Skip to main content

Netskope Help

Application Feature Support

Application Support provides special configuration for particular apps, enabling certain app specific features through a key value pair settings. Currently only Asana, Dropbox, Microsoft Office 365 Suite, and Google Apps are supported, but this feature will be expanded to other apps in the future.

Asana

With this feature, Netskope's Header-insertion capabilities allows Asana to enforce restrictions on workspace access.

To allow traffic to Asana:

  1. In the Netskope UOI, go to Settings > Manage > Application Feature Support.

  2. Click New Key-Value Pair.

  3. Select Asana from the application dropdown list.

  4. From the Key dropdown list select:

    1. ‘Asana-Allowed-Domains-Requester-Id' (1) or

    2. 'Asana-Allowed-Domain-Ids’ (2)

  5. In the Value field, enter the corresponding “Approved Domain IDs” as Values. If admins want to allow only their own domain, the values in (1) and (2) will be the same. If they want to allow multiple domains, (2) will contain multiple values.

  6. When finished, click Save.

Dropbox

This feature enables you to allow or block traffic sent to Dropbox. When the Allow Dropbox Traffic feature is turned on (in Dropbox), the team ID information in the custom header is used to determine whether or not to allow the connection between Dropbox and a user.

To allow traffic to Dropbox:

  1. In the Netskope UI, go to Settings > Manage > Application Feature Support.

  2. Click New Key-Value Pair.

  3. Select Dropbox from the Application dropdown list.

  4. Select Team IDs from the Key dropdown list.

  5. Enter the team name in the Value text field. To add multiple team names, separate them with a comma delimiter.

  6. When finished, click Save.

Microsoft Office 365 Suite

This feature enables you to control the traffic to Office 365 cloud applications. When the Tenant Restrictions feature is enabled on Microsoft Azure AD, the tenant ID information is used to provide tenants access to Office 365 applications.

To allow traffic to Microsoft Office 365 Suite:

  1. In the Netskope UI, go to Settings > Manage > Application Feature Support.

  2. Click New Key-Value Pair.

  3. Select Microsoft Office 365 Suite from the Application dropdown list.

  4. Select Tenant context or Permitted tenant list from the Key dropdown list.

  5. Enter a tenant directory ID if you've selected Tenant context in the previous step.

    Or, enter a comma separated list of tenants if you've selected Permitted tenant list in the previous step.

    Note

    You can find the Directory ID in the Azure Active Directory portal. Sign in as an administrator, select Azure Active Directory, and then select Properties.

  6. When finished, click Save.

Tip

Select the 'Cross-tenant Access Policy' key from the dropdown for 'Microsoft Office 365 Suite' or 'Microsoft Live Suite' and enter the corresponding Values (DirectoryId:<policyGuid>) obtained from Microsoft's Cross Tenant Access Policy (XTAP) APIs.

This allows admins to control the external accounts accessed from their networks and devices.

Google App

This feature enables you to control the traffic to Google cloud applications. When the X-GoogApps-Allowed-Domains header feature is used, the domains listed are allowed to be accessed by a user. For example, add the domains for your corporate domains, like netskope.com. This allows users to access your corporate Google apps, but not personal Google apps. Multiple domains can be listed.

Note

If users are already logged into to YouTube, Meet, Contacts, and Hangouts, Netskope will not be able to block access.

To allow traffic to Google Apps:

  1. In the Netskope UI, go to Settings > Manage > Application Feature Support.

  2. Click New Key-Value Pair.

  3. Select Google App from the Application dropdown list.

  4. Select X-GoogApps-Allowed-Domains from the Key dropdown list.

  5. Enter the domains you want to allow access to in the Value text field. To add multiple domains, separate them with a comma delimiter.

  6. When finished, click Save.