NSCOA LabGuide v24.02
NSCOA LabGuide v24.02
NETSKOPE CONFIDENTIAL
Version 24.02
Disclaimer
The contents of this course and each of the lessons and related materials, including handouts to participants,
are subject to Netskope Copyright 2024.
This instructional program, including all materials provided herein, is provided without any guarantees from
Netskope.
Netskope assumes no liability or legal action arising from the use or misuse of content or details contained
herein.
Part 1 – Enable API-enabled threat protection for your Dropbox instance ...................................................... 36
Part 2 – Configure a real-time threat protection policy with hash-based allowlists and blocklists................... 41
Part 5 – Verify that the traffic to the configured apps is allowed ...................................................................... 79
1. Browse to https://clients.amazonworkspaces.com/ and download and install the latest client for your OS or
device if you haven’t done so already.
Make sure the ports 4195 TCP and 4195 UDP are open for outside connections from your device. These
ports are required by both the Amazon WorkSpaces client and Amazon WorkSpaces Web Access.
2. Open the Amazon WorkSpaces client and enter the registration code provided by your instructor and click
Register.
3. Once registered, click the Network test icon in the top right of the application and view the results. Confirm
that green checkmarks are displayed for all tests.
On a Mac computer, use the Network command in the Connections menu to run the test.
4. If the results show all green, you can now connect to a remote desktop with Amazon WorkSpaces client.
1. In your Amazon WorkSpace, open a web browser and navigate to the Netskope learning management
system. Click one of the following URLs based on your role:
• Customer: https://netskopeclient.learnupon.com/
• Partner: https://netskopepartners.learnupon.com/
• Employee: https://netskopeacademy.learnupon.com/
3. On the My Courses page, click the Start button on the Netskope Security Cloud Operation &
Administration (NSCO&A) course.
4. In the left navigation pane under Course Contents, select Lab Guide and Lab Files.
5. At the top of the page, click Download Lab Files to download the files to your Amazon WorkSpace. The
files will download as a zip file.
You can now begin working on the labs.
We highly recommend that you perform all labs in Amazon WorkSpaces. Your instructor can more easily
provide assistance when needed, and some of the labs involve files that look like malware or Data Loss
Protection (DLP) violations that may set off alerts within your company’s cybersecurity department.
In this part, you will set up Netskope to access an instance of Dropbox via API. Use your training Dropbox
instance that you were asked to create in the prerequisites to this course.
1. In your Amazon WorkSpace, run a web browser and navigate to the Netskope tenant URL provided by the
instructor.
2. Log in to your training Dropbox account you created as a part of the prerequisites for this training.
If Dropbox asks for a verification code, find the code in your training Google mailbox and complete the
challenge.
3. Open the folder named after your Dropbox user. Throughout the rest of this lab guide, this folder will be
referred to as your personal folder.
5. If you don’t remember your Dropbox Team name, the following steps will walk you through finding your
Dropbox Team name. You will need this information to configure API-enabled protection for your Dropbox
instance in your Netskope tenant.
a. Click your Dropbox user icon and select Settings.
8. On the Settings page, use the left menu to navigate to Configure App Access > Classic and verify that
the SaaS tab is selected.
10. In the Instance Name field, type your Dropbox Team name. (If you followed the naming convention in the
pre-requisites document, your Dropbox Team name is: Dropbox-{your initials})
The Instance Name must match exactly (case-sensitive) with the Team name of your training Dropbox
account.
12. In the Admin Email field, enter the email address you used to sign up for your Dropbox account (your
training Google account, if you followed the instructions in the prerequisites to this training).
You should still be logged in to Dropbox, so no additional authentication should be required. However, if
you are prompted to sign in to Dropbox, please do so.
15. When a new browser window pops up, click Allow to link with Netskope Active Platform.
Next, you will create a DLP policy with a custom DLP profile to match the metadata of APIProtectionLab.docx.
