You want to verify that Google Drive is being tunneled to Netskope by looking in the nsdebuglog file. You are using Chrome and the Netskope Client to steer traffic.In this scenario, what would you expect to see in the log file?
Your company has a large number of medical forms that are allowed to exit the company when they are blank. If the forms contain sensitive data, the forms must not leave any company data centers, managed devices, or approved cloud environments. You want to create DLP rules for these forms.Which first step should you take to protect these forms?
Review the exhibit.You work for a medical insurance provider. You have Netskope Next Gen Secure Web Gateway deployed to all managed user devices with limited block policies. Your manager asks that you begin blocking Cloud Storage applications that are not HIPAA compliant. Prior to implementing this policy, you want to verify that no business or departmental applications would be blocked by this policy.Referring to the exhibit, which query would you use in the Edit Widget window to narrow down the results?
A hospital has a patient form that they share with their patients over Gmail. The blank form can be freely shared among anyone. However, if the form has any information filled out, the document is considered confidential.Which rule type should be used in the DLP profile to match such a document?
Review the exhibit.AcmeCorp has recently begun using Microsoft 365. The organization is concerned that employees will start using third-party non-AcmeCorp OneDrive instances to store company data. The CISO asks you to use Netskope to create a policy that ensures that no data is being uploaded to non-AcmeCorp instances of OneDrive.Referring to the exhibit, which two policies would accomplish this posture? (Choose two.)
Your company just had a new Netskope tenant provisioned and you are asked to create a secure tenant configuration.In this scenario, which two default settings should you change? (Choose two.)