Parser ini mengekstrak log peringatan Netskope dari pesan berformat JSON, lalu mengubahnya menjadi UDM Google Security Operations. Proses ini menormalisasi kolom, mengurai stempel waktu, menangani pemberitahuan dan tingkat keparahan, mengekstrak informasi jaringan (IP, port, protokol), memperkaya data pengguna dan file, serta memetakan kolom ke struktur UDM. Parser juga menangani aktivitas Netskope tertentu seperti login dan peristiwa DLP serta menambahkan label kustom untuk konteks yang lebih baik.
Sebelum memulai
Pastikan Anda memenuhi prasyarat berikut:
Instance Google SecOps.
Akses istimewa ke Netskope.
Mengaktifkan Akses Netskope REST API
Login ke tenant Netskope menggunakan kredensial administrator Anda.
Buka Setelan>Alat>REST API v2.
Aktifkan Status REST API.
Buat token baru:
Klik New Token.
Masukkan nama token (misalnya, Google SecOps Token).
Masukkan waktu habis masa berlaku token.
Klik Add Endpoint untuk memilih endpoint API yang akan digunakan dengan token.
Tentukan hak istimewa untuk endpoint:
Hak istimewa baca mencakup GET.
Hak istimewa Baca+Tulis mencakup GET, PUT, POST, PATCH, dan DELETE.
Klik Simpan.
Kotak konfirmasi akan terbuka dan menampilkan apakah pembuatan token berhasil.
Klik Copy Token dan save untuk digunakan nanti di header Autentikasi API.
Menyiapkan feed
Untuk mengonfigurasi feed, ikuti langkah-langkah berikut:
Buka Setelan SIEM>Feed.
Klik Tambahkan Feed Baru.
Di halaman berikutnya, klik Konfigurasi satu feed.
Di kolom Feed name, masukkan nama untuk feed; misalnya, Netskope Alert Logs v2.
Pilih Third party API sebagai Source type.
Pilih Netskope V2 sebagai Jenis log.
Klik Berikutnya.
Tentukan nilai untuk parameter input berikut:
Header HTTP Autentikasi: token yang sebelumnya dibuat dalam format Netskope-Api-Token:<value> (misalnya, Netskope-Api-Token:AAAABBBBCCCC111122223333).
Nama Host API: FQDN (nama domain yang sepenuhnya memenuhi syarat) endpoint Netskope REST API Anda (misalnya myinstance.goskope.com).
Endpoint API: Masukkan alerts.
Jenis Konten: Nilai yang diizinkan untuk alerts adalah uba, securityassessment, quarantine, remediation, policy, malware, malsite, compromisedcredential, ctep, dlp, watchlist.
Klik Berikutnya.
Tinjau konfigurasi feed di layar Selesaikan, lalu klik Kirim.
Opsional: Tambahkan konfigurasi feed untuk menyerap log Peristiwa Netskope v2
Buka Setelan SIEM>Feed.
Klik Tambahkan feed baru.
Di halaman berikutnya, klik Konfigurasi satu feed.
Di kolom Nama feed, masukkan nama untuk feed (misalnya, Netskope Event Logs v2).
Pilih Third party API sebagai Source type.
Pilih Netskope V2 sebagai Jenis log.
Klik Berikutnya.
Tentukan nilai untuk parameter input berikut:
Header HTTP Autentikasi: pasangan kunci yang dihasilkan sebelumnya dalam format <key>:<secret>, digunakan untuk melakukan autentikasi terhadap Netskope API.
Nama Host API: FQDN (nama domain yang sepenuhnya memenuhi syarat) endpoint Netskope REST API Anda (misalnya myinstance.goskope.com).
Endpoint API: Masukkan events.
