A Netskope incident is any action that falls outside of normal operations as outlined by a Netskope administrator, either using custom or prebuilt profiles. Netskope breaks these incidents out as data loss prevention (DLP) incidents, anomalies, compromised credentials, or files that have been quarantined or placed in a legal hold status.
Affected Products:
Netskope
Not applicable.
For more information about incidents, click the appropriate option.
The DLP page contains information regarding DLP incidents in your environment.
The DLP page provides this information about each DLP incident:
The Anomalies page provides information about the various types of detected anomalies.
There are three Anomalies page categories. For more information, click the appropriate category.
The Summary page shows total anomalies, anomalies by risk level, and anomalous dimensions (percentage per category). There are also tables that show anomalies per profiles and users. A query field may be used to search for specific anomalies. The Summary page also contains filters for anomalies by risk level, all or new, or based on a specific profile.
Click By Profile to view the number of anomalies detected for each type, along with the latest timestamp. Only the profiles for anomalies that are detected are shown.
Click By User to view how many anomalies each user has, along with the risk level distribution. Click an item to open the details page for specific information about profiles or users.
The Details page shows more specifics about anomalies. All or specific anomalies may be acknowledged from this page. A query field may be used to search for specific anomalies. The Details page also contains filters for anomalies by risk level, all or new anomalies, or anomalies based on a specific profile.
The information that is found on the Details page includes:
Click an item to view detailed risk, application, and user information. To remove one or more of the anomalies, enable the checkbox next to an item and click Acknowledge, or click Acknowledge All.
The Configure page allows you to enable or disable the tracking of anomaly profiles and configure how anomalies are monitored.
To configure a profile, click the pencil icon in the Configuration column. To configure the applications, click Select Applications. Click Apply Changes to save your configurations.
Available profiles:
Profiles | Usage |
---|---|
Applications | Configure the applications that you want to perform anomaly detection. |
Proximity Event | Configure the distance (in miles) between two locations, or time (in hours), for when the location change happens. In addition, you can allowlist trusted network locations, allowing you to identify your trusted networks and fine-tune the proximity anomaly detection. |
Rare Event | Configure a time period for a rare event in number of days. |
Failed Logins | Configure count of failed login and the time interval. |
Bulk Download of Files | Configure count of files that are downloaded and the time interval. |
Bulk Upload of Files | Configure count of files that are uploaded and the time interval. |
Bulk Files Deleted | Configure count of files that are deleted and the time interval. |
Data Exfiltration | Enable or disable transfer or retrieval of data from a computer or server. |
Shared Credentials | Configure allowing or disallowing shared credentials using time intervals. |
The Compromised Credentials dashboard informs you about known compromised credentials for the accounts that are used by your employees.
The Compromised Credentials dashboard includes:
To remove one or more of the compromised credentials, enable the checkbox next to an item and click either Acknowledge or Acknowledge All.
The Malware page provides information about malware that is found in the environment.
The Malware page includes:
Click an item on the page to see more comprehensive details or to quarantine, restore, or mark the file as safe.
The Malicious Sites page allows you to see what potentially malicious sites endpoints are going to.
The information that is shown on this page includes:
The Quarantine page shows a list of quarantined files.
The Quarantine page has the below information about the quarantined file:
You can take actions on each of the quarantined files. Select the checkbox beside a quarantined file, and on the bottom-right, click:
The Legal Hold page contains a list of files that are placed in legal hold.
The Legal Hold page has the below information about the file that is placed in legal hold:
You can take actions on each of the legal hold files. Select the checkbox beside a legal hold file, and on the bottom-right, click either:
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.