1. Select the browser tab with the main Netskope tenant UI.
5. In the New DLP Rule wizard, click Next to skip Predefined options.
6. On the Custom page, select Case Insensitive from the dropdown menu.
7. In the text field below the dropdown menu, type the following:
internal template
It is a best practice to type case-insensitive match patterns all in one case, usually in lower case.
9. Click Next on the Exact Match and Advanced Options pages to skip over them.
11. On the Security Threshold page, in the Low Severity field, type:
1
13. In the Rule name field, type the following and click Save:
DLP-APIProtectionLab-{Initials}
1. Navigate to Policies > Profiles > DLP again, then click New Profile.
6. In the Profile name field, type the following and click Save:
APIProtectionLab-Profile-{Initials}
2. Verify that the SaaS tab is selected, and that the Classic/Next Gen switch is set to Classic.
You will now validate that your policy is working by uploading APIProtectionLab.docx to your Dropbox instance.
Locate the APIProtectionLab.docx in the APIProtectionLab subfolder of your Lab Files folder. The file type
may appear as Office Open XML Document in Windows Explorer.
4. Wait a few minutes, refresh your page, and try to click the file. The file will no longer be available.
While it usually takes up to 10 minutes to scan and delete the file, system load and queuing could delay
this for some time.
To navigate back to the main menu, click the Netskope logo in the upper-left corner.
It can take up to 20 minutes for the events to display in Skope IT™ > Application Events.
6. Click Add Filter above the table and select Instance ID from the list.
7. In the Instance ID field, type your Dropbox Instance ID and press Enter.
The file doesn’t show in Dropbox Deleted files in the user’s interface because the action is performed by
Netskope Active Platform, rather than the user. You can find this information in the activity log by
navigating to Admin console > Activity.
Lab complete
1. In your Amazon WorkSpace, open a browser window and log in to the Netskope tenant.
3. Under On-prem integration, click Download tools. Downloading of NSAdapters.msi starts automatically.
5. In the Netskope Adapters Setup wizard, leave the Username and Password fields blank.
7. Click Yes in any pop-up messages that are displayed, then click Finish to exit the Setup Wizard.
Check that the OK button is visible at the bottom of the utility window. If it is not, close the utility, increase
the window size of the WorkSpaces client, and run the utility again. If it is not possible to increase the
window size any further, enable the full screen mode through the client menu. Similarly, switch to the full
screen mode if you are accessing your WorkSpace in a web browser.
3. On the Netskope tenant, navigate to Settings > Tools > Directory Tools.
5. Paste the URL into the Netskope Adapters Configuration Utility UserInfo URL field.
7. In the Filter Options section, select Groups. A new window is displayed with all available Active Directory
groups.
8. In the Group / Organization field, type group{X}, where {X} is your student number.
9. Select only your group from the list (for example: Student1 = Group1, Student2 = Group2, and so on).
Ensure that only YOUR group appears in the right pane. If more than one group is displayed in the right
pane, you must move the excess group(s) back to the left pane BEFORE continuing.
If you don’t see the OK button, read the note after step 2 and repeat steps 1–12.
13. In the Netskope tenant, navigate to Settings > Security Cloud Platform > Netskope Client > Groups.
Your group should now be available.
You will now install the Netskope Client on your Amazon WorkSpace.
2. Download NSClient.msi.
Do NOT click the downloaded file. If you accidentally start the installer, close it immediately.
3. In the Netskope tenant, navigate to Settings > Security Cloud Platform > Netskope Client > MDM
Distribution.
4. Scroll down to the Create VPN Configuration section and copy the Organization ID (token).
5. In your Amazon WorkSpace, click the Windows Start button, type cmd, then right-click the Command
Prompt search result and select Run as administrator.
7. Type the following command (where {X} is your student number), then press Enter:
cd \Users\student{X}\Downloads
The Netskope Client is installed, its icon appears in the system tray, and its icon changes from gray to blue
and orange after a few seconds.
9. Right-click the Netskope Client icon in the system tray and click Configuration.
Both the Client Configuration and Steering Configuration should display Default tenant config.
2. Click the padlock button to the left of the website URL in the browser address bar and then click
Connection is secure.
