Read the full guide | Report an issue
The official command-line interface for the Netskope platform. Manage your tenant, query events, investigate alerts, configure policies, and more — all from your terminal.
Available as both netskope and the shorter alias ntsk.
pip install netskopebrew tap netskopeoss/tap
brew install netskopepipx installs the CLI in its own virtual environment so it won't conflict with other Python packages.
# Install pipx if you don't have it
# macOS
brew install pipx && pipx ensurepath
# Linux
python3 -m pip install --user pipx && pipx ensurepath
# Windows
py -m pip install --user pipx && pipx ensurepath
# Then install Netskope CLI
pipx install netskope# Using pip (requires Python 3.11+)
py -m pip install netskope
# Or using pipx
py -m pipx install netskopegit clone https://github.com/netskopeoss/netskope-cli.git
cd netskope-cli
pip install .ntsk --version
ntsk --helpntsk config set-tenant mytenant.goskope.comOption A — API token:
export NETSKOPE_API_TOKEN="your-token"Option B — Browser SSO login:
ntsk auth login# Check setup and connectivity
ntsk doctor
# Tenant health overview
ntsk status
# Extended status with SCIM groups, URL lists, NPA rules, IPsec, RBAC, IPS
ntsk status --extended
# List recent alerts
ntsk alerts list --since 24h --limit 10
# Look up a specific alert by ID
ntsk alerts get f1c18fd0065a21e4ace54efb
# Find alerts for a specific user
ntsk alerts get --user alice@example.com --since 7d
# Alert summary by type
ntsk alerts summary --by severity
# Search events by type
ntsk events list --type alert --limit 20
# Look up events by user and app
ntsk events get --type application --user alice@example.com --since 7d
# Find blocked page events for a domain
ntsk events get --type page --domain example.com --action block
# List users (with group membership data)
ntsk users list
# Export incidents as CSV
ntsk incidents list -o csv > incidents.csv
# View URL lists used in policies
ntsk policy url-list listEvery command supports multiple output formats via the -o / --output flag:
| Format | Flag | Description |
|---|---|---|
| Table | -o table |
Human-friendly table (default in TTY) |
| JSON | -o json |
Pretty-printed JSON |
| JSONL | -o jsonl |
One JSON object per line |
| CSV | -o csv |
Comma-separated values |
| YAML | -o yaml |
YAML output |
# Pipe JSON output to jq
ntsk alerts list -o json | jq '.[] | .alert_name'
# Export users to CSV
ntsk users list -o csv > users.csv| Flag | Description |
|---|---|
-W / --wide |
Show all table columns without truncation |
--raw |
Include internal _-prefixed fields in output |
--count |
Print the record count (subject to --limit) |
--epoch |
Keep timestamps as raw Unix epoch integers |
-q / --quiet |
Suppress spinners and informational messages |
--no-color |
Disable coloured output |
-v / --verbose |
Increase verbosity (-vv for debug) |
| Category | Commands |
|---|---|
| Status & Setup | doctor, tenant, status, status --extended, commands, commands --flat |
| Events | events get, events list --type alert|application|network|... |
| Alerts | alerts get, alerts list, alerts summary, alerts types |
| Incidents | incidents list, incidents search, incidents uci |
| Users & RBAC | users list, users get, users groups list, users groups members, rbac roles list |
| Policy | policy url-list list, policy deploy |
| Auth & Config | auth login, auth logout, config set-tenant, config set-token |
| Tokens | tokens list, tokens create, tokens revoke |
| Publishers | publishers list |
| NPA | npa apps list, npa publishers list, npa policy list |
| Steering | steering private-apps list, steering config get |
| Devices | devices list, devices tags list |
| Enrollment | enrollment list, enrollment create |
| IPSec | ipsec tunnels list, ipsec pops list |
| DNS | dns profiles list, dns categories |
| Services | services cci APP_NAME, services tags list |
| DSPM | dspm resources list, dspm datastores list |
| SPM | spm inventory list, spm posture |
| ATP | atp scan-file, atp scan-url |
| IPS | ips status, ips allowlist list |
| Threat Intel | intel url-lookup, intel recategorize |
| RBI | rbi apps list, rbi browsers list |
| DEM | dem metrics query, dem entities list, dem fields list, dem experience-alerts search, dem apps list, dem probes list |
| Notifications | notifications templates list |
| Docs | docs open, docs search, docs jql |
Run ntsk --help or ntsk <command> --help for full details.
ntsk commands # Browse the full command tree with