What Netskope SWG?

Netskope SWG (Secure Web Gateway) functions as a cloud-based security solution that monitors and controls web traffic by inspecting URLs, analyzing content, and applying policies to detect and block malicious websites, malware, and data leaks

How SWG works

1. Admin creates policies in UI (Eg: browser=Chrome, action=drop) which is passed to Policy Enginer module
2. When packet hits SWG, data is extracted from header (eg: user-agent, browser etc) and a event message is created with fields
3. Event message is passed to policy module, which takes action based on fields from event message
netskope policies

Terms

Term Description
Data Loss Prevention (DLP) Protection Protect sensitive data by detecting and preventing unauthorized data transfers. Can be customized for specific type of data eg: Personally Identifiable Information (PII) or Payment Card Information (PCI).

Policy types in Netskope SWG

Name Description
Bypass Policies Traffic is bypassed from Netskope SWG and is sent direct to the destination. Types of bypass
Steering Configuration This is not a policy But a mode
1. SSL DND (action=bypass): Bypass the traffic donot decrypt
2. SSL Decrypt
ssl bypass policies
Whenever SSL traffic comes to Netskope, there can be 2 modes:
  - Donot decrypt(ByPass). Note (RTP policy evaluation (action=bypass)) can still happen.
  - Decrypt
Real-time Protection Policies matched against pre-defined Categories. Set action based on criteria. For Real time traffic.
Type Description
Bypass Specific Traffic
(action = Bypass)
Policies > RTP > (Source=user/group/OU, Destination=CloudApps(Gdrive), Action=Bypass)
Policies > RTP > (Source=user/group/OU, Destination=Category(Alcohol, Drugs, Abusing), Action=Bypass)
Policies > RTP > (Source=user/group/OU, Destination=AppInstance(), Action=Bypass)
Policies > RTP > (Source=user/group/OU, Destination=Any Web Traffic(Browse/Upload/Download), Action=Bypass)
Egress IP Policy Egress IP: Interface network address that identifies traffic leaving a system or network. Outgoing packet's source IP will be Egress IP of router/gateway. That means all outgoing packets will same same source IP ie of gateway

Egress IP Policy(Netskope): Natskope cloud only accept packets from dedicated(pre configured) Egress IP addresses.
Enterprise Browser Policy (not RBI) Natskope One Enterprise Browser? This is not a seperate standalone browser, rather this is some security features enabled in any browser mkaing it dedicated browser designed for company use. But it uses RBI to render contents on user's device.

Configurations in Netskope

Name Description
Steering Configurations
Settings > Security Cloud Platform > Steering Configuration netskope steering config Controls, which traffic gets steered to Netskope for real-time deep analysis and which traffic gets bypassed.
By default all traffic from tenant is steered to netskope
Traffic is bypassed entirely from Netskope at the device level and is sent direct to the destination. It will never reach the Netskope Cloud.

Cloud Explicit Proxy Netskope

Way to direct traffic from any device to the Netskope Cloud by using a Proxy Auto Configuration (PAC) file configured in browser.
This is orthogonal to nsclient installed on device and sending traffic to Netskope cloud.

When Explicit proxy is useful? When installing the client is not feasible

Proxy Chaining Netskope

Customer will setup a onpremises proxy(netskope or other). User browser will hit onpremises proxy for HTTP requests. onpremises proxy will connect proxy2 on Netskope cloud. And proxy2 will connect to destination server.
Here 2 proxies are present, proxy1(onpremises), proxy2(On netskope cloud), hence its proxy Chaining.
What is proxy server?

How its done?
Configure on-premises proxy to send traffic to Netskope proxy and add Proxy1(onpremises proxy) IP address to allowlist.
Proxy Chaining Netskope

Events

Event is web traffic log which help organization for deeper inspection of packet. The events are designed to provide near real-time insights into web transactions

Types of Events

Event Description
Page Event Detailed logs about web page interactions
App Event Information about cloud application usage
Transaction Event Detailed HTTP web traffic logs, provide granular information about websites users have accessed

Configure Transaction Event:
Settings > Tools > REST API v2 > New Token > Add Endpoint > /api/v2/events/token/transaction_events endpoint > create the API token.

Query Transaction Event
- Netskope retains transaction events for seven days by default if not consumed.
- Transaction events are stored in Google PubSubLite by Netskope ingestion services.
- Once configured, these can be queried at endpoint token/transaction_events.
- subscription/backlog_message_count: Number of messages that have been sent to a PubSubLite subscription
- /td>