Skip to main content

Netskope Help

Configure the Netskope Plugin for Threat Exchange

This document explains how to configure the Netskope integration with the Cloud Threat Exchange module of the Netskope Cloud Exchange platform. This integration allows for sharing of event driven intelligence that has been identified by Netskope.

Prerequisites

To complete this configuration, you need:

  • A Netskope Tenant (or multiple, for example, production and development/test instances) that is already configured in Cloud Exchange.

  • A Secure Web Gateway subscription for URL sharing.

  • A Threat prevention subscription for malicious file hash sharing.

  • A Netskope Cloud Exchange tenant with the Threat Exchange module already configured.

Workflow
  1. Create a File profile and a Malware Detection profile.

  2. Configure a Real-Time Protection policy.

  3. Configure the Netskope plugin for Threat Exchange.

  4. Configure Threat Exchange Business Rules and Sharing for the Netskope plugin.

  5. Validate the Netskope plugin.

  1. In your Netskope tenant, go to Policies > Profiles > File and click New File Profile.

    image22.png
  2. Select File Hash. In the drop down select SHA256.

    image7.png
  3. Enter a temporary value in the text field. Netskope does not support proceeding without having a value in this field, and we recommend using as a string of 64 characters that consist of the character f, this will have a very low possibility of matching a valid file format. For example, ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff.

    image15.png
  4. Click Next.

  5. Enter a Profile name and description. Do not have spaces in your profile name; use underscores instead for spaces.

    image8.png
  6. Click Save.

  7. To use this profile in a policy, click Apply Changes on the top right of the screen.

  1. In your Netskope tenant, go to Policies > Threat Protection > Malware Detection Profile and click New Malware Detection Profile.

    image28.png
  2. Click Next.

  3. For this example, create this list as a block list (click through Allow options). Netskope does support inclusion of both allow and block lists in the Malware Detection profiles.Click Next.

  4. Select the File Profile that you created previously.

    image29.png
  5. Click Next.

  6. Enter a name for the Malware Detection profile.

    image32.png
  7. Click Save Malware Detection Profile.

  8. To use this profile in a policy, click Apply Changes on the top right of the Screen.

  1. In your Netskope tenant, go to Policies > Real-time Protection. The policy configuration is just an example. Modify as appropriate for your organization.

  2. Click New Policy and then select Cloud App Access.

    image20.png
  3. For Source, leave the default as User = Any.

  4. Click Category

  5. The window expands to allow you to search for and select the option All Categories.

    image3.png
  6. Click outside of this list to close the search dialog.

  7. For Activities & Constraints, click Edit.

  8. Select Upload and Download.

    image17.png
  9. Click Save.

  10. For Profile and Action, click Add Profile dropdown select Threat Protection Profile.

  11. Click in the new Threat Protection Profile box and it will open up a list of available profiles.

  12. Choose the Threat Profile you created previously.

    image13.png
  13. Adjust the Action: Alert to reflect Action: Block for each of the Severity options.

    image2.png
  14. In the Set Policy text box, enter a descriptive Policy Name.

    image16.png
  15. Click Save button on the top right of the screen.

  16. Choose To the top option when it is presented.

  17. To publish this policy into the tenant, select Apply Changes on the top right of the Screen.

  1. Log in to your Cloud Exchange tenant.

  2. Go to Settings and click Plugins.

  3. Select the Netskope (CTE) box to open the plugin creation page.

    image12.png
  4. Enter a Configuration Name that is meaningful. Plugins serve two purposes: the first is to connect the Cloud Exchange to the respective data resource, and the second is to provide a bucket to hold the indicators which the Threat Module collects. This configuration name will represent this bucket name.

    image25.png
  5. For Tenant, select your Netskope tenant.

    image10.png
  6. Click Next.

  7. Ensure that Enable Polling is Yes.

  8. Change the Type of Threat data to Both.

    image19.png
  9. Click Save.

  1. Select Business Rules from the Navigation Bar inside the Threat Exchange Module.

    image4.png
  2. Click on Create New Rule, add the Rule Name and click on Save.

    image1.png
  3. The created business rule will be seen in the UI.

    image21.png
  1. In Threat Exchange, go to Sharing.

  2. Click Add Sharing Configuration.

  3. Add a Source Configuration, Business Rule, and Destination Configuration.

  4. For the Target, there are two options:

    • Add to URL List

    • Add to File Hash List

    Depending on your use model, perform one of the two following steps.

    1. For Add to URL List, select a List Name from the dropdown. If a new List is to be created, choose Create new list in List name and add a new name. Add a URL List Type, List Size, and Default URL.

      image5.png
    2. For Add to File Hash List, enter a List Name and List Size.

      image23.png
  5. Click Save to start Sharing.

    image14.png

In order to validate the workflow you must have Netskope Alerts and/or another system’s events. This example shows how to use Carbon Black Cloud Events. Polling Intervals will be defined during plugin configuration.

  1. In Threat Exchange, go to Threat IoCs

    image26.png
  2. In your Netskope tenant, go to Policies > Profile and select your custom File Profile (In case of File hash list sharing) Then click on File Hash

    image27.png
  3. In your Netskope tenant, go to Policies > Profiles, select Web (n case of URL list sharing), and then click URL Lists.

    image24.png
  4. If data is not being brokered between the platforms, you can look at the audit logs in Cloud Exchange. In Cloud Exchange, select Audit and look through the logs for errors.

    image31.png
  5. In your Carbon Black Console, go to Enforce > WatchLists, select your custom Watchlist, and then on Reports.

    image30.png