3. Ensure the web site certificate is signed by Netskope. This means that Netskope is intercepting the traffic.
The steps and screenshots above are specific to Mozilla Firefox. Each browser presents site certificate
information differently.
8. In the User field, type the following (where {X} is your student number):
student{X}
11. Click View details next to your event to review the details.
This verifies that the Pastebin application is being steered through Netskope and events are being
recorded.
For the next section, you will be working with the following scenario: In order to protect sensitive GDPR data,
all GDPR data downloaded by managed devices will receive a GDPR user alert. All GDPR data downloaded
by unmanaged devices will receive a GDPR block page.
• A real-time protection policy with a DLP profile will be used to detect the GDPR data.
• Device classification will be used to determine the managed devices that have the rights to download
GDPR data.
2. Click the Managed Check device classification rule to view its settings.
The rule checks for the presence of a C:\Users\NetskopeManaged.txt file. If the Netskope Client detects
the file, it will classify the device as “managed.” Your instructor has created this file in advance on your
Amazon WorkSpace.
3. Click Cancel.
4. Right-click the Netskope Client in the taskbar of your Amazon WorkSpace and select Configuration.
6. As displayed in the screenshot above, confirm that the status in Device Classification field says
managed.
Until the Device Classification status displays managed, do not continue to the next task. If the problem
persists, restart the Netskope Client Service from Windows Services.
Task 3.2 – Create a real-time protection DLP policy to alert users of managed devices
If the DLP option is not visible, use the scroll in the drop-down menu.
Field Value
Source > User Your Student{X} user
Source > Add Criteria Device Classifications = Managed
Destination > Category Application = Dropbox
5. In the Policy Position window, select To the bottom for Position Inside Group, then click Save again.
The preceding policy will allow managed devices to continue with the download.
Task 3.3 – Create a real-time protection DLP policy to block downloads to unmanaged devices
Field Value
Source > User Your Student{X} user
Source > Add Criteria Device Classifications = Unmanaged
Destination > Category Application = Dropbox
Destination > Activities Download
Profile & Action > DLP Profile DLP Profile = EU General Data Protection Regulation
(GDPR) (predefined)
Profile & Action > Action Action = Block
Profile & Action > Template Default Template
Policy Name Student{X}-GDPR-Unmanaged
Group Students
Status Enabled
3. Click Save.
4. In the Policy Position window, select To the bottom for Position Inside Group, then click Save again.
1. Locate the Hilton document.doc file in the Misc\GDPR subfolder of your Lab Files extracted from the lab
files zip archive.
2. Upload the Hilton document.doc from your Amazon WorkSpace to your training Dropbox account.
This should be allowed.
3. Attempt to download the Hilton document.doc file from your Dropbox account to your Amazon
WorkSpace.
You will see a message like the one in the following image. Enter something unique for the justification text
— something that you will be able to find later, such as including your last name or an uncommon word in
the explanation text.
You are provided with a Proceed button because you are using a managed device. If your client pop-up is
not similar to the preceding example, or if you are unable to enter justification text, please ask your
instructor for assistance.
If you don’t see the C: drive in File Explorer, type C: in the address bar and press Enter.
6. Restart the Netskope Client Service from the Windows Services applet.
8. Confirm that the status in the Device Classification field says unmanaged.
Until the Device Classification status displays unmanaged, do not continue to the next step. If the
managed classification persists, restart the Netskope Client Service from Windows Services one more
time.
9. Attempt to download the Hilton document.doc file from your Dropbox account.
You will see a message like the one in the following image.
If your client pop-up is not like the preceding example, please ask your instructor for assistance.
In this section, you will follow the steps of using a constraint to enforce the use of the sanctioned Dropbox
account only and block access to users’ personal Dropbox accounts.
5. Type: *@netskope.com
Task 4.2 – Create a cloud app access policy with a constraint on login usernames
4. Click Save.
5. In the Policy Position window, select To the bottom for Position Inside Group, then click Save again.
4. Select Does not match and type the email you used to register your training Dropbox account.
5. Click Save.
7. Try again to log in to your training Dropbox account. This time you should succeed.
3. Append your Dropbox instance’s email account to the Notification emails list, after a comma.
The profile determines where the quarantine action will move malware to and what it will replace the
original file with (the tombstone file). The quarantine folder location and threat protection tombstone text
can be customized.
