Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Skyhigh Security Cloud 6.9.2 Release Notes (Nov 2025)

Legends Used

General Availability   GA.png            Limited Availability   LA.png

 

Skyhigh Cloud Platform

Skyhigh Data Loss Prevention(DLP) 

Enhanced Data Protection with DLP Integrator 6.9.2  GA.png

Skyhigh has implemented updates to the internal cloud scanning, and the IDM training should be conducted using the latest 6.9.2 DLP Integrator to ensure accurate detections. To download the latest DLP integrator, see Download the DLP Integrator.

Discover and Analyze Sensitive Data with DSPM Data Explorer  LA.png

Skyhigh introduces the DSPM Data Explorer, a centralized dashboard that provides comprehensive visibility into an organization's complete data security posture across Skyhigh SSE. Its core purpose is to provide security teams with a single, efficient interface for continuous monitoring, proactive risk analysis, and compliance evaluation of all data, enabling in-depth security analysis and faster response times. For more details, see About Data Explorer.

A preview of some of the key features of DSPM Data Explorer is provided in the table below:

Feature

Description

Enterprise Overview of all sensitive data across SSE

Data Explorer allows you to configure and prioritize classifying the most relevant sensitive content. This capability helps in identifying additional sensitive data within your environment that may not have been initially included in your protection scope.

Email Visibility

Data Explorer enhances investigation by highlighting sensitive content within email attachments, enabling focused exploratory investigation.

Shadow IT Data Visibility

The Data Explorer enhances investigation by providing a complete view of your data estate, including data within Shadow IT. Use the dashboard to uncover valuable data insights and effectively mitigate data risks.

Automated Data Discovery and Ingestion

Skyhigh utilizes Near Real-Time (NRT) and On-Demand Scanning (ODS) technologies to automatically send relevant traffic and scanned data to the DSPM Data Explorer for recording and risk analysis.

File Search by Object Name or Digest/Hash

Data Explorer enhances investigation and prevents data exfiltration by enabling searches for top-level documents using either the Object Name or the Digest/Hash. Specifically, this capability allows you to search for:

  1. Object Name. Search by the file name for intuitive tracking of known sensitive files.
  2. Digest/Hash. Search by the document's unique cryptographic hash for forensic identification, and detect documents even if the file name is changed.

Searching in Embedded Documents 

The current version of Skyhigh DSPM Data Explorer search focuses only on the top-level documents. Searches by Object Name or Hash will only return the top-level documents. Consequently, sub-components like files within zip archives or email attachments are not included in the search results at this time.

 

▶ Explore Navigation Details and User Interface

Navigation Path: To access the Data Explorer page, go to Analytics > DSPM Data Explorer.

DE RN.jpg

View Expected Response Action for Shadow/Web DLP Incidents  LA.png 

The Policy Incidents page now displays the Expected Response for Shadow/Web DLP Incidents. This Expected Response action is configured during DLP policy creation and defines the intended action when a policy violation occurs. This helps SOC administrators identify potential discrepancies between the Expected Response and the actual Incident Response taken during policy evaluation, which is vital for troubleshooting and refining security policies for robust data protection and operational efficiency.

How to use this capability? 
  1. Search for Expected Response. You can use the Omnibar on the Policy Incidents page to search for a specific Expected Response action. This capability enables quick access to Shadow/Web DLP incidents associated with specific policies.
  2. View Expected Response in the Incident Table. The Expected Response column in the incident table is not visible by default. You need to add the Expected Response column to the incident table. For details, see Shadow/Web DLP Incidents.
▶ Explore Navigation Details and User Interface

Navigation Path: To access the Expected Response action, go to Incidents > Policy Incidents > Incident Type filter > Shadow/Web DLP > Actions > Edit Table Column > Add Expected Response column.

Policy_Incidents.png

  1. View Expected Response on Policy Incident Cloud Card. Click any Web DLP incident on the Incidents table to see the Expected Response action for that incident. This helps to review the Expected Response defined in the DLP policy against the actual Incident Response triggered after the incident is generated. For details, see Shadow/Web DLP Policy Incident Cloud Card
▶ Explore Navigation Details and User Interface

Navigation Path: To access the Expected Response action, go to  Incidents > Policy Incidents > Incident Type filter > Shadow/Web DLP > and click any incident on the table.

Shadow_Web_DLP_incidnet_CC.png

Skyhigh SSE Products

Remote Browser Isolation

Enhance Data Security with Webpage Watermark  GA.png

Skyhigh now adds a watermark to the background of every webpage you browse. To enable this feature, select the Enable webpage watermarking checkbox, located under the Full Isolation / Risky Isolation pages Browser Settings section. The watermarks display your Username or Email ID diagonally across the background, depending on your authentication method and the client used. This feature promotes accountability, enables tracking in case of data leaks, and prevents unauthorized sharing of sensitive information. For details, see Full Isolation — Use Browser Isolation for Websites Based on Your Own Selection.

