How to Configure Microsoft 365 for Netskope Security Posture Management
Summary: Learn how to configure Netskope Security Posture management for Microsoft 365 by following these step-by-step instructions.
Instructions
Microsoft 365 is a dynamic environment and must be continuously monitored for misconfigurations and vulnerabilities. With Netskope, you can get a clear understanding of your software as a service (SaaS) security posture. Administrators can see how the environment is performing against standards and best practices like Center for Internet Security (CIS) benchmarks.
Affected Products:
- Netskope
- Microsoft 365
Affected Versions:
- Netskope Release 86 and higher
Microsoft 365 is a cloud-based service that brings together best-in-class productivity apps from Office 365 with advanced device management, intelligent security, and innovative online services. If violations are found, items are identified as critical, high, medium, or low. With a simple way to monitor and report on the security of the Microsoft 365 environment, administrators can run a report for auditors. Administrators can then quickly remediate and address gaps that were found using recommended guidance.
An administrator may Configure a Microsoft 365 Instance for Security Posture or Configure Microsoft 365 Security Posture Policy. For more information, click the appropriate process.
These installation instructions describe how to integrate your Microsoft 365 account with Netskope. There are four processes that are involved:
- Configure SharePoint Tenant to Allow Custom App Authentication
- Grant Access to Microsoft 365 Account
- Add Azure AD Roles
- Add SharePoint Admin Permissions for the SharePoint Client-side Object Model (CSOM) API
For more information, click the appropriate process.
- Microsoft 365 A3, A5
- Microsoft 365 E3, E5
- Microsoft 365 F1, F3
Netskope can support other Microsoft 365 licenses too if additional licenses are obtained for Microsoft Intune and Azure Active Directory Premium P1 edition.
Configure SharePoint Tenant to Allow Custom App Authentication
If you are setting up the Microsoft 365 instance for the first time on a new Microsoft 365 account, enabling custom app authentication for your SharePoint tenant may be required. Microsoft disables apps using an Azure Access Control (ACS) app-only access token by default.
- Install the latest version of PowerShell on a Windows computer.
- Right-click the Windows start button and then select Run.

- In the Run UI, type
powershelland then press CTRL+SHIFT+ENTER. This runs PowerShell as an administrator.

- Type
Install-Module -Name Microsoft.Online.Sharepoint.PowerShelland press Enter.

- If you are warned about an untrusted repository ("You are installing the modules from an untrusted repository. If you trust this repository, change its InstallationPolicy value by running the
Set-PSRepositorycmdlet. Are you sure you want to install the modules from 'PSGallery'?"), typeYand then press Enter to install the module. Otherwise, go to Step 6.

- Once PowerShell completes the package install, there is a blinking cursor line. Type
$adminUPN=”[GLOBALADMINUPN]”and then press Enter.

[GLOBALADMINUPN]= the full UPN of the global administrator account- For example:
admin@testdomain.onmicrosoft.com
- Type
$orgName="[365DOMAINNAME]”and then press Enter.

[365DOMAINNAME]= the name of your Microsoft 365 organization- For example:
testdomain
- Type
$userCredential=Get-Credential -UserName $adminUPN -Message "Type the password”and then press Enter.

- When prompted with the Windows PowerShell credential request dialog box, type the password for the global administrator account you entered in Step 6.

- Type
Connect-SPOService -Url https://$orgName-admin.sharepoint.comand then press Enter.

- You may be prompted to sign into your account. If prompted, provide your global administrator login information. If not, go to Step 12.

- Once logged in, from the empty PowerShell command prompt, type
Get-SPOTenantand then press Enter.

- Locate the
DisableCustomAppAuthenticationparameter. If it is set to True, go to Step 14. If it is set to False, go to Grant Access to the Microsoft 365 Account.

DisableCustomAppAuthentication parameter, Type Install-Module -Name Microsoft.Online.Sharepoint.PowerShell -Force command and then return to Step 2.
- Type
Set-SPOTenant -DisableCustomAppAuthentication $falseand then press Enter.

- Type
Get-SPOTenantand then confirmDisableCustomAppAuthenticationis now set to False.

Grant Access to Microsoft 365 Account
- In a web browser, go to the Netskope web console:
- United States Datacenter: https://[TENANT].goskope.com/
- European Union Datacenter: https://[TENANT].eu.goskope.com/
- Frankfurt Datacenter: https://[TENANT].de.goskope.com/
- Log in to the Netskope web console.

- Click Settings.

- Click API-enabled Protection.

