Omitir para ir al contenido principal
  • Hacer pedidos rápida y fácilmente
  • Ver pedidos y realizar seguimiento al estado del envío
  • Cree y acceda a una lista de sus productos
Es posible que algunos números de artículo hayan cambiado. Si esto no es lo que está buscando, intente buscar todos los artículos. Buscar artículos

Netskope API Data Protection Overview

Resumen: Learn about Netskope API Data Protection. Netskope API Data Protection provides policy and access control, risk anomaly forensics, and data governance.

Este artículo se aplica a Este artículo no se aplica a Este artículo no está vinculado a ningún producto específico. No se identifican todas las versiones del producto en este artículo.

Instrucciones

The following sections walk you through each key benefit of API Data Protection and how to get the most out of your API Data Protection policies.


Affected Products:

  • Netskope

Netskope API Data Protection has different actions and options available depending on the application being protected. The actions that are taken operate in a set order. For more information, click the appropriate option.

Actions may be configured to take place once a policy is triggered. Netskope supports the following actions:

  • Alerts: Generates alerts on the SkopeIT > Alerts page when the policy matches.
  • Change Ownership: Designates the administrative owner of files and folders for which the policy is applied.
  • Encrypt: Allows you to encrypt a file if it matches policy criteria. Encryption must be enabled in your tenant instance to use this feature. Contact support if you do not see this as an action in the policies. For more information, reference How to Get Support for Netskope.
  • Quarantine: Allows you to quarantine a file if a user uploads a document that has a data loss prevention (DLP) violation. This moves the file to a quarantine folder for you to review and take appropriate action (allow the file to be uploaded or block the file from being uploaded).
  • Legal Hold: Preserves all forms of relevant information when litigation is reasonably anticipated. You can choose to have a copy of the file that is saved for legal purposes if it matches policy criteria.
  • Forensic: Allows you to apply a forensic profile that marks policy violations and then stores the file in a forensic folder.
  • Azure Rights Management: Azure Rights Management Services (RMS) is a cloud-based service which uses encryption, identity, and authorization policies to secure Microsoft files like Word, Excel, Microsoft PowerPoint, and more. The RMS action applies an RMS template to a Microsoft Office file uploaded in OneDrive or SharePoint.
  • Expire Externally Shared Links: Sets an expiration in days for files with publicly shared links.
Table 1: Possible actions for each supported cloud app
Cloud App Alerts Change Ownership Encrypt Quarantine Legal Hold Forensic RMS Expire Externally Shared Links1
Gmail Yes No No No No No No No
Google Cloud Platform Yes No No No No No No No
AWS (S3) Yes No No No No No No No
Box Yes No Yes Yes Yes Yes No Yes
Cisco WebEx Teams Yes No No No No No No No
Dropbox Yes No Yes Yes No No No No
Egnyte Yes Yes Yes No No Yes No No
GitHub Yes No No No No No No No
Google Drive Yes Yes Yes Yes Yes Yes No No
Microsoft Azure Blob Storage Yes No No No No No No No
Microsoft OneDrive Yes No Yes Yes Yes Yes Yes No
Microsoft SharePoint Yes No Yes Yes No No No No
Microsoft Outlook Yes No No No No No No No
Salesforce unstructured data (files) Yes No No No Yes No No No
Salesforce structured data (Chatter messages and posts) Yes No No No Yes No No No
Slack Team Yes No No No Yes2 No No No
Slack Enterprise Yes No No Yes Yes2 No No No
ServiceNow Yes No No No No No No No
Workplace by Facebook Yes No No No No No No No

1You can configure the number of days for which you want the link to expire. This is useful for externally shared files and public files.
2Slack for Team/Enterprise Legal Hold action is applicable to files only.

Depending on the app, there are different options available to restrict a publicly or externally shared file.