▶ Explore Navigation Details and User Interface

Navigation Path: To configure the Watermarking option in Full Isolation or Risky Web, go to  Policy > Web Policy > Policy > Browser Isolation > Full Isolation or Risky Web> Browser Settings

Browser Settings - Full Isolation-coming soon.png

A sample screenshot with the applied watermark on the background of the webpage is available below for reference:

Sample Image with the watermak.png

Skyhigh Private Access 

Deploy Secure App Connector V3  GA.png  

A Secure App Connector is a component of Private Access (ZTNA) that acts as an interface between private applications and the Skyhigh Security Service Edge (SSE), enabling users to securely access private applications hosted within the organization’s network. Starting with Secure App Connector V3 for VMware OVA (vCenter and vSphere), Skyhigh is migrating the base operating system to the Skyhigh Linux Operating System (SLOS) to enhance stability and security.  For details, see Secure App Connector V3.

Support Secure Connectivity for Domain Services GA.png 

Skyhigh Private Access now supports defining UDP/DNS traffic as a Private Application. This enhancement allows administrators to securely route all DNS queries (port 53) from remote clients to internal Domain Controllers, enabling seamless remote access to critical Active Directory Domain Services such as Kerberos, LDAP, and SMB/CIFS.

This capability uses granular, identity-based Zero Trust policies to secure connectivity of core domain functions, thereby minimizing broad network exposure risks.

Users and Devices can securely connect to specific domain services for performing the essential operations, such as file sharing, password resets, and policy updates, without requiring full network access.

Skyhigh CASB

Consolidate User Identities with User Unification LA.png

The User Unification capability consolidates user identities across the SSE platform, allowing administrators to correlate the activities of users who access both Sanctioned and Shadow services. This enables SOC administrators to monitor all user activities through a unified identity and perform comprehensive threat investigations for individual users.

The User Unification capability creates a single User UID for each user across all Skyhigh products, consolidating multiple identities. For instance, if a user downloads a file from a Sanctioned SaaS app like Box and uploads it to a Shadow app like Sendspace, their activities are tracked separately, by email in Box and by SAM account name in Sendspace. Without unification, the SOC administrator runs two separate searches. With User Unification, Skyhigh assigns each user a unique User UID, enabling all activities to be accessed via a single identifier.

To identify unique users with multiple identities, integrate Skyhigh Cloud Connector with your organization's Active Directory, LDAP, or CSV file . These unique users are then displayed on the Users page.

Key Benefits

  • Unified Activity Monitoring. Gain a comprehensive view of all activities for a single user by using their unique User UID to track both Sanctioned and Shadow service usage.
  • Unified Threat Protection. Detect user-related anomalies and threats by monitoring activities across both Sanctioned and Shadow services.
  • Unified User Risk Score. Calculate user risk scores using combined data from Sanctioned, Shadow, and Web services.

To get started with User Unification and to know about the Skyhigh Cloud Connector configurations, see Getting Started with User Unification and Configure Cloud Connector to Consolidate User Identities.

Monitor and Evaluate Unified User Risks LA.png

The Users page displays all unique users across Skyhigh SSE products. These unique users are retrieved from your organization’s Active Directory (AD), LDAP, or CSV files integration via the Skyhigh Cloud Connector. The Users page offers detailed insights into each user’s risk posture, activities, and potential threats, serving as a starting point for user-level threat evaluations. It provides visibility into users accessing Sanctioned and Shadow services, highlighting associated risks: User Risk, Data Risk, Sanctioned Risk, and Shadow Risk. User Risk represents a unified score that combines Data, Sanctioned, and Shadow risks, including Web DLP incidents. For details, see the Users page.

These enhancements give administrators a complete view of user behavior and exposure by correlating risk data across Sanctioned SaaS, Shadow SaaS, and Web activities.

▶ Explore Navigation Details and User Interface

Navigation Path: To access the Users page, go to  Analytics > Users.

Users_Page.png

Enhanced User Experience for Shadow Users LA.png

The following updates to the Shadow Users page and Shadow User Cloud Card improve visibility into user activity and risk analysis:

  • To align with the focus on Shadow service activities, the Users page is renamed to Shadow Users.
  • The Risk column displays the Unified Risk Score for each user, calculated using data from Sanctioned SaaS, Shadow SaaS, and Web DLP incidents.
▶ Explore Navigation Details and User Interface

Navigation Path: To access the Shadow Users page, go to  Analytics > Shadow Users.

