Collect Netskope Client logs

Supported in:

This document explains how to ingest Netskope Client logs into Google Security Operations using Google Cloud Storage V2. Netskope Client is a SASE/SSE endpoint agent that generates telemetry covering device posture, steering decisions, tunnel status, and client-side security events.

Before you begin

Make sure that you have the following prerequisites:

  • A Google SecOps instance
  • A GCP project with Cloud Storage API enabled
  • Permissions to create and manage GCS buckets and IAM policies
  • Privileged access to the Netskope tenant admin console

Create Google Cloud Storage bucket

  1. Go to the Google Cloud Console .
  2. Select your project or create a new one.
  3. In the navigation menu, go to Cloud Storage > Buckets.
  4. Click Create bucket.
  5. Provide the following configuration details:

    Setting Value
    Name your bucket Enter a globally unique name (for example, netskope-client-logs )
    Location type Choose based on your needs (Region, Dual-region, Multi-region)
    Location Select the location (for example, us-central1 )
    Storage class Standard (recommended for frequently accessed logs)
    Access control Uniform (recommended)
    Protection tools Optional: Enable object versioning or retention policy
  6. Click Create.

Export Netskope Client logs to Google Cloud Storage

Netskope supports exporting log data to cloud storage via the Cloud Log Shipping (CLS) feature in the Netskope admin console.

  1. Sign in to the Netskopetenant admin console.
  2. Navigate to the Cloud Log Shippingconfiguration. Depending on your Netskope version, this may be under Settings > Tools > Cloud Log Shippingin the admin console, or configured through the Netskope Cloud Exchangeplatform.
  3. Click New Cloud Log Shipping Configuration(or edit an existing one).
  4. Select Google Cloud Storageas the destination.
  5. Provide the following configuration details:
    • Bucket name: Enter the bucket name (for example, netskope-client-logs )
    • Path prefix: Enter a folder prefix (for example, netskope-client/ )
    • Service account credentials: Upload or paste the GCP service account JSON key with write access to the bucket
  6. Select the log types to export:
    • Client events (steering, tunnel, posture)
  7. Set the export interval and format (JSON recommended for Chronicle ingestion).
  8. Click Save.
  9. Verify that log files begin appearing in the GCS bucket under the specified prefix.

    • Ensure that the GCP service account used for the export has the Storage Object Creatorrole on the target bucket.
    • Log files are written in JSON format, with each file containing one or more event records.
  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Feeds.
  3. Click Add New Feed.
  4. Click Configure a single feed.
  5. Select Google Cloud Storage V2as the Source type.
  6. Select Netskope Clientas the Log type.
  7. Click Get Service Account. A unique service account email will be displayed, for example:

     chronicle-12345678@chronicle-gcp-prod.iam.gserviceaccount.com 
    
  8. Copy this email address. You will use it in the next step.

    • Each Google SecOps instance has a unique service account. Do not use service accounts from other documentation or examples.
  1. Go to Cloud Storage > Buckets.
  2. Click your bucket name.
  3. Go to the Permissionstab.
  4. Click Grant access.
  5. Provide the following configuration details:
    • Add principals: Paste the Google SecOps service account email
    • Assign roles: Select Storage Object Viewer
  6. Click Save.

    • If you plan to use the deletion option (delete transferred files), grant Storage Object Adminrole instead of Storage Object Viewer.

Configure a feed in Google SecOps to ingest Netskope Client logs

  1. Go to SIEM Settings > Feeds.
  2. Click Add New Feed.
  3. Click Configure a single feed.
  4. In the Feed namefield, enter a name for the feed (for example, Netskope Client logs ).
  5. Select Google Cloud Storage V2as the Source type.
  6. Select Netskope Clientas the Log type.
  7. Click Next.
  8. Specify values for the following input parameters:

    Field Value
    Storage bucket URI gs://netskope-client-logs/netskope-client/
    Source Deletion Option Select the deletion option according to your preference
    Maximum File Age (Days) Default is 180 days
    Asset namespace The asset namespace
    Ingestion labels The label to be applied to the events from this feed
    • Replace netskope-client-logs with your actual GCS bucket name.
    • Always include the trailing slash ( / ) at the end of the URI.
  9. Click Next.

  10. Review your new feed configuration in the Finalizescreen, and then click Submit.

UDM field mapping reference

Log Field UDM Mapping Logic
timestamp
metadata.event_timestamp Timestamp when the event occurred
metadata.event_type Type of event (e.g., USER_LOGIN, NETWORK_CONNECTION)
clientBytes
network.sent_bytes Number of bytes sent by the client
serverBytes
network.received_bytes Number of bytes received by the server
clientPackets
network.sent_packets Number of packets sent by the client
sessionDuration
network.session_duration.seconds Duration of the network session in seconds
networkSessionId
network.session_id Unique identifier for the network session
proto
network.application_protocol Application protocol used in the network connection
os
principal.platform Platform of the principal device
osVersion
principal.platform_version Version of the platform
requestClientApplication
principal.application Application associated with the principal
suser
principal.user.userid User ID of the principal
sourceServiceName, shost
principal.hostname Hostname of the principal
shost
principal.asset.hostname Hostname of the principal's asset
sourceServiceName
principal.ip IP address of the principal
spt
principal.port Port number used by the principal
action
security_result.action Action taken by the security system
ccl
security_result.confidence_details Confidence level or details of the security result
cci, policy, proto, requestMethod, trafficType, tunnelId, tunnelType, tunnelUpTime, start, end
security_result.detection_fields Additional detection fields from the security result
dst
target.ip IP address of the target
dpt
target.port Port number of the target
metadata.product_name Product name of the security vendor
metadata.vendor_name Vendor/company name

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: