Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Skyhigh Security Cloud 7.0.1 Release Notes (Feb 2026)

IMPORTANT: The Skyhigh Security Cloud 7.0.1 release addresses significant library updates for enhancing security and stability. For additional information about these fixes and updates, contact Skyhigh Support.

Legends Used

General Availability   GA.png            Limited Availability   LA.png

 

Skyhigh Cloud Platform

Skyhigh Data Loss Prevention (DLP)   

Enhanced EDM to Support Additional Date Formats GA.png

Exact Data Match (EDM), an advanced DLP capability, now extends its functionality to support four additional date formats during file scanning to make sure data such as PII, PCI is not exfiltrated. This enhancement enables the DLP engine to handle and structure fingerprints accurately, even when date formats found in documents vary from what was originally fingerprinted. For more details, see Enhanced EDM to Support Additional Date Formats.

The newly supported date formats are:

  • D-M-YYYY
  • M-D-YYYY
  • YYYY-M-D 
  • YYYY-D-
Enhanced Regex Pattern to Support New CNPJ Format for Brazilian PII GA.png

The Brazilian Federal Revenue Service aims to implement the alphanumeric CNPJ (Brazilian taxpayer identification number) that supports the values of the new format. To facilitate this requirement, the existing regex pattern (which supported only numerical values) is enhanced to discover and validate values that are alphanumeric and are case-insensitive. This DLP engine now validates the new 14-character alphanumeric format and triggers an incident during policy violation, by securing the data and enforcing policies as defined.

Current Regex Pattern:

For numerical values only.

\b[0-9]{2}\.[0-9]{3}\.[0-9]{3}\/[0-9]{4}-[0-9]{2}\b
\b[0-9]{14}\b

Updated Regex Pattern:

For uppercase alphanumeric values, as well as adding a pattern that doesn't use the dot delimiters.

(?i:\b[0-9A-Z]{2}\.[0-9A-Z]{3}\.[0-9A-Z]{3}/[0-9A-Z]{4}-[0-9]{2}\b)
(?i:\b[0-9A-Z]{8}/[0-9A-Z]{4}-[0-9]{2}\b)
(?i:\b[0-9A-Z]{12}[0-9]{2}\b)

Current vs. New CNPJ Format

The following table lists the differences between the current and the new CNPJ format.

Feature

Current Format 

New Format 

Character Set

Numeric Only (0-9)

Alphanumeric (A-Z, 0-9)

Total Length

14 characters

14 characters

Example 1

12345678000100

12ABC345000199

Example 2

12.345.678/0001-00

12.ABC.345/0001-99

Inclusion of Missing User Information for CSPs in DSPM Data Explorer GA.png

The DSPM Data Explorer now displays the missing username that was not supported previously for some Cloud Service Providers (CSPs). If the username is not available, then the user's email ID is displayed in the User column. This enhancement enables SOC admins to track user activities and define policies to secure data and prevent data exfiltration.

▶ Explore Navigation Details and User Interface

Navigation Path: To view the user information in DSPM Data Explorer, go to Analytics > DSPM Data Explorer > filter any service from the table > Users tab

clipboard_e40c71a2ad9522612a2aecb67f9ac581a.png

Skyhigh SSE Products

Skyhigh Secure Web Gateway

Enhanced Policy Control with Support for Parquet File Types  GA.png

The Skyhigh Secure Web Gateway now supports Parquet File Type as a valid media type and ensures these file types are scanned and secured. Parquet File Type is widely used in large‑scale data processing and analytics. 

Key Benefits

  • Policy Control. Create rules to define actions when Parquet File Types are detected.
  • Blocking Options. Configure policies to block downloads, uploads, archives, or transactions involving Parquet files.

This enhancement gives you greater control over data flows involving Parquet file types, helping prevent unauthorized transfers and ensuring compliance with data protection policies. For details, see List of Secure Web Gateway Supported MIME Types.

▶ Explore Navigation Details and User Interface

Navigation Path: To select the Parquet Media Type, go to Policy > Web Policy > Policy > > Media Type Catalog > Databases > application/x-parquet.

Release Notes.png

Unified Policy Logic with Nested Boolean Operators GA.png

Skyhigh Secure Web Gateway now supports nested AND and OR operators within the policy engine. Unlike earlier versions, nested boolean logic can now be used inside a single rule, providing full functional parity with SWG On‑Prem policy behavior. 

Key Benefits 

  • Brings in parity between SWG Cloud and SWG On‑Prem policy logic.
  • Build more expressive, fine‑grained policies without splitting rules.

This enhancement simplifies policy design by reducing rule sprawl, ensuring a consistent security posture across cloud and on‑premises deployments, and advancing Skyhigh toward a unified policy engine across the platform. For details, see Create a Policy using Nested AND and OR Operators.

▶ Explore Navigation Details and User Interface

Navigation Path: To access AND and OR Operator, go to Policy > Web Policy > Policy > Global Bypass under the Web Rule tree> Add Custom Rule > Via Rule Builder.

Nest in.png

Enable ICAP-based DLP for Unified Data Protection  LA.png

Skyhigh now offers an Internet Content Adaptation Protocol (ICAP)-based DLP service that integrates Skyhigh DLP with third‑party proxies. This capability enables centralized inspection of data in motion without requiring changes to existing network infrastructure.

Key Benefits:

  • Gain full visibility into data in motion across all web traffic from a single policy layer.
  • Provide ICAP as a service for third- party web gateway or proxies to send traffic for inspection via Skyhigh DLP or DSPM
  • Enforce centralized DLP policies consistently across cloud and on‑premises web traffic.
  • Ensure secure, encrypted connectivity between proxies and the DLP service for safe content inspection.

This enhancement simplifies integration with existing proxy infrastructure, delivers consistent DLP enforcement across environments, and strengthens data protection through centralized visibility and control over sensitive information in motion. For details, see Enable ICAP-based DLP for Unified Data Protection.

▶ Explore Navigation Details and User Interface

Navigation Path: To access AND and OR Operator, go to Policy > Web Policy > Policy > Global Bypass under the Web Rule tree> Add Custom Rule > Via Rule Builder.

ICAP.png

Skyhigh CASB

Strengthen AI Security with Agentic AI Attribute GA.png

Skyhigh Cloud Registry now offers support for the Agentic AI attribute, which detects and tracks services that utilize Agentic AI, enhancing visibility into risk assessment and improving overall AI security posture. By flagging Agentic AI in cloud services, organizations can identify the services capable of autonomous actions, implement appropriate security controls, and strengthen governance over AI-related risks. For details, see About Agentic AI Risk Attribute.

Agentic AI refers to AI services that autonomously plan, decide, and act to achieve defined goals without direct instruction. Unlike traditional AI, which responds only to explicit prompts, agentic systems can use tools, access services, and carry out multi-step actions with minimal human involvement. If Agentic AIs are not identified within the services, organizations may struggle to pinpoint the root causes of AI-driven activities and incidents.

Key benefits of identifying Agentic AI in your cloud services:

  • Classify the service as higher risk
  • Apply enhanced monitoring and controls
  • Make informed allow/block decisions
  • Improve audit and compliance alignment
  • Reduce exposure from autonomous actions
▶ Explore Navigation Details and User Interface

Navigation Path: To view all services that utilize Agentic AI, go to Governance > Cloud Registry > Filters tab > select Agentic AI from the Risk Attributes menu.

Risk Attribute AgenticAIY_N.png

Integrate Skyhigh CASB with OpenAI ChatGPT Enterprise GA.png

Integrating Skyhigh CASB with OpenAI ChatGPT allows SOC admins to monitor and control user interactions, preventing data leaks and ensuring compliance with data privacy regulations, particularly in enterprise environments. This integration allows organizations to monitor risky user activities, maintain control over sensitive data, and safely utilize ChatGPT. For details, see About Skyhigh CASB for ChatGPT Enterprise.

▶ Explore Navigation Details and User Interface

Navigation Path: To integrate Skyhigh CASB with ChatGPT, go to Settings > Service Management.