1. Navigate to Settings > Configure App Access > Classic and verify that the SaaS tab is selected.
2. Select the Dropbox icon and click the name of your Dropbox-{initials} instance in the list.
4. Click Save.
Task 1.3 – Verify threat protection settings by uploading a sample malware file
If you are blocked by the Netskope client, make sure you successfully completed Task 4.4 of the previous
lab.
5. Wait 2 to 3 minutes.
6. Select the uploaded file, then click the ellipsis menu and select Activity > Version history.
7. Notice that the API app has replaced the file with a much smaller version.
9. Click Download.
You should see a quarantine message similar to the preceding screenshot depending on how your
instructor configured the quarantine message.
The instructor’s Dropbox account hosts the quarantine folder; therefore, the original file will be placed there
rather than in your Dropbox account. The following screenshot illustrates how such a file might look if you
had access to the quarantine folder.
3. In the user field type the email address of your Dropbox user and press Enter.
In the following screenshot, the Detection Engine section displays options for results detected by
Netskope engines.
Part 2 – Configure a real-time threat protection policy with hash-based allowlists and blocklists
In this part, you will calculate hashes of an unwanted file and a benign file, adding the hashes to two separate
file profiles and using these profiles as a blocklist and an allowlist in the real-time protection policy configured
for malware detection.
You will use Windows PowerShell to calculate the file hashes for both the unwanted file nc.exe and the benign
file Allowlist.txt.
Outside this class, if you want to calculate file hashes on a Mac, use the shasum command from the Terminal:
shasum -a 256 nc.exe
1. In your Amazon WorkSpace, use File Explorer to navigate to your Labfiles\ThreatProtectionLab folder.
2. Click in the address bar of File Explorer, then type the following and press Enter:
powershell
A new Windows PowerShell window opens with the ThreatProtectionLab folder as the current folder.
4. Run the following command to calculate the SHA256 hash of the benign file Allowlist.txt:
Get-FileHash Allowlist.txt | Format-List
DO NOT CLOSE the PowerShell window because you will need to copy both hashes in the next task.
Next, you will create two file profiles to be used as an allowlist and blocklist, respectively, and populate them
with the calculated hashes.
1. In your Netskope tenant, navigate to Policies > Profiles > File and click New File Profile.
6. Repeat steps 1–5 for the nc.exe file hash, and create a blocklist profile with the following name and
SHA256 hash value:
ThreatProtection-BlockList-{initials}
7. Click Apply Changes and click Apply to confirm. You should now have the following:
1. Navigate to Policies > Profiles > Threat Protection, then click New Malware Detection Profile.
2. Under Threat Scan, Default Malware Scan is always enabled. Click Next.
3. Under Allowlist, select your ThreatProtection-AllowList-{Initials} profile from the list and click Next.
4. Under Blocklist, select your ThreatProtection-BlockList-{Initials} profile from the list and click Next.
5. Name your malware detection profile ThreatProtection-Malware-{Initials} and click Save Malware
Detection Profile.
You will now create a policy which blocks uploading or downloading the nc.exe Trojan using the Dropbox
application.
2024 © Netskope. All Rights Reserved 43
1. Navigate to Policies > Real-time Protection.
Scroll down in the drop-down menu to find the Threat Protection option.
4. Click Save.
5. In the Policy Position window, select To the top for Position Inside Group, then click Save again.
Task 2.5 – Verify the policy with the allowlist and blocklist
Wait about 30-60 seconds to let the new policy take effect. Alternatively, you can force the client to
download the policy by right-clicking the Netskope icon in the system tray and selecting Configuration.
1. From your Amazon WorkSpace, navigate to http://www.dropbox.com and log into your training account.
3. Attempt to upload Allowlist.txt to your training Dropbox account. This should be allowed. No block page
should be displayed.