Risk and Page title_For RNs.png

  1. The Shadow User Cloud Card is enhanced to provide deeper visibility into user activity and risk posture across Sanctioned and Shadow services. These UI enhancements enable administrators to quickly assess user risk, investigate anomalies, and correlate activities across cloud applications and web traffic. The updated card now includes:

  1. Mini cards for quick insights into key metrics, such as Services, Total Upload Data, High Risk Services, Unique Devices, Unmatched Uploads, and Activities.
  2. User UID to filter unique users.
  3. Hyperlinks to related pages, including the Users page, User Details page (for sanctioned risk score), and Web Users page, to view detailed risk and activity information for a specific user. 

For details, see About Shadow Users

▶ Explore User Interface

CloudCard_ForRNs.png

Track LLM Risks and AI Service Incidents Using Saved Views and Dashboard Cards LA.png

Skyhigh now allows you to track LLM Risks and AI Service incidents using Skyhigh Recommended Saved Views and Default AI Dashboard Cards. You can find the recommended saved views for LLM risk attributes on the Users and Services page and Microsoft 365 Copilot and ChatGPT incident-related saved views on Policy Incidents page. These saved views are automatically displayed as dashboard cards on the Default AI Dashboard.

Skyhigh Recommended Saved Views on Users and Services Page

On the Users and Services pages, Skyhigh CASB provides the following recommended saved views for real-time visibility into risk attributes of LLM-based AI services. 

  • High Risk Jailbreak AI Services Usage. Use this predefined view to identify AI services associated with the High-Risk Jailbreak LLM risk attribute.
  • High Risk Malware AI Services Usage. Use this predefined view to identify AI services associated with the High-Risk Malware LLM risk attribute.
  • High Risk National Institute of Standards and Technology (NIST) Services Usage. Use this predefined view to identify AI services associated with the High-Risk NIST LLM risk attribute.
  • High Risk Open Worldwide Application Security Project (OWASP) Services Usage. Use this predefined view to identify AI services associated with the High-Risk OWASP LLM risk attribute.

Use these recommended saved views to monitor potential risks linked to LLM-based AI services, identify unusual trends or security threats, and take necessary actions, such as blocking specific AI services, to ensure compliance with security standards. For details, see Saved View to Identify AI Services with High-Risk LLM Attributes.

▶ Explore Navigation Details and User Interface

Navigation Path: To access the Skyhigh recommended saved views, go to Analytics > Users or Services page > Views > Skyhigh Recommended > select saved view from the list.

Jailbreak.png

Skyhigh Recommended Saved Views on Policy Incidents Page

The Policy Incidents page now provides the following recommended saved views to list the incidents related to Microsoft 365 Copilot and ChatGPT:

  • Microsoft 365 Copilot Incidents. Use this predefined view to list incidents associated with Microsoft 365 Copilot.
  • ChatGPT Incidents. Use this predefined view to list incidents associated with ChatGPT.

For Skyhigh recommended saved views, see Policy Incidents.

▶ Explore Navigation Details and User Interface

Navigation Path: To access the Skyhigh recommended saved views, go to Incidents > Policy Incidents > Policy Incidents > Views > Skyhigh Recommended > select saved view from the list.

Copilot Filter.png

Default AI Dashboard Cards for LLM Risk Attributes and Copilot/ChatGPT Incidents

The Skyhigh-recommended saved views are displayed as cards on the AI Dashboard, offering insights into AI service usage, LLM risks, and related incidents of Microsoft 365 Copilot and ChatGPT. These dashboard cards enable security teams to identify high-risk AI behaviors, monitor DLP policy violations, and strengthen visibility into enterprise AI adoption. For details, see AI Dashboard.

▶ Explore Navigation Details and User Interface

Navigation Path: To access the Skyhigh recommended saved views, go to Dashboards > Skyhigh Default > AI Dashboard.

Nine dashboards Complete data.png

Configure Roles to View Cloud Usage Analytics on the Cloud Registry and Services Pages LA.png

Users with only the Cloud Registry role cannot access usage analytics information. To access usage information of a service (such as usage reports, analytics, and activity metrics) on the Cloud Registry and Services pages, users must have the Usage Analytics role in addition to the Cloud Registry role. For details, see Create a New User.

Resolved and Known Issues   

new_note.png Click here to view Resolved and Known Issues

For details, see Skyhigh Security Cloud Bug Fixes and Known Issues.

Skyhigh Security Cloud Release and Support Plan

new_note.png Click here to view the Release and Support Plan

You can view the release and support plan for all Skyhigh Security Service Edge products. For details, see Skyhigh Security Cloud Release and Support Plan

View Help Content in your Preferred Language

 
new_note.png Click here to learn how to change your language

You can use the Select Language option to select a language and view the help content in that language.

Select language.png

  • Was this article helpful?