Best Practice Policies - Inline - Netskope

1y ago
16 Views
2 Downloads
2.82 MB
44 Pages
Last View : 10d ago
Last Download : 3m ago
Upload by : Genevieve Webb
Transcription

Best Practice Policies - InlineFocus: “Real-time Protection” Policy (Not “API Data Protection” Policy)2021 Netskope. All rights reserved.

Agenda Introductions Real-time Protection vs. API Data Protection Policies Preparing Your Organization for Change Structuring Real-time Protection Policies Real-time Protection - Threat Policies Real-time Protection - Utility Policies Real-time Protection - Active CASB Policies Real-time Protection - Web Policies Q&A2021 Netskope. All rights reserved.2

Real-time Protection vs. API Data Protection Policies2021 Netskope. All rights reserved.

Real-time (Inline) vs API Protection (Out of Band) Policies2021 Netskope. All rights reserved.

Real-time Protection Policy Processing is Order specific! Understanding the order of your Real-time Protection policies is important Real-time Protection policies are processed sequentially (Top to Bottom) When traffic matches rule conditions, the action applies (Allow/Coach/Block) withoutfurther processing through the rule base Select the rule position when saving the policy: Top / Bottom / Before / After Drag and drop, or choose the policies to re-order Click Apply Changes to save the order. Policy changes do not take effect until you apply changes.2021 Netskope. All rights reserved.5

Best Practice Policies - General guidelines Remember that rules are processed from the top down in theReal-time Protection policies list Place rules to be applied to individuals or small groups nearthe top of the list. Block with exceptions at the top Use the Filter option to view specific policies– Note : Default allow if no policy is matched2021 Netskope. All rights reserved.

Best Practice Policies - Web Configuration Dynamic Classification– Dynamic classification looks at the textual contents of a page and dynamically determinesthe category for the uncategorized URLs. This feature is turned off by default.–After a page has been dynamically categorized, the classification applies to all of yourtenant instances. The page classification to a category expires every 12 hours so that if anychanges occur to the page, the content is re-evaluated so the chosen category matches thecurrent page content.–Navigate to: “Settings Security Cloud Platform Configuration” Dynamic classification looks at the textual contents of a page and dynamicallydetermines the category for the uncategorized URLs2021 Netskope. All rights reserved.

Real-time Protection Policies - Workflow1.Create a new Real-time Protection Policy2.Select “Add Criteria” to add additional source criteria (such as Access Method)3.Define the Identity (User, Group, OU)4.Specify the Application, Category, App instance (Ex: Box, Cloud Storage, etc.)5.Select “Edit” to specify the Activities & Constraints that need protection/control (Ex: create, delete,share, etc.)6.Select “Add Criteria” to add additional destination criteria (such as App Tagging)7.Choose an action (Alert, Allow, Block, By-Pass, etc.)8.Give the policy a name9.(Optional) Provide a description for this policy10.(Optional) Email Notifications (None, Every Event, 30 mins, 60 mins, 6 hours, 24 hours).2021 Netskope. All rights reserved.8

Preparing Your Organization for Change2021 Netskope. All rights reserved.

Introducing new Inline Policy to an OrganizationEnsuring a Smooth PolicyRoll-Out to your Organization:2021 Netskope. All rights reserved.-Create a DocumentedAcceptable Use Policy(AUP)-Ensure anEscalation/Exception processis in place and followedthroughout the roll outprocess10

TSMMonitoring Phase - Steer traffic to your tenantMonitor: Steer traffic to tenantAlert: alert netskope admins on particularly risky behavior (covered later)Coaching: create policy that will inform users of risky behaviorBlocking: enable policy blocking to enforce company policy2021 Netskope. All rights reserved.11

TSMMonitoring Phase Part 2 - Involve Key Departments As an organization moves from monitoring user traffic to actually alerting andcoaching users on violations, it is important to involve key stakeholders Create SOC / Help Desk processes and inform executives of upcomingchanges–It is important that key departments understand the changes that users (from Executives toIndividual Contributors) will be experiencing–An example of a process for a SOC would be to follow a naming convention like appending[pre-prod] and [prod] to policy names to differentiate policies–Follow a naming convention like [pre-prod] and [prod] policy names to differentiate policiesand filter active channels2021 Netskope. All rights reserved.12