6. Click the Alert Type drop-down list, select Malware and Policy, and click Apply.
8. Click the User field and start typing your WorkSpace username (for example:
student1@netskopetraining.com), then select the username from the list.
You should see alerts, related to your attempt to upload a blocklisted file.
Lab complete
Make sure you create the Advanced Analytics reports in your Personal folder because each report requires
a unique name.
1. Click Add, then select Visualization. (You can also click Add right above the report name to add a new
widget.)
3. Expand the Filters section and change the Event Date to 30 days.
4. In the left menu, expand Application Events and then expand Application.
Do NOT click the attribute itself, only the Filter by field icon.
6. Click the value field in the Application Events CCL filter and wait until the dropdown menu is populated
with CCL values.
The Application Events CCL filter is now set to is equal to, and the parameters are set to low and poor.
9. In the Visualization section, select the Single Value option. The icon should change from gray to white.
10. Rename the widget CCL Low and Poor, then click Save.
After a few moments, the widget will calculate and display the number of low and poor CCL application
events in your tenant.
The report title showing in the breadcrumb trail (Reports > Folders > Personal) does not change from
New Report 1 to CCL Low and Poor until you click out of report mode and then navigate back to your
report.
1. Click Dashboard actions in the top right and select Edit dashboard.
2. Hover over the CCL Low and Poor widget and click Widget actions when it appears, then select
Duplicate widget.
3. Hover over the duplicated widget, click Widget actions and select Edit.
6. In the left menu, navigate to Application Events > Application, then click Application. The selected
dimension will appear under the Data section.
7. Click Run. A list of applications should be displayed in the Data Results section.
8. In the Visualization section, select Bar. Since this chart requires more than one dimension, you’ll need to
add another field to display a dimensional graph.
10. Click Run to run the report again. After a few moments, the Visualization section will update with the bar
graph.
11. Click Save in the upper right to save the new widget.
12. Hover over the CCL Graph widget until you see the Hold and drag to reorder option ( ) in the upper left.
Place your mouse over this option, and your cursor turns into a four-way arrow. Rearrange the widgets in
your report.
1. Click Widget actions on the CCL Graph widget, then select Duplicate widget.
4. Expand the Data section, then click the gear icon in the Application Events Application column and
select Remove to switch off this dimension.
6. Click Activity, then click the Filter by field next to it. The selected dimension will appear in both the Data
and Filters sections.
8. In the Filters section, change the Application Events Activity to is not equal to and select Browse.
10. You can add a pivot to the table as well. Under Applications Events > General, click Pivot data next
to Activity. Granular columns for specific event activities will be displayed under the Data section.
12. To make the data more readable, change the Visualization from Bar to Column format.
The legend may not appear until after you save this widget.
13. Click Save in the upper right to save the new widget.
15. Click Save to save your changes to the report before continuing to the next task.
2. Click Widget actions on the CCL Low and Poor widget, then select Duplicate widget.
3. Grab the resize handle in the lower right of the duplicated widget and stretch it to the full width of the
dashboard canvas.
4. Click Widget actions on the CCL Low and Poor (Copy) widget and select Edit.
7. Under Application Events > General, click the Filter by field icon next to Activity, but do NOT select the
Activity dimension itself (it should NOT appear in the data table).
8. Under the Filters section, for Application Events Activity is equal to, select Download.
9. In the Visualization section, click the ellipsis and select Sankey in the dropdown menu.
11. In the Data section, click and hold the Application Events User field and drag it to the left of the
Application Events Application column. This makes the data in the Sankey more readable.
Lab complete
Python version 3.9 and all other requirements for this lab are already installed on your Amazon
WorkSpace.
You will create a constraint using the Does not match option to detect uploads to any bucket other than your
own. Next, you will add this constraint to a real-time protection policy to block such uploads.
2. Select the Storage tab and click New Storage Constraint Profile.
If you are student1, you will block every bucket that does not match student1.
4. Under Match type, click Does Not Match and Select by Buckets.
5. In the Policy Position window, select To the top for Position In Group, then click Save again.
You will now attempt to upload a file to your S3 bucket and then to another student’s S3 bucket.
