What Netskope SWG?

Netskope SWG (Secure Web Gateway) functions as a cloud-based security solution that monitors and controls web traffic by inspecting URLs, analyzing content, and applying policies to detect and block malicious websites, malware, and data leaks

How SWG works

1. Admin creates policies in UI (Eg: browser=Chrome, action=drop) which is passed to Policy Enginer module
2. When packet hits SWG, data is extracted from header (eg: user-agent, browser etc) and a event message is created with <key,value> fields
3. Event message is passed to policy module, which takes action based on fields from event message
netskope policies

Terms

Term Description
Data Loss Prevention (DLP) Protection Protect sensitive data by detecting and preventing unauthorized data transfers. Can be customized for specific type of data eg: Personally Identifiable Information (PII) or Payment Card Information (PCI).

Policy types in Netskope SWG

Name Description
Bypass Policies Traffic is bypassed from Netskope SWG and is sent direct to the destination. Types of bypass
Steering Configuration This is not a policy But a mode
1. SSL DND (action=bypass): Bypass the traffic donot decrypt
2. SSL Decrypt
ssl bypass policies
Whenever SSL traffic comes to Netskope, there can be 2 modes:
1. Donot decrypt(ByPass)
(RTP policy evaluation (action=bypass)) still happens but only with those attributes that can be derived without decrypting the traffic.

2. Decrypt
Real-time Protection Policies matched against pre-defined Categories. Set action based on criteria. For Real time traffic.
Type Description
Bypass Specific Traffic
(action = Bypass)
Policies > RTP > (Source=user/group/OU, Destination=CloudApps(Gdrive), Action=Bypass)
Policies > RTP > (Source=user/group/OU, Destination=Category(Alcohol, Drugs, Abusing), Action=Bypass)
Policies > RTP > (Source=user/group/OU, Destination=AppInstance(), Action=Bypass)
Policies > RTP > (Source=user/group/OU, Destination=Any Web Traffic(Browse/Upload/Download), Action=Bypass)
Egress IP Policy Egress IP: Interface network address that identifies traffic leaving a system or network. Outgoing packet's source IP will be Egress IP of router/gateway. That means all outgoing packets will same same source IP ie of gateway

Egress IP Policy(Netskope): Natskope cloud only accept packets from dedicated(pre configured) Egress IP addresses.
Enterprise Browser Policy (not RBI) Natskope One Enterprise Browser? This is not a seperate standalone browser, rather this is some security features enabled in any browser mkaing it dedicated browser designed for company use. But it uses RBI to render contents on user's device.

Configurations in Netskope

Name Description
Steering Configurations
Settings > Security Cloud Platform > Steering Configuration netskope steering config Controls, which traffic gets steered to Netskope for real-time deep analysis and which traffic gets bypassed.
By default all traffic from tenant is steered to netskope

Steering Exception: We can define exception for particular traffic, this will be bypassed entirely from Netskope at the device level and is sent direct to the destination. It will never reach the Netskope Cloud.
SSL DND Steering Exception
What Traffic is sent to netskope cloud, (Header info:IP,users) are logged.
Then traffic sent to origin server without decryption
Traffic never hits netskope cloud
Use Cases Customer is using other VPN client with netskope client(eg: AnyConnect). nsclient tries to steer traffic to netskope cloud, but customer donot want it Company allows employees to check their bank account information and company donot want to decrypt banking(username, passwords) info

Cloud Explicit Proxy Netskope

Way to direct traffic from any device to the Netskope Cloud by using a Proxy Auto Configuration (PAC) file configured in browser.
This is orthogonal to nsclient installed on device and sending traffic to Netskope cloud.

When Explicit proxy is useful? When installing the client is not feasible

Proxy Chaining Netskope

Customer will setup a onpremises proxy(netskope or other). User browser will hit onpremises proxy for HTTP requests. onpremises proxy will connect proxy2 on Netskope cloud. And proxy2 will connect to destination server.
Here 2 proxies are present, proxy1(onpremises), proxy2(On netskope cloud), hence its proxy Chaining.
What is proxy server?

How its done?
Configure on-premises proxy to send traffic to Netskope proxy and add Proxy1(onpremises proxy) IP address to allowlist.
Proxy Chaining Netskope

XFF

What is XFF Header, why its used?
How to implement in Natskope
1. Browser should be installed with XFF header extension
2. While list Client's public IP on Natskope Tenant UI > Settings > Security Cloud Platform > Explicit Proxy > IP Address Allowlist & User Identity > Add IP Address
3. When presented download root CA cert into browser cert store
4. Set up Proxy in browser. Settings > proxy >

Events

Event is web traffic log which help organization for deeper inspection of packet. The events are designed to provide near real-time insights into web transactions. Types of events:

Page Event

Detailed logs about web page interactions. A Page Event aggregates multiple connections (ads, images, scripts, etc.) that occur when a user visits a single webpage, presenting them as one consolidated event for simpler analysis.

Application Event

Detailed activities within a cloud application, such as uploading, downloading, or logging in, often interpreted by Netskope for "cloud" apps

Alerts

Triggered when traffic matches a defined policy (like DLP or threat protection), indicating a potential security issue.

Network Events

Logs related to network traffic, including Netskope Private Access (NPA) and Cloud Firewall (CFW) activities.

Transaction Event

Detailed HTTP web traffic logs, provide granular information about websites users have accessed
Configure Transaction Event:
Settings > Tools > REST API v2 > New Token > Add Endpoint > /api/v2/events/token/transaction_events endpoint > create the API token.

Query Transaction Event
- Netskope retains transaction events for seven days by default if not consumed.
- Transaction events are stored in Google PubSubLite by Netskope ingestion services.
- Once configured, these can be queried at endpoint token/transaction_events.
- subscription/backlog_message_count: Number of messages that have been sent to a PubSubLite subscription