TSMUser Alerting and Coaching Phases - Involve the EntireOrganization In the previous phase, we informed key operational departments of the upcoming changes userswill see while performing their day to day activities Before we actually transition the policies and change the user experience, we need tocommunicate the upcoming change to the entire organization–Create User Awareness Campaign - Very Important to dispel FUD –Note from Executives on new program to ease user lash back for new control.Some customers also create an internal wiki that they link in the user alert to reduce userquestions about new control. Important - Only provide as much detail as needed an no more. Never include actualpolicy logic as this can be used by malicious actors to work around controls.2021 Netskope. All rights reserved.13

TSMBlocking Phase - Real Time Prevention After policies have been in User Alerting and Coaching mode, you will seedrastic changes to user behavior (for the good!). Now it’s time to modifycertain high risk (prevent malware and data loss) and unacceptable (browsinginappropriate websites) activities policies to blocking mode–Ex. Upload of Sensitive document to Cloud Storage App IP - ORG Secret, TS, Design Documents Customer Databases Form data – DD214 member B, Medical Documentation Controlled Documents Offensive and productivity killing web browsing2021 Netskope. All rights reserved.14

Structuring Real-time Protection Policies2021 Netskope. All rights reserved.

Best Practice - Structuring Real-time Protection PoliciesThreat protection policies should block high risk behaviors, such as downloading malware or uploadingsensitive data to an unsanctioned application. More broad access control policies should be towardsthe bottom of the policy.More specific to less specific1.2.3.4.5.6.Threat Protection (High risk)Utility PoliciesRemote Browser Isolation (RBI)CASB (Activity Oriented)Web(Category Based)Netskope Private Access (NPA) Allow list business critical applicationsBlock list predefined high riskcategories and IOCs.Leverage the Netskope REST API tomaintain URL lists. ThreatUtilityRBICASBWeb2021 Netskope. All rights reserved.16

BlockScanAllowThreatUtilityInstance IDAppCategory SanctionedCategory PersonalCASB ToolsCategory UnsanctionedLow / Poor CCLCategory Level PolicyWeb2021 Netskope. All rights reserved.

Real-time Protection - Threat Policies2021 Netskope. All rights reserved.

TSMBest Practice: Threat Policies - Overview2021 Netskope. All rights reserved.19

TSMBest Practice Policies - High Risk CategoriesCreate a custom category to include the predefined high risk categories, Global Deny URL, and securityrisk exception URL ListsIn almost all situations these risk categories should be blocked2021 Netskope. All rights reserved.20

Threat Protection Policy:Block Security RisksSource - AnyDestination - Custom Category that contains allsecurity risk subcategories, parent security riskcategory, global deny url list, and security riskexceptionsActivity - AnyProfile/Action: Block ; Template of your choiceName - Customer Discretion but Naming conventioncan be useful to differentiate between productionand test policies during roll out and tuning. Example- [Test] Threat Protection Policy or- [Threat] Block Security Risk Categories212021 Netskope. All rights reserved.

TSMBest Practice Policies - Threat Protection: File ProfileCustomize your Threat ProtectionProfile, by creating a “File Profile”This will enable you to create additionalcontrols for known good and bad files.Common use cases are: Allow list of business criticalapplications and/or false positives byfile hash, type, object id, file size,and/or encryption Block list of known file types, hashes,and IOCs2021 Netskope. All rights reserved.22

TSMBest Practice Policies - Threat Protection: TP Profile Now you can include your new File FilterProfiles within a new Threat Protection(TP) Profile Creating multiple File Filters allows you tocreate exceptions for different businessunits.2021 Netskope. All rights reserved.23

TSMBest Practice Policies - Threat Protection : Block Malware Source - Any Destination - All Categories (CC) Activity Download & UploadProfile: Custom Malware profile(with File Profiles) or DefaultMalware Scan Set all severities to BlockEmail notification after each event2021 Netskope. All rights reserved.24

TSMBest Practice Policies - Threat Protection: Risk Exception Source : Depending on Business use caseof exceptionDestination: Custom Category (URL list ofexception to the security risk categories)Action : AllowName: [Threat] Allow Security RiskCategory Exception2021 Netskope. All rights reserved.25

Real-time Protection - Utility Policies2021 Netskope. All rights reserved.