1. In your Amazon WorkSpace, open File Explorer and navigate to the Labfiles\IaaSLab folder.
2. Click in File Explorer’s address bar, then type the following command and press Enter:
cmd
3. In the new command prompt window that opens in the current folder, type the following command:
s3upload.py -h
4. Run the script again, this time testing uploads to your S3 bucket.
s3upload.py -b {your student number}
5. Run the script again, this time choosing another student’s S3 bucket.
s3upload.py -b {another student’s number}
Lab complete
You will start by ensuring you can identify and block file uploads over HTTPS to a specific web domain.
1. In your Amazon WorkSpace, locate the Netskope client icon in your taskbar and verify it is enabled.
3. Select the URL lists tab, then click New URL list.
4. In the URL list name field, enter Student{X}-Bypass where {X} is your student number.
1. Select the Custom categories tab, then click New custom category.
4. Click Save.
5. For Policy Position, select To the bottom for Position Inside Group, then click Save again.
2. In your browser, verify that you are securely connected to the site, then validate that the SSL certificate is
verified by or issued by Netskope or the Netskope tenant name.
3. Click Choose File and select a random file and attempt to upload it to the website.
4. Click Upload. Your upload attempt should be blocked by the real-time protection policy.
You will bypass SSL decryption for netskopetraining.co.uk using an SSL Decryption policy.
4. Click in the box and enter student, then select Student{X}-Bypass where {X} is your student number.
5. Press Escape on your keyboard or click on any white space within the page.
7. Click in the box and enter student{X}, where {X} is your student number, then select your username from
the list.
10. Enter Student{X}-SSLDecrypt for the Set Policy name where {X} is your student number.
Validate that SSL decryption is bypassed for this domain and that the real-time protection policy will not be
triggered, as the traffic is no longer diverted for decryption and deep analysis and the user’s activity cannot be
identified.
2. Navigate to https://www.netskopetraining.co.uk/posttest.php.
3. In your browser, validate that the SSL certificate is no longer verified by or issued by Netskope or the
Netskope tenant name.
4. Select a random file and attempt to upload it to the website. Your upload should be permitted.
5. Navigate to Skope IT > Events & Alerts > Page Events to view the details of the SSL bypass policy
match.
Lab complete
2024 © Netskope. All Rights Reserved 66
Lab G: Web Security
In this lab, you will use Netskope Secure Web Gateway to block gambling sites for specific users.
Field Value
Source > User Select only your user
Destination > Category Category = Gambling, Games
Destination > Activities Browse
Profile & Action > Action Block
Profile & Action > Template Web – Block Page
Policy Name NSWG-Student{X}
Group Students
Status Enabled
4. Click Save.
5. In the Policy Position window, select To the top for Positions Inside Group, then click Save again.
1. In your Amazon WorkSpace, open a new tab in your web browser and perform an internet search for:
gambling and game sites
2. When the search results are displayed, click a link to a gambling or game web site.
The Netskope client blocks the gambling or game web site connection.
3. From the web browser’s address bar on the blocked page, copy the main part of the gambling or game
site’s URL.
4. Switch to the web browser tab where the Netskope tenant UI is loaded and navigate to Policies > Profiles
> Web.
6. In the Search URL field, paste the URL of the gambling/game web site you copied earlier, and press Enter.
8. Customize the Alerts table by adding the URL column so you can see exactly which gambling/game web
site was blocked.
Lab complete
The Non-Web traffic setting allows or blocks traffic when a user tries to access any resource using a protocol
other than HTTP or HTTPS. In this section, you will select Block for the Default Action for Non-Web Traffic
setting. Since this is a per-tenant configuration, you can complete this only if another student has not already
set this configuration.
Best practice when deploying Netskope CFW is to first set the Default Action for Non-Web Traffic setting to
Allow. This allows the Netskope tenant to discover the non-web traffic before an organization decides what
risky non-web traffic to block.