- Click SaaS.

- Click the Microsoft 365 icon.

- Click Setup Instance.

- From the Setup Instance prompt:
- Populate the Instance Name.
- Select Security Posture for an Instance Type.
- Select a time interval for the policy to run.
- Click Save.

- The Instance Name should be the fully qualified domain name (FQDN) of your Microsoft 365 account. For example, if you use https://domain.sharepoint.com to log in to Microsoft 365, then domain.sharepoint.com is the Instance Name.
- To find the FQDN of your Microsoft 365 account, log in to your Microsoft 365 account. From there, click the launch icon, click the SharePoint app, and then copy the FQDN text. Remove the https://, the slash at the end of the FQDN path, and anything trailing after that slash.
- If Security Posture is unavailable or disabled, contact Dell Support for assistance in enabling this feature. For more information, reference How to Get Support for Netskope.
- From the SaaS Microsoft 365 instance, click Grant Access for the newly created app instance.

- Log in with your global administrator username and password.
- Accept the permissions for Netskope Security Assessment.

- Click Close.

- Refresh your browser and confirm that there is a green check icon next to the instance name.

Add Azure AD Roles
Once you have granted access to the Microsoft 365 app, you should assign the Netskope application client ID to the Global Reader role.
- In a web browser, go to https://portal.azure.com
.
- Log in as a global administrator.

- From Manage Azure Active Directory, click View.

- From the left navigation pane, click Roles and administrators.

- Search for the Global Reader role.

- Click the Global Reader role.

- Click + Add assignments in the upper left.

- From the Add assignments panel on the right, search for Netskope application client ID
2038fb3d-092b-4c35-9ae6-3f10adb04a6a.

- Select the Netskope Security Assessment app and then click Add.

Add SharePoint Admin Permissions for the SharePoint Client-side Object Model (CSOM) API
- In a web browser, go to https://[TENANT]-admin.sharepoint.com/_layouts/15/appinv.aspx.
- Log in with your Global Administrator Account.
- In the App Id, populate
2038fb3d-092b-4c35-9ae6-3f10adb04a6aand then click Lookup.

- In the App Domain, populate netskope.com.

- Under Permission Request XML, populate the following XML code:
<AppPermissionRequests AllowAppOnlyPolicy="true"><AppPermissionRequest Scope="http://sharepoint/content/tenant" Right="FullControl" /></AppPermissionRequests>

- Click Create.

- Review the permissions and then click Trust It.

- In a web browser, go to the Netskope web console:
- United States Datacenter: https://[TENANT].goskope.com/
- European Union Datacenter: https://[TENANT].eu.goskope.com/
- Frankfurt Datacenter: https://[TENANT].de.goskope.com/
- Log in to the Netskope web console.

- Click Policies.

- In Policies, click Security Posture.

The fields are:
- Policy Name: Name of the policy.
- Instance: Name of the instance for which the policy is defined.
- Profile: List of profiles associated with the policy.
- Last Edit: Time stamp of the last edited policy.
You can edit, revert, disable, clone, and delete a policy. Click the More Options icon (...) to the right of the policy entry and select one of the following options:
- Edit: On selecting this option, you can edit the policy.
- Disable: On selecting this option, Netskope disables the policy and stops the scan for the policy.
- Clone: On selecting the option, Netskope creates a duplicate copy of the policy.
- Delete: On selecting this option, Netskope deletes the policy.
In the policies table, you can select multiple policies and perform the following tasks:
- Disable: On selecting this option, Netskope disables the policy and stops the scan for the policy.
- Revert: On selecting this option, Netskope reverts the policy to its last applied change.
- Delete: On selecting this option, Netskope deletes the policy.
If you delete a policy, scanning stops at the next scan interval. The existing scan continues to run until it finishes.
- Click New Policy to create a Security Posture policy.


- From the New Security Posture Policy page, click Instances and then select Microsoft 365.

- In Profile & Action, click Profile and then select a Profile assessment.

- Optionally, select a different Action.

- Populate a Policy Name.

' " ! @ # $ % ^ & * ( ) { } \ / ; ? = + . , : |
- Optionally, click +POLICY DESCRIPTION and then populate a policy description.

- Optionally, click +EMAIL NOTIFICATION to configure email notification alerts for the policy.

- By default, the Status is set to Disabled. Click the slider to set the policy to Enabled.

- Click Save in the upper right.

- From the Security Posture page, click Apply Changes to begin enforcement of the newly created policy.

- Populate a note about the changes being applied, and then click Apply.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.