2. Select_Service.png

Monitor User Activities, Threats, and Anomalies Using User UID GA.png

The User Unique Identification (UID) number is a unique identifier assigned to each user within an organization. The Activities, Threats, and Anomalies pages now include a User UID column in their respective tables. The User UID consolidates all activities, threats, and anomalies under a single identifier across Sanctioned, Shadow/Web, and Private applications. This enhancement facilitates efficient tracking and analysis of user activities within the organization. 

You can filter all activities related to a specific User UID using the Omnibar search and the Activities, Threats, and Anomalies Cloud Card. For details, see the Activities, Threats, and Anomalies pages.

▶ Explore Navigation Details and User Interface

Navigation Path: To view all the activities associated with the User UIDs, go to Incidents > User Activity > Activities. 

To view all the threats associated with the User UIDs, go to Incidents > Threats.

To view all the anomalies associated with the User UIDs, go to Incidents > Anomalies > Anomalies.

For7.0.1_RNs.png

Support for Salesforce Spring 2026 GA.png

Skyhigh CASB now supports the latest Salesforce Spring 2026 version. For details, see Supported Versions of Structured Apps.

Salesforce Spring 26.png

Identify Data Exfiltration Anomalies for a Unified User LA.png

Skyhigh CASB now supports a new Data Exfiltration Anomaly category for unified users. Data exfiltration anomalies refer to activities involving the unauthorized or unusual transfer of data from an organization to external destinations. This includes instances such as downloading data from sanctioned services and uploading it to shadow services. Additionally, it detects abnormal activities within the organization, such as mass downloads from sanctioned services or access to data that contradicts a user's role, particularly when sensitive or classified files are involved.

Key Benefits

  • Dynamic Detection. Moves beyond static thresholds by identifying sudden spikes in activity, role-inconsistent access, cross-domain transfers, and low-and-slow patterns that may indicate an intent to circumvent security controls. Proactive detection of data loss, clearer investigation context, and faster, risk-aligned response across cloud, web, and user activity.
  • Increased Detection Accuracy. By focusing on behavioral patterns rather than fixed criteria, the detection capabilities significantly enhance signal quality, helping you pinpoint genuine threats while minimizing false positives. Unified UEBA intelligently compares a user's current activity against their historical behavior and that of their peers, ensuring a comprehensive understanding of normal operations.

This sophisticated approach allows your security team to respond proactively to potential data exfiltration attempts, ensuring the integrity of your sensitive information. For details, see About Data Exfiltration Anomalies.

▶ Explore Navigation Details and User Interface

Navigation Path: To view data exfiltration anomalies, go to  Incidents > Anomalies > Anomalies >  Filters tab > select the Data Exfiltration Anomaly checkbox from the Anomaly Type filter.

FOR RNs.png

Additional Enhancements to Unified User Risk Tab LA.png

The Unified User Risk tab is enhanced to provide more detailed metrics on user activity and improved insights into risk attributes.

The User Risk tab has enhanced with the following capabilities: 

  • Clear visibility into the scores for each risk attribute that contributes to the overall risk category score. 
  • Risk scoring is applied at the category level, with distinct scores for Sanctioned and Shadow categories. This structure enables organized and actionable risk analysis.
  • More precise and narrowly focused results. When a risk category is selected, the results show only the attributes that contributed to the risk score, rather than all available attributes.
  • Improved accuracy of user risk scores, resulting in fewer false positives. 

These enhancements boost the unified user risk experience by providing a clearer view for analysts and executive-ready visualizations of risk, facilitating faster investigations and more effective communication of risk-related information. For details, see the User Details page.

▶ Explore Navigation Details and User Interface

Navigation Path: To view the enhanced User Risk tab, go to Analytics > User > select any user from the table > on the User Details page, select Risk tab.

Risk tab - the main image.png

Resolved and Known Issues   

new_note.png Click here to view Resolved and Known Issues

For details, see Skyhigh Security Cloud Bug Fixes and Known Issues.

Skyhigh Security Cloud Release and Support Plan

new_note.png Click here to view the Release and Support Plan

You can view the release and support plan for all Skyhigh Security Service Edge products. For details, see Skyhigh Security Cloud Release and Support Plan

View Help Content in your Preferred Language

 
new_note.png Click here to learn how to change your language

You can use the Select Language option to select a language and view the help content in that language.

Select language.png

  • Was this article helpful?