely enable access to potentially risky apps in a web category, based on CCL

Leverage Netskope’s CCI database to isolate low level confidence apps. e.g. Allow (excellent), Block (poor), Isolate (low CCL). Use RBI as an additional protection and an alternative to block access.

Use_Case_2.jpg

3 – Safely expand access to web pages in a potential risky destination country

RBI Provides additional protection of a user’s privacy because the browser has no context of the user and exposes RBI egress IPs. Actual source IP, endpoint details are not uncovered. This is ideal for research.

Use_Case_3.jpg

4 – Define Fine grain Isolation policies: Isolate specific cloud apps

Ability to go beyond isolation based on category matching, with no need to define exceptions or create custom URL lists for custom categories.

Leverage Netskope’s Cloud App definition to create RBI policies to only isolate your risky app. User browsing is isolated only in the application domain boundaries.

Use_Case_4.jpg

5 – Disable clipboard pasting in unsanctioned apps to reduce data leakage

Disabling clipboard paste in the isolated sessions prevents users from pasting corporate information into these unsanctioned apps. This setting augments Data Protection and does not require activity detection or DLP matching.

6 – Provide Read Only access to personal webmail

Some of the most popular webmail apps are unsanctioned (personal use) apps such as: Gmail, Outlook Live (personal) or Yahoo mail. All of these are not corporate.

Admins can leverage RBI templates to configure policies for certain apps to only allow text input in the login domain. Access to the rest of the webmail app is read-only:

  • Any embedded threat is not executed in the browser
  • No data can be leaked as text input
  • File uploads are disabled
Use_Case_6.jpg
Share this Doc
In this topic ...