TSMBest Practice: Utility Policies - Overview2021 Netskope. All rights reserved.27

TSMBest Practice Policies - Policy Replication SyncWhen a Netskope administrator applies aReal-time Protection policy change in theNetskope UI, those changes arereplicated across the NewEdge dataplane. Replication is generally completewithin five minutes, but there are timeswhere replication can take a prolongedperiod of time.To confirm which policy is active, a usernotification can be configured to informthe administrator which version of thepolicy is currently being applied throughthe POP within the NewEdge data planebeing used.For more information and configurationplease -Policy-Change-Runbook2021 Netskope. All rights reserved.28

TSMBest Practice Policies - DNS over HTTPSDNS over HTTPS is not a supportedprotocol for Netskopesteering(CASB/NGSWG/NPA) andcan be compromised by maliciousactors. Therefore, we need to ensurethat we configure a policy to steerand block this traffic.Source - AnyDestination : Cloud App- DNS Over HTTPS- Do not press “Edit”- Leave as “Any”Action - Block : No notification*This will not prompt the user*2021 Netskope. All rights reserved.29

Real-time Protection - Active CASB Policies2021 Netskope. All rights reserved.

TSMBest Practice: Active CASB Policies - Overview2021 Netskope. All rights reserved.31

Sanctioned Instance - For supported AppsNote: you have to tag the instance before you can set aninstance id policy. instance id ! 'NULL'Source - AnyDestination - Sanctioned App InstanceActivities - All Supported ActionsProfile/Action: AllowTraffic Action - Not SetName - Customer Discretion but Naming convention can beuseful to differentiate between production and test policiesduring roll out and tuning. Example - [Test] Threat ProtectionPolicy322021 Netskope. All rights reserved.

Instance ID Support-P1 Apps Supported - Please work with your TSM to understand the scope-Regularly testing instance efficacyActivities (login, upload, download, post, share, send)-Other activities also should work for instance ID, but we are not regularly testing it.--Activities Not Supported(Browse, Formpost, etc) - These activities for Web tenants withApp and Category Level blocks with no Activities specified in the policy will come into playunless you explicitly define Allow policies for these activities.We add Instance ID to events for 100 apps- These are not regularly tested and may have limited activity support.Malformed instance IDs and/or Minor Instance ID deviations do occur occasionally and will need to be manuallytagged and added to policy while working with support to enhance the product to handle the ever changing natureof these app flows.332021 Netskope. All rights reserved.

Block Non-Corporate Logins to Sanctioned SuiteSource - AnyDestination - Sanctioned App SuiteActivities - All Login ActivitiesFrom User Constraint - Non-Corporate Domains i.e.Not *@netskope.comProfile/Action: BlockTraffic Action - Not SetName - Customer Discretion but Naming conventioncan be useful to differentiate between productionand test policies during roll out and tuning. Example- [Test] Threat Protection Policy342021 Netskope. All rights reserved.

App Tag Based PolicySource - AnyDestination - App Tag - SanctionedProfile/Action:Allow - Download UploadTraffic Action - Not SetName - Customer Discretion but Namingconvention can be useful to differentiate betweenproduction and test policies during roll out andtuning. Example - [Test] Threat Protection Policy352021 Netskope. All rights reserved.

CCL Based PolicySource - AnyDestination - Select All - Predefined CASBCategories or Define Custom Category on CASBCategoriesProfile/Action: Block - UploadName - Customer Discretion but Namingconvention can be useful to differentiate betweenproduction and test policies during roll out andtuning. Example - [Test] Threat Protection Policy362021 Netskope. All rights reserved.

Real-time Protection - Web Policies2021 Netskope. All rights reserved.

TSMBest Practice: Web Policies - Overview2021 Netskope. All rights reserved.38

TSMBest Practice Policies - Block AUP CategoriesBy leveraging the Custom Categories and User Notifications we can block access to inappropriatesites and present the end user with a coaching message.The message presented to the enduser can be customized to containinformation as to why the URL wasblocked and even redirect them tothe AUP.You can also prompt the user toprovide a justification.Add mailto and links so the enduser can open a ticket for FP / TP2021 Netskope. All rights reserved.39

Common Web Categories Used with AUP-Policy Child ild AbuseCriminal ActivitiesPiracy & Copyright TheftChat, IM & other communicationWeb Proxies/Anonymizers2021 Netskope. All rights reserved.