2. At the bottom of the Policies table, verify that Default Action: Non-Web traffic is set to Block.
3. If the Default Action for Non-Web traffic is set to Allow, then change the action to Block using the edit
icon ( ) and click Save and Apply.
In this task, you will clone the Default tenant config and create a steering configuration specifically for your
group. You can create different steering configurations per group or per Organization Unit (OU).
1. Navigate to Settings > Security Cloud Platform > Traffic Steering > Steering Configuration.
2. To the right of the Default tenant config, click the ellipsis menu and select Clone.
3. If the Apply To pop-up window appears, select User Group and click Save.
What steering configurations apply to is also a per-tenant setting. If somebody else has set it, you won’t
see the request. Instead, you will see the indication of what the configurations apply to above the list of
configurations.
4. Name the new configuration Group{X} config, where {X} is your student number.
5. From the User Group drop-down list, select your Group{X}, where {X} is your student number.
You will need to force an update of your Netskope Client to receive the steering configuration change you
made. To make this update, use the command line interface instead of the Netskope Client configuration.
1. In your Amazon WorkSpace, right-click the Windows Start menu icon and select Command Prompt
(Admin), then click Yes in the security warning.
This folder contains the NSDIAG diagnostic tool, among other utilities.
3. To update the steering configuration for the Netskope Client, run the command:
nsdiag.exe -u
4. Right-click the Netskope Client icon in the system tray and select Configuration.
In this section, you will access a few applications using ICMP, FTP, and SSH and verify the events captured in
Network Events.
3. Click the gear icon , then under Destination, select IP Protocol and click the close button
The network events show as blocked because all non-web traffic is currently being blocked by the Default
Action setting in the policies list.
1. Open a web browser, navigate to https://dlptest.com/ftp-test/, and record the FTP URL, FTP User, and
Password.
2. Open WinSCP (the shortcut is on the Desktop) and log in to the FTP Test server using the host name and
credentials recorded in the previous step.
3. Click Login. Were you able to successfully log in to the FTP Test server?
5. Navigate to Skope IT™ > Network Events and find the events generated by your attempt to log in to the
FTP Test server.
Do the FTP login attempts show as blocked?
2. In the Host Name (or IP address) field, paste the public IP address of the OPLP appliance provided by
your instructor.
To allow non-web traffic through Netskope CFW, you will define traffic destinations as firewall apps in the
tenant settings and create a policy to allow access to these firewall apps.
You will create three firewall app definitions to be included in CFW policies to allow for specific ICMP, FTP, and
SSH traffic.
1. Navigate to Settings > Security Cloud Platform > Traffic Steering > App Definition.
3. For the first firewall app, enter the following, then click Save:
Field Value
Application Name Student{X}-Ping
Destination IP 8.8.8.8
Protocol ICMP
6. For the third firewall app, click New App Definition Rule, then select Firewall App.
You should now have three new Firewall App Definitions to be included in the CFW policies.
In this task, create a CFW policy that allows traffic for the three firewall apps created in the previous task.
Field Value
Source User: Your Student{X} user
Destination Application: [Student{X}-Ping], [Student{X}-FTP], [Student0-SSH]
4. Click Save.
5. In the Policy Position window, select To the top for Position Inside Group, then click Save again.
In this part, you will run the previous ICMP, FTP, and SSH tests and verify whether non-web traffic is allowed.
2. Navigate to https://dlptest.com/ftp-test/ and record the FTP URL, FTP User, and Password.
3. Open WinSCP and log in to the FTP Test server using the credentials from dlptest.com.
4. Open PuTTY and attempt to start an SSH session to the public IP address of the OPLP appliance, as
provided by your instructor. If you see a PuTTY Security Alert window, click Yes.
Do you see a login prompt?
1. In the Netskope tenant, navigate to Advanced Analytics > Library > Netskope Library.
2. In the Dashboard Name field, type the following and press Enter:
Firewall
It may take 30–60 minutes before Skope IT™ data is reflected in the report.
7. Navigate to Advanced Analytics > Folders > Personal and make sure your CFW-Discovery-Student{X}
report is there.
Lab complete