Skyhigh Security Cloud Release Notes 6.1.2 (September 2022)
Skyhigh Secure Web Gateway (Cloud)
Rule set for blocking HTTP methods
6.1.2 includes a new rule set for HTTP methods. The rule set can be imported to enforce block action on HTTP methods. It is located under Common Rules in the policy tree. Block action can be executed for each HTTP method and provides control for policy execution.
For more information, see Block Requests for Web Access Based on HTTP Methods.
Download of RBI, Private Access, and Firewall data for Reporting with Forensics API
The scope of the REST API for Secure Web Gateway, which is also known as Forensics API, has been enlarged. In addition to downloading data from normal web traffic for reporting, the admin can now use it to download data from traffic of the following types:
-
Remote Browser Isolation (RBI)
- Private Access
-
Firewall
For more information, see Reporting Examples.
Cloud Connector User role for SSE Hybrid Users
Skyhigh Cloud Connector access will be available for SSE Hybrid (WPS2) license users. Users or tenants with the Cloud Connector User role can access the Cloud Connector page to manage Cloud Connectors. For details, see Cloud Connector User Role for SSE Hybrid Users.
Export Service Provider metadata when configuring SAML authentication
6.1.2 contains a new option to export Service Provider metadata, making SAML configuration easier by leveraging the exported data to configure IdPs as well. The exported data can be imported to an IdP without manual configuration steps. This feature set will support multiple IdPs.
For more information, see Configure SAML Authentication for Secure Web Gateway.
Private Access
Revoke SAML Authentication
You will soon be able to revoke the SAML authentication session for all users or a specific user if you find any suspicious behavior. For details, see Revoke SAML Authentication.
Import Private Application List
With the 6.1.2 release, admins will be able to import a list of private applications through a CSV file rather than adding the application names individually. For details, see Import Application List.
Discovered Private Applications
By monitoring different applications accessed by users, Skyhigh Private Access will help you identify the most accessed applications so you can configure the access policy based on their usage.
Multiple Port Support
While adding private applications, you will be able to configure port in multiple ways:
- Range (80-90)
- Individual (80, 90, 8080)
- Both (100-300, 80, 90)
Skyhigh Client Proxy
For detailed Release Notes, see Client Proxy 4.5.0 Release Notes.
Skyhigh Rebranding Changes
Using Port 443 for Secure Channel
Configure Port in Multiple Ways
Support for IPv6
Skyhigh CASB
Skyhigh CASB for Zoom Supported for GovCloud
Skyhigh CASB for Zoom is a comprehensive security and compliance integration for Zoom that complements its native capabilities to allow IT teams to protect data. Skyhigh CASB for Zoom is now supported for the GovCloud Skyhigh CASB environment. For details, see Skyhigh CASB for Zoom.
Data Protection
Classifications using Proximity Match
You can identify sensitive data with text patterns in a classification. Use a proximity match in your classification to define how many characters can separate items in advanced patterns, dictionaries, and keywords and still trigger a match. If two items are found within the selected number of characters, it's a match. For details, see Create a Classification Using Proximity.
Policy Template Updates
New and Updated Amazon EKS Container Policies
We have added eight new Amazon EKS Policy Templates, and 18 others are updated and improved for Docker and Containerd.
- EKS Docker Host policy templates have been renamed EKS Container Host. Rules and exceptions were added for both Docker and Containerd. They will evaluate rules based on runtime or container, whichever is applicable.
- Docker and Containerd remediation steps have been added to the Incident Cloud Card to guide you through resolving incidents. Now you can determine which runtime is raising a violation under the Marked Attributes parameter. For details, see Policy Templates for EKS.
Note: This change is available for new customers now, and will be available for all customers in the next release.
Updated Policies for AWS and GCP
Seven new policies were added for AWS. Also, some policies for AWS and GCP have been updated due to changes in recommendations and evaluation logic. For details see Policy Templates for AWS and Policy Templates for GCP.
Policy Templates for Azure Updated and Deprecated
Azure Microsoft Defender has updated and deprecated multiple security recommendations. For a list of Policy Templates that have recently been updated due to changed recommendations, see Find New and Updated Policy Templates. For deprecated Policy Templates, see Policy Templates for Azure - DEPRECATED.
Enhanced EDM Fingerprints (Limited Availability)
Enhanced Exact Data Matching (EDM), or structured fingerprints, allow you to monitor your organization's documents in a row and column format typically extracted from a database in CSV format. EDM from Skyhigh CASB and Secure Web Gateway are now unified in both products, and Enhanced EDM fingerprints created in Skyhigh CASB can now be used in Web Classifications. For details, see About Exact Data Match (EDM) Fingerprints.
DLP Integrator 6.1.2 (September 2022)
Skyhigh DLP Integrator 6.1.2 has been updated to support Exact Data Match (EDM) (Enhanced) fingerprints. DLP Integrator 6.1.2 or later is required for the EDM (Enhanced) fingerprint feature to work. For details, see Download the DLP Integrator.
EDM (Enhanced) fingerprints do not work with the DLP Integrator on MacOS, so that software download is no longer provided.