Collect Netskope alert logs v2

Supported in:

Overview

This parser extracts Netskope alert logs from JSON-formatted messages, transforming them into the Google Security Operations UDM. It normalizes fields, parses timestamps, handles alerts and severities, extracts network information (IPs, ports, protocols), enriches user and file data, and maps fields to the UDM structure. The parser also handles specific Netskope activities like logins and DLP events and adds custom labels for enhanced context.

Before you begin

Ensure that you have the following prerequisites:

  • Google SecOps instance.
  • Privileged access to Netskope.

Enable Netskope REST API Access

  1. Sign in to the Netskope tenant using your administrator credentials.
  2. Go to Settings > Tools > REST API v2.
  3. Enable REST API Status.
  4. Create a new token:

    1. Click New Token.
    2. Enter the token name (for example, Google SecOps Token).
    3. Enter the token expiration time.
    4. Click Add Endpointto select the API endpoints to use with the token.
    5. Specify the privileges for the endpoint:

      • Read privileges include GET.
      • Read+Write privileges include GET, PUT, POST, PATCH, and DELETE.
    6. Click Save.

    7. A confirmation box opens showing whether the token creation was successful.

    8. Click Copy Tokenand saveit for later use in the API Authentication header.

Set up feeds

To configure a feed, follow these steps:

  1. Go to SIEM Settings > Feeds.
  2. Click Add New Feed.
  3. On the next page, click Configure a single feed.
  4. In the Feed namefield, enter a name for the feed; for example, Netskope Alert Logs v2.
  5. Select Third party APIas the Source type.
  6. Select Netskope V2as the Log type.
  7. Click Next.
  8. Specify values for the following input parameters:
    • Authentication HTTP Header:token previously generated in a Netskope-Api-Token:<value> format (for example, Netskope-Api-Token:AAAABBBBCCCC111122223333).
    • API Hostname:The FQDN (fully qualified domain name) of your Netskope REST API endpoint (for example myinstance.goskope.com ).
    • API Endpoint:Enter alerts.
    • Content Type:Allowed values for alertsare uba, securityassessment, quarantine, remediation, policy, malware, malsite, compromisedcredential, ctep, dlp, watchlist.
  9. Click Next.
  10. Review the feed configuration in the Finalizescreen, and then click Submit.

Optional: Add a feed configuration to ingest Netskope Event logs v2

  1. Go to SIEM Settings > Feeds.
  2. Click Add new feed.
  3. On the next page, click Configure a single feed.
  4. In the Feed namefield, enter a name for the feed (for example, Netskope Event Logs v2).
  5. Select Third party APIas the Source type.
  6. Select Netskope V2as the Log type.
  7. Click Next.
  8. Specify values for the following input parameters:
    • Authentication HTTP Header:key pair generated previously in <key>:<secret> format, used to authenticate against the Netskope API.
    • API Hostname:The FQDN (fully qualified domain name) of your Netskope REST API endpoint (for example myinstance.goskope.com ).
    • API Endpoint:Enter events.
    • Content Type:Allowed values for eventsare application, audit, connection, incident, infrastructure, network, page.
    • Asset namespace: the asset namespace .
    • Ingestion labels: the label applied to the events from this feed.
  9. Click Next.
  10. Review the feed configuration in the Finalizescreen, and then click Submit.

UDM Mapping Table

Log Field UDM Mapping Logic
_id
metadata.product_log_id Directly mapped from _id .
access_method
extensions.auth.auth_details Directly mapped from access_method .
action
security_result.action Mapped to QUARANTINE because the value is "alert". Also mapped to security_result.action_details as "alert".
app
target.application Directly mapped from app .
appcategory
security_result.category_details Directly mapped from appcategory .
browser
network.http.user_agent Directly mapped from browser .
browser_session_id
network.session_id Directly mapped from browser_session_id .
browser_version
network.http.parsed_user_agent.browser_version Directly mapped from browser_version .
ccl
security_result.confidence_details Directly mapped from ccl .
device
principal.resource.type , principal.resource.resource_subtype principal.resource.type is set to "DEVICE". principal.resource.resource_subtype is directly mapped from device .
dst_country
target.location.country_or_region Directly mapped from dst_country .
dst_latitude
target.location.region_coordinates.latitude Directly mapped from dst_latitude .
dst_longitude
target.location.region_coordinates.longitude Directly mapped from dst_longitude .
dst_region
target.location.name Directly mapped from dst_region .
dstip
target.ip , target.asset.ip Directly mapped from dstip .
metadata.event_type
metadata.event_type Set to NETWORK_CONNECTION because both principal and target IP addresses are present and the protocol is not HTTP.
metadata.product_event_type
metadata.product_event_type Directly mapped from type .
metadata.product_name
metadata.product_name Set to "NETSKOPE_ALERT_V2" by the parser.
metadata.vendor_name
metadata.vendor_name Set to "NETSKOPE_ALERT_V2" by the parser.
object_type
additional.fields Added as a key-value pair to additional.fields where key is "object_type" and value is the content of object_type .
organization_unit
principal.administrative_domain Directly mapped from organization_unit .
os
principal.platform Mapped to WINDOWS because the value matches the regex "(?i)Windows.*".
policy
security_result.summary Directly mapped from policy .
site
additional.fields Added as a key-value pair to additional.fields where key is "site" and value is the content of site .
src_country
principal.location.country_or_region Directly mapped from src_country .
src_latitude
principal.location.region_coordinates.latitude Directly mapped from src_latitude .
src_longitude
principal.location.region_coordinates.longitude Directly mapped from src_longitude .
src_region
principal.location.name Directly mapped from src_region .
srcip
principal.ip , principal.asset.ip Directly mapped from srcip .
timestamp
metadata.event_timestamp.seconds Directly mapped from timestamp .
type
metadata.product_event_type Directly mapped from type .
ur_normalized
principal.user.email_addresses Directly mapped from ur_normalized .
url
target.url Directly mapped from url .
user
principal.user.email_addresses Directly mapped from user .

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: