Skip to main content

Netskope Help

Configure Netskope to Access your Office 365 OneDrive App

In the previous section, the Netskope API Data Protection app was installed in your Office 365 environment. This final part of the installation instruction describes how to integrate your Microsoft Office 365 OneDrive app instance.

To authorize Netskope to access your Microsoft Office 365 OneDrive account:

Important

Before configuring the Microsoft Office 365 OneDrive app instance, note down the fully qualified domain name (FQDN) of your Microsoft Office 365 account. For example, if you use https://domain-my.sharepoint.com to login, then domain-my.sharepoint.com is the instance name.

  1. Log in to the Netskope tenant UI: https://<tenant hostname>.goskope.com and go to Settings > API-enabled Protection > SaaS.

  2. Select the Microsoft Office 365 OneDrive for Business icon, and then click Setup Instance.

  3. The Setup Instances window opens. Enter the following details:

    1. For instance name, enter the fully qualified domain name (FQDN) of your Microsoft Office 365 account. For example, if you use https://domain-my.sharepoint.com to login, then specify domain-my.sharepoint.com as the FQDN in the app instance field.

      Note

      To find the FQDN of your Microsoft Office 365 account, log in to your Microsoft Office 365 account and then:

      1. Click the launch icon.

      2. Click the OneDrive app.

      3. Copy the FQDN text (remove the "https://" and the path after the FQDN text “/“)

        O365_OD_FQDN.png
    2. If your organization supports Microsoft Office 365 multi-geo, enable the multi-geo check box. To check if you organization supports Microsoft Office 365 multi-geo, see Microsoft Office 365 Multi-Geo Support.

      Important

      If the Microsoft Office 365 account is multi-geo and you fail to enable the multi-geo check box and do not install the v2 apps in the central and satellite locations, you may run into inaccurate file and user listing.

      Important

      • If you enable multi-geo, enter the FQDN of any one of the geo locations of the Microsoft Office 365 multi-geo account in the Instance Name field in the above step. On enabling multi-geo, Netskope monitors the central and satellite locations of your Microsoft Office 365 account.

      • If you intend to monitor a single location, you should uncheck the multi-geo checkbox, and enter the FQDN of the central location or satellite location in the Instance Name field in the above step. However, only the single instance of the entered FQDN will be monitored.

    3. For instance type, select the appropriate features from the following options:

      • API Data Protection: Select this option to allow Netskope to scan through your SaaS app instance to list files, user, and other enterprise data.

      • Quarantine: Select this option to quarantine a file if a user uploads a document that has a DLP violation. This moves the file to a quarantine folder for you to review and take appropriate action (allow the file to be uploaded or block the file from being uploaded). For more information to set up quarantine, see Quarantine Profile.

      • Legal Hold: Select this option if you would like to preserve all forms of relevant information when litigation is reasonably anticipated. You can choose to have a copy of the file saved for legal purposes if it matches policy criteria. For more information to set up legal hold, see Legal Hold Profile.

      • Malware: Select this option to detect malware in files, emails, attachments, chat messages, posts etc. For more information to set up malware, see Creating a Threat Protection Policy for API Data Protection.

      • Forensic: Select this option to apply a forensic profile that flags policy violations and then stores the file in a forensic folder. For more information to set up forensic, see Forensics.

        Important

        Based on Microsoft's latest Terms of Service, Netskope can no longer support OneDrive as a forensic destination. Due to this, Netskope will not support this feature in any new commercial or federal Netskope DC. Fine prints:

        • For existing customers who are using OneDrive as a forensic destination, the feature will continue to work as expected.

        • For new customers, the instance setup UI for OneDrive will no longer have the forensic checkbox. New forensic OneDrive instances cannot be enabled.

        • For existing customers who have not enabled OneDrive as a forensic destination, cannot enable it going forward.

        • Existing customers using OneDrive as a forensic destination, can disable the forensic checkbox from the UI. However, once disabled, you cannot re-enable it.

          For learn more: Deprecation Notice for OneDrive as a Forensic Destination.

        As an alternative, Netskope recommends to use a public cloud storage (like Azure Blob, AWS S3, or GCP Cloud Storage) as a forensic destination over a SaaS storage app. For more information, see Forensics.

      • Security Posture: This option allows Netskope to continuously scan through your SaaS app to identify and remediate risky SaaS app misconfigurations and align security posture with best practices and compliance standards. This is a read-only checkbox. To enable security posture for OneDrive, configure the Microsoft 365 app under Settings > API-enabled Protection > SaaS.

        Note

        This feature is part of the Netskope SaaS Security Posture Management solution. For additional configuration requirement, read Next Generation SaaS Security Posture Management.

    4. Enter your Office 365 global administrator email address. 

      Note

      • Netskope recommends creating a temporary global administrator account for this purpose. To do so, log in to your Microsoft Office 365 admin center and create a user with a global administrator role. Later, you can either delete or downgrade this account to a non-global administrator account.

      • If the service account is expiring or there is a change in the admin role email address, you can edit this email address after setting up the app instance.

    5. Enter a list of internal domains. Important points to note:

      Note

      • Verified domains (in Office 365 tenants, their statuses are displayed as “healthy” and “possible service issues”) provisioned in the Office 365 tenant need not be added to the internal domain list. These domains will be automatically treated as internal by API Data Protection. However, the following domains can be added during the grant time if they need to be treated as internal by API Data Protection:

        • domains that are unverified (status displayed as “incomplete setup”) in the Office 365 tenant.

        • domains that are not provisioned in the Office 365 tenant.

        A sample example of Office 365 domains is as follows:

        Log in to your Microsoft Office 365 Admin Center, then navigate to Settings > Domains.

        O365_Internal_Domains.png
      • Ensure that you add the internal domains at grant time. Adding internal domains post-grant will require a re-grant, and will not mark the existing external users and files as internal even if the users and files are part of the internal domain.

      • For internal domains, wildcard DNS entries are not allowed.

  4. Click Save, then click Grant Access for the app instance you just created.

    After clicking Grant Access, you will be prompted to log in with your global administrator username and password, and then Accept the permissions and click Close.

    O365_New_Permissions.png

    The Netskope Activity Feeds for Microsoft OneDrive enterprise app is installed in Azure AD with additional permissions once you grant the Microsoft Office 365 OneDrive for Business app. Going forward, the Microsoft Office 365 OneDrive for Business app instance will utilize the new Graph and Office 365 Management APIs from Microsoft.

    Note

    If you are setting up an app instance for the first time on a new Microsoft Office 365 account, the grant may fail. Microsoft has recently disabled apps using an Azure Access Control (ACS) app-only access token by default. If so, follow the steps located here to grant access successfully.

  5. Refresh your browser, and you should see a green check icon next to the instance name.

    Important

    After granting access, make sure you log in to https://login.microsoftonline.com/ from a browser at least once with the email address you added in step 3d. This step is mandatory so that Netskope can make successful API calls with the Microsoft Office 365 account.

Next, you can downgrade the global administrator account.