Table 2: Restriction options for each supported cloud app
Cloud App Restrict Access to Owner Restrict Access to Internal User Restrict Access - Remove Individual Users Restrict Access to Specific Domain Restrict Access - Remove Public Links Restrict Access - Remove Organization Wide Link Restrict Collaborators to View-only Permission Restrict Access - Allow External Domains
Gmail No No No No No No No No
Google Cloud Platform No No No No No No No No
AWS (S3) No No No No No No No No
Box Yes Yes No Yes Yes No Yes1 Yes
Cisco WebEx Teams No No No No No No No No
Dropbox Yes Yes No Yes Yes No No Yes
Egnyte Yes Yes No Yes Yes No No Yes
GitHub No No No No No No No No
Google Drive Yes Yes No Yes Yes No Yes Yes
Microsoft Azure Blob Storage No No No No No No No No
Microsoft OneDrive Yes No Yes No Yes Yes Yes No
Microsoft SharePoint Yes No Yes No Yes Yes Yes No
Microsoft Outlook No No No No No No No No
Salesforce unstructured data (files) No No No No No No No No
Salesforce structured data (Chatter messages and posts) No No No No No No No No
Slack Team No No No No No No No No
Slack Enterprise No No No No No No No No
ServiceNow No No No No No No No No
Workplace by Facebook No No No No No No No No

1Box does not directly support the view only action. To support this action, the file is locked and the permissions of all the collaborators in the Box folder are set to Previewer Uploader access level so that the collaborators cannot unlock the file.

Table 3: More restriction options for each supported cloud app
Cloud App Restrict Access - Blocklist External Domains Restrict Collaborators - Disable Print and Download DLP Threat Protection Audit1 Delete Retroactive Scan
Gmail No No Yes No No No No
Google Cloud Platform No No No No No No No
AWS (S3) No No Yes Yes No No Yes
Box Yes Yes2 Yes Yes Yes Yes Yes
Cisco WebEx Teams No No Yes No No Yes No
Dropbox Yes No Yes Yes Yes Yes Yes
Egnyte Yes No Yes Yes Yes No Yes
GitHub No No No No Yes No No
Google Drive Yes Yes Yes Yes Yes Yes Yes
Microsoft Azure Blob Storage No No Yes Yes No No Yes
Microsoft OneDrive No No Yes Yes Yes Yes Yes
Microsoft SharePoint No No Yes Yes Yes No Yes
Microsoft Outlook No No Yes No No No No
Salesforce unstructured data (files) No No Yes Yes Yes No Yes
Salesforce structured data (Chatter messages and posts) No No Yes Yes Yes No Yes
Slack Team No No Yes No No No No
Slack Enterprise No No Yes No Yes Yes No
ServiceNow No No Yes No No No Yes
Workplace by Facebook No No Yes No Yes Yes3 No

1The audit action generates audit logs/events for supported apps. You can view the audit logs/events on the SkopeIT page of the Netskope UI.
2Box does not directly support the disable download action for certain users. To support this action, the file is locked along with the disable download action enabled.
3The delete action for Workplace by Facebook applies to group posts and comments. This action does not apply to chat messages.

Note: The disable download action disables download for collaborators who have the view permission. For collaborators with the edit permission, the download remains enabled.

For multiple policies with different actions, Netskope performs all the actions applicable to the notification in the following order:

  1. Threat Quarantine
  2. Threat Alert
  3. Alert/Data Loss Prevention (DLP) Alert
  4. Revoke
  5. Legal Hold
  6. File Classification
  7. Disable Download
  8. Restrict to View
  9. Restrict Access
  10. Expire Link
  11. Delete
  12. RMS
  13. Information Rights Management (IRM)
  14. Quarantine
  15. Encrypt
  16. Change Ownership
  17. Block Access

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Información adicional

   

Productos afectados

Netskope
Propiedades del artículo
Número del artículo: 000130755
Tipo de artículo: How To
Última modificación: 26 ago 2024
Versión:  12
Encuentre respuestas a sus preguntas de otros usuarios de Dell
Servicios de soporte
Compruebe si el dispositivo está cubierto por los servicios de soporte.