1. Introduction
  2. Lab Guide
  3. 1. Lab 0: Risks to modern Cloud
  4. 2. Lab 1: Cloud Visibility
    1. 2.1. Lab 1a: Introduction to Netskope
    2. 2.2. Lab 1b: Cloud Risk Insights
    3. 2.3. Lab 1c: Use Netskope to research CCI
  5. 3. Lab 2: Safely Enable CLoud apps
    1. 3.1. Lab 2a: Deploy Netskope to user
    2. 3.2. Lab 2b: Web filtering
    3. 3.3. Lab 2c: Prevent Cloud Storage by reputation
    4. 3.4. Lab 2d: Activity level control
    5. 3.5. Lab 2e: Instance awareness
  6. 4. Lab 3: Data Protection
    1. 4.1. Lab 3a: Specific files to Corp
    2. 4.2. Lab 3b: Machine Learning DLP
  7. 5. Lab 4: Threat Protection
    1. 5.1. Lab 4a: Verify anti-malware real-time engine
    2. 5.2. Lab 4b: Prevent Cloud Phishing
  8. Conclusion

page1image56099648

page1image56107760

Technical Lab Guide

A Step-by-Step Lab Guide to accompany the Cloud Security Workshop

Learning some basic Use Cases of the Netskope Security Cloud Platform

If you have any questions or suggestions, please report to author:

[mherbinet@netskope.com]

Table of contents

Lab 0: Modern Cloud

Lab 0: Let's realize how much we need to do (5min - optionnal) 3

Lab 1: Cloud Visibility

Lab1a: Introduction to Netskope Home Screen (5min) 4

Lab 1b: Cloud Risk Insights (5min) 10

Lab 1c: Use Netskope to Research a Service (10min) 15

Lab 2: Safely Enable Cloud Applications 19

Lab 2a: Add Your User, Install and Verify Netskope Client 20

Lab 2b: Build your URL filter with Allow and Block lists (ca. 10min) 24

Lab 2c: Prevent usage of Cloud Storage Apps with bad reputation (ca. 10min) 30

Lab 2d: Prevent uploads to non-corporate cloud services 34

Lab 2e: Allow usage (incl. uploads) of corporate O365 instance 36

Lab 3: Prevent Corporate Confidential files leaving towards unmanaged Cloud Apps 42

Lab 3a: Use DLP engine along Instance Awareness on corporate O365 instance 42

Lab 3b: Use Machine-Learning DLP (optional - if you have time) 52

Lab 4: Verify Threat Protection 54

Lab 4a: Verify anti-malware real-time engine is preventing download 54

Lab 4b: Cloud phishing protection 56

Advanced Analytics Demo 62

Conclusion 63