Jenis Konten: Nilai yang diizinkan untuk events adalah application, audit, connection, incident, infrastructure, network, page.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[[["\u003cp\u003eThis parser transforms Netskope alert logs from JSON format into Google Security Operations UDM, normalizing fields, parsing timestamps, and handling alerts, severities, network information, user data, and file data.\u003c/p\u003e\n"],["\u003cp\u003eTo utilize this feature, users must have a Google SecOps instance and privileged access to Netskope, along with enabling the Netskope REST API v2, generating an API token, and setting up a feed in Google SecOps.\u003c/p\u003e\n"],["\u003cp\u003eNetskope alert logs are ingested via a configured feed in Google SecOps, specifying the 'Netskope V2' log type, a generated API token, the API hostname, and specific content types such as 'uba', 'dlp', or 'watchlist'.\u003c/p\u003e\n"],["\u003cp\u003eNetskope Event logs can optionally be ingested using a similar process, specifying the 'Netskope V2' log type, a key/secret pair for authentication, the API hostname, and specific content types like 'application', 'audit', 'connection' or 'network'.\u003c/p\u003e\n"],["\u003cp\u003eThe parser maps various Netskope log fields, such as \u003ccode\u003e_id\u003c/code\u003e, \u003ccode\u003eapp\u003c/code\u003e, \u003ccode\u003edstip\u003c/code\u003e, and \u003ccode\u003euser\u003c/code\u003e, to corresponding UDM fields, like \u003ccode\u003emetadata.product_log_id\u003c/code\u003e, \u003ccode\u003etarget.application\u003c/code\u003e, \u003ccode\u003etarget.ip\u003c/code\u003e, and \u003ccode\u003eprincipal.user.email_addresses\u003c/code\u003e.\u003c/p\u003e\n"]]],[],null,["# Collect Netskope alert logs v2\n==============================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n| **Note:** This feature is covered by [Pre-GA Offerings Terms](https://chronicle.security/legal/service-terms/) of the Google Security Operations Service Specific Terms. Pre-GA features might have limited support, and changes to pre-GA features might not be compatible with other pre-GA versions. For more information, see the [Google SecOps Technical Support Service guidelines](https://chronicle.security/legal/technical-support-services-guidelines/) and the [Google SecOps Service Specific Terms](https://chronicle.security/legal/service-terms/).\n\nOverview\n--------\n\nThis parser extracts Netskope alert logs from JSON-formatted messages, transforming them into the Google Security Operations UDM. It normalizes fields, parses timestamps, handles alerts and severities, extracts network information (IPs, ports, protocols), enriches user and file data, and maps fields to the UDM structure. The parser also handles specific Netskope activities like logins and DLP events and adds custom labels for enhanced context.\n| **Note:** For more information, see [Netskope API Reference](https://docs.netskope.com/en/rest-api-v2-overview-312207/).\n\nBefore you begin\n----------------\n\nEnsure that you have the following prerequisites:\n\n- Google SecOps instance.\n- Privileged access to Netskope.\n\nEnable Netskope REST API Access\n-------------------------------\n\n1. Sign in to the Netskope tenant using your administrator credentials.\n2. Go to **Settings** \\\u003e **Tools** \\\u003e **REST API v2**.\n3. Enable **REST API Status**.\n4. Create a new token:\n\n 1. Click **New Token**.\n 2. Enter the token name (for example, **Google SecOps Token**).\n 3. Enter the token expiration time.\n 4. Click **Add Endpoint** to select the API endpoints to use with the token.\n 5. Specify the privileges for the endpoint:\n\n - Read privileges include **GET**.\n - Read+Write privileges include **GET** , **PUT** , **POST** , **PATCH** , and **DELETE**.\n\n | **Note:** Endpoint privileges vary. Some endpoints, such as alert and audit, only have the Read privilege. Other endpoints, such as the URL list/file endpoint has both Read+Write privileges.\n 6. Click **Save**.\n\n 7. A confirmation box opens showing whether the token creation was successful.\n\n 8. Click **Copy Token** and **save** it for later use in the API Authentication header.\n\n | **Note:** The only option to copy the token is immediately after you create it. The token is required in your API requests.\n\nSet up feeds\n------------\n\nTo configure a feed, follow these steps:\n\n1. Go to **SIEM Settings** \\\u003e **Feeds**.\n2. Click **Add New Feed**.\n3. On the next page, click **Configure a single feed**.\n4. In the **Feed name** field, enter a name for the feed; for example, **Netskope Alert Logs v2**.\n5. Select **Third party API** as the **Source type**.\n6. Select **Netskope V2** as the **Log type**.\n7. Click **Next**.\n8. Specify values for the following input parameters:\n - **Authentication HTTP Header:** token previously generated in a `Netskope-Api-Token:\u003cvalue\u003e` format (for example, **Netskope-Api-Token:AAAABBBBCCCC111122223333**).\n - **API Hostname:** The FQDN (fully qualified domain name) of your Netskope REST API endpoint (for example `myinstance.goskope.com`).\n - **API Endpoint:** Enter **alerts**.\n - **Content Type:** Allowed values for **alerts** are **uba** , **securityassessment** , **quarantine** , **remediation** , **policy** , **malware** , **malsite** , **compromisedcredential** , **ctep** , **dlp** , **watchlist**.\n9. Click **Next**.\n10. Review the feed configuration in the **Finalize** screen, and then click **Submit**.\n\nOptional: Add a feed configuration to ingest Netskope Event logs v2\n-------------------------------------------------------------------\n\n1. Go to **SIEM Settings** \\\u003e **Feeds**.\n2. Click **Add new feed**.\n3. On the next page, click **Configure a single feed**.\n4. In the **Feed name** field, enter a name for the feed (for example, **Netskope Event Logs v2**).\n5. Select **Third party API** as the **Source type**.\n6. Select **Netskope V2** as the **Log type**.\n7. Click **Next**.\n8. Specify values for the following input parameters:\n - **Authentication HTTP Header:** key pair generated previously in `\u003ckey\u003e:\u003csecret\u003e` format, used to authenticate against the Netskope API.\n - **API Hostname:** The FQDN (fully qualified domain name) of your Netskope REST API endpoint (for example `myinstance.goskope.com`).\n - **API Endpoint:** Enter **events**.\n - **Content Type:** Allowed values for **events** are **application** , **audit** , **connection** , **incident** , **infrastructure** , **network** , **page**.\n - **Asset namespace** : the [asset namespace](/chronicle/docs/investigation/asset-namespaces).\n - **Ingestion labels**: the label applied to the events from this feed.\n9. Click **Next**.\n10. Review the feed configuration in the **Finalize** screen, and then click **Submit**.\n\nUDM Mapping Table\n-----------------\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]