Netskope Cloud Exchange
Netskope Cloud Exchange
Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture. CE consumes valuable Netskope telemetry and external threat intelligence and risk scores, enabling improved policy implementation, automated service ticket creation, and exportation of log events from the Netskope Security Cloud.
CE is run as an extensible platform with core code and plugins that are installed inside a Linux Docker environment maintained by each user.
CE comes with four primary feature modules that can be turned on or off as needed: Log Shipper, Ticket Orchestrator, Threat Exchange, and Risk Exchange. This document describes how to install the Netskope CE stack.
To learn about the Cloud Exchange release updates, go to Netskope Cloud Exchange Release Notes.
Click play to learn how to set up Cloud Exchange.
- Cloud Exchange Supported Integrations
- About Cloud Exchange
- Install Cloud Exchange
- Get Started with Cloud Exchange
- Operating Cloud Exchange
- Log Shipper Module
- Ticket Orchestrator Module
- Threat Exchange Module
- Risk Exchange Module
- Cloud Exchange Troubleshooting
Articles
- Cloud Exchange Supported Integrations
- About Cloud Exchange
- Install Cloud Exchange
- Install Cloud Exchange on Ubuntu
- Install Netskope Cloud Exchange with AWS ECS Fargate
- Install Netskope Cloud Exchange using Helm Chart on K8s/OpenShift
- Install Netskope Cloud Exchange on a Red Hat Enterprise 8.x Linux Host
- Upgrading to the Latest Version of Cloud Exchange
- Backup Cloud Exchange
- Backup MongoDB Data
- Generate and Install SSL Certificates in Cloud Exchange
- Get Started with Cloud Exchange
- Configure Netskope Tenants
- Configure the Netskope Plugin for Log Shipper
- Configure the Netskope Plugin for Ticket Orchestrator
- Configure the Netskope Plugin for Threat Exchange
- Configure the Netskope Plugin for User Risk Exchange
- Configure the Netskope Plugin for Application Risk Exchange
- Using Beta Plugins
- Explore the Dashboards
- Cloud Exchange Setup Videos
- SSO Configuration
- Cloud Exchange SSO with Azure AD
- Cloud Exchange SSO with Okta
- SSO Access for Netskope Support
- Operating Cloud Exchange
- Log Shipper Module
- Configure 3rd-party Log Shipper Plugins
- AWS S3 WebTx Plugin for Log Shipper
- AWS S3 Events, Alerts Plugin for Log Shipper
- AWS CloudTrail Lake Plugin for Log Shipper
- AWS Security Lake Plugin for Log Shipper
- Amazon Security Lake Plugin for Log Shipper
- CrowdStrike LogScale Plugin for Log Shipper
- Microsoft Azure Sentinel Plugin for Log Shipper
- Microsoft Azure Monitor Plugin for Log Shipper
- Microsoft Azure Storage Plugin for Log Shipper
- Microsoft Defender for Cloud Apps Plugin for Log Shipper
- Chronicle Plugin for Log Shipper
- Elastic Plugin for Log Shipper
- Google Cloud Storage Plugin for Log Shipper
- Google Cloud SCC Plugin for Log Shipper
- QRadar Plugin for Log Shipper
- Rapid7 Plugin for Log Shipper
- Secureworks Plugin for Log Shipper
- Syslog and WebTx Plugins with Splunk for Log Shipper
- Syslog Plugin for Log Shipper
- WebTx Plugin for Log Shipper
- Kafka Plugin for Log Shipper
- Bitsight ThirdPartyTrust Plugin for Log Shipper
- Update Configured Log Shipper Plugins
- Manage Log Shipper Business Rules
- Configure Log Shipper SIEM Mappings
- Log Shipper Syslog Mapping
- Configure 3rd-party Log Shipper Plugins
- Ticket Orchestrator Module
- Threat Exchange Module
- Configure 3rd-party Threat Exchange Plugins
- AWS GuardDuty Plugin for Threat Exchange
- Carbon Black Plugin for Threat Exchange
- CrowdStrike Plugin for Threat Exchange
- Digital Shadow Plugin for Threat Exchange
- GitHub Plugin for Threat Exchange
- Mandiant Plugin for Threat Exchange
- Microsoft Office 365 Endpoints Plugin for Threat Exchange
- Microsoft Defender for Cloud Apps Plugin for Threat Exchange
- Microsoft Defender for Endpoint Plugin for Threat Exchange
- Mimecast Plugin for Threat Exchange
- MISP Plugin for Threat Exchange
- Palo Alto Networks Panorama Plugin for Threat Exchange
- Proofpoint Plugin for Threat Exchange
- SentinelOne Plugin for Threat Exchange
- ServiceNow Plugin for Threat Exchange
- Skyhigh Plugin for Threat Exchange
- Sophos Plugin for Threat Exchange
- STIX/TAXII Plugin for Threat Exchange
- ThreatConnect Plugin for Threat Exchange
- ThreatQ Plugin for Threat Exchange
- Trend Micro Vision One Plugin for Threat Exchange
- API Source Plugin for Threat Exchange
- Cybereason Plugin for Threat Exchange
- Feedly Plugin for Threat Exchange
- Illumio Plugin for Threat Exchange
- SecurityScorecard Plugin for Threat Exchange
- View Configured Threat Exchange Plugins
- Update Configured Threat Exchange Plugins
- Manage Threat Exchange Business Rules and IoC Sharing
- Configure your Netskope Tenant for Threat Exchange File Hash Sharing
- Manage Tags
- Threat Exchange Custom Plugin Developers Guide
- Configure 3rd-party Threat Exchange Plugins
- Risk Exchange Module
- User Risk Exchange Workflow
- Configure 3rd-party User Risk Exchange Plugins
- Azure AD Plugin for User Risk Exchange
- BeyondCorp Plugin for User Risk Exchange
- CrowdStrike Falcon Identity Protection Plugin for User Risk Exchange
- Crowdstrike Plugin for User Risk Exchange
- Crowdstrike Plugin for User Risk Exchange
- Okta Plugin for User Risk Exchange
- Proofpoint Plugin for User Risk Exchange
- Mimecast Plugin for User Risk Exchange
- Security Advisor Plugin for User Risk Exchange
- Plugin Activity
- Manage User Risk Exchange Business Rules
- View Application Risk Exchange Business Rules
- Manage Configured User Risk Exchange Actions
- List Users/Hosts and Use Filter Options
- Edit User and Host Scores
- Action Logs
- Configure 3rd-party User Risk Exchange Plugins
- Application Risk Exchange Workflow
- Configure 3rd-party Application Risk Exchange Plugins
- View Application Risk Exchange Configured Plugins
- Perform Actions on Application Risk Exchange Configured Plugins
- View Application Risk Exchange Business Rules
- Create Application Risk Exchange Business Rules
- Perform Actions on Application Risk Exchange Business Rules
- Map an Application Risk Exchange Business Rule to a Target
- Manage Application Risk Exchange Configured Sharing
- List Applications and Use Filter Options
- Delete Risk Exchange Applications
- User Risk Exchange Workflow
- Cloud Exchange Troubleshooting