TSMBest Practice Policies - How to configure AUP / UACombine all AUP categories into a custom category, exclude the global allow list and thenleverage this new “Prohibited Websites” category in your Real-Time Protection policies!2021 Netskope. All rights reserved.41

TSMBest Practice Policies - Silent Ad Blocking Block Online Ads with a silent block to reduce advertising noise while not impacting the userexperience.2021 Netskope. All rights reserved.42

TSMBest Practice Policies - Silent Ad Blocking The category must be Online Ads.The activity must be Browse only.If the category is configured for only OnlineAds, Activity is configured for just Browse,then the Block action will have the option toalert with None (No Notification).This rule will block any URL that is classified as an online add and render theHTML around it to ensure the user experience is not negatively impacted.2021 Netskope. All rights reserved.43

HTTP Header Based PoliciesHTTP headers have been very popular among admins whowant to create granular policies based on the value of header.In addition, many SWG prospects who are looking to migratefrom competitors to Netskope have been using header basedpolicies to restrict or allow access to resources. For example,allow access to abc.com only when referred bymycompany.com.Netskope is introducing HTTP header based policies in R81that can read the value of header and enforce the adminconfigured policy. This will help in reducing friction for bothpre and post sales cycles and allow customers to on-boardour product more swiftly. The feature is available for both Weband CASB Inline tenants.2021 Netskope. All rights reserved.44

- An example of a process for a SOC would be to follow a naming convention like appending [pre-prod] and [prod] to policy names to differentiate policies - Follow a naming convention like [pre-prod] and [prod] policy names to differentiate policies and filter active channels Monitoring Phase Part 2 - Involve Key Departments 12 TSM

Related Documents:

The following are the top five new malicious domains that Netskope blocked users from visiting, the top five new phishing domains that Netskope blocked users from visiting, and the top five domains from which Netskope blocked malware downloads. For the second month in a row, an IPFS domain appears in the toplists. Free hosting service

4 OTHER TECHNICAL DATA DIESEL ENGINE SPECIFICATIONS MODEL D226B-3D TD226B-3D WP4 WP6 WP10 WP12 Time 4 stroke Cylinder arrangement V Type, Inline V Type, Inline V Type, Inline V Type, Inline V Type, Inline Bore/Stroke (mm) 105/120 105/130 105/130 126/130 126/155 Displacement (liter) 3.12 4.5 6.75 9

GigaVUE-HC2 and FireEye NX 2400, a inline tool group solution through the FireEye GUI and Gigamon-OS H-VUE. The procedures are organized as follows: FireEye NX 2400 Configuration: Inline Tools Gigamon GigaVUE-HC2 Configuration: Inline Network and Inline Tool Groups. The FireEye GUI procedures focus on FireEye inline block operational mode.File Size: 1MBPage Count: 30

Installing INLINE 5 (continued) 7 Power up the INLINE 5 Adapter. This can be done by connecting the adapter to a Cummins Engine. The INLINE 5 Adapter USB Driver must be installed if using a USB cable to connect through the USB port on the PC. When connecting to the INLINE 5 Adapter for the first time using a USB cable, the Found New Hardware Wizard

Feb 23, 2021 · Google Drive to deliver its payloads. The percentage of malware delivered via cloud apps increased from 48% to 61% in 2020. Attackers use a wide variety of apps to target their victims. In 2020, the Netskope Security Cloud blocked malware hosted in 95 different apps. However, attackers still tend to favor using apps that are popular in the .

Be assured when you buy any Greenheck product, it is a quality product at a competitive price. Plus, we guarantee our SP and CSP fans with a three-year warranty. We are your . SP-B50 x SP-B70 x SP-B80 x SP-B90 x xx SP-B110 xx x x SP-B110ES x SP-B150 x x x x SP-B200 x x x x SP-L50 x SP-L80 x Available Motor Voltage and Cycle Ratings 115V/ 60Hz .File Size: 1MBPage Count: 32Explore furtherHVAC Technical Data Greenheckwww.greenheck.comCSP-A1050-VG Greenheck Partsparts.greenheck.comHVAC Literature Greenheckwww.greenheck.comGreenheck Quick Delivery - Inline Cabinet Fan, Model CSP .quick-delivery.greenheck.comGreenheck Quick Delivery - Inline Cabinet Fan, Model CSP .quick-delivery.greenheck.comRecommended to you b

89 Parker Hannifin Corporation Hydraulic Accumulator Division Rockford, Illinois USA Inline Pulse-Tone Hydraulic Shock Suppressors An Inline Pulse-Tone suppressor is located as close to the pump as possible, usually directly at the pump outlet, to stop pulsations and noise before

The Curriculum and Instruction Department . Mukilteo School District . Independent Daily Reading Goal: To practice reading at your independent reading level. Directions: 1. Read a book at your independent reading level. 2. Have a family member ask you 2-3 questions and discuss the story with them. 2nd Grade Fiction Questions What did you picture as you read this story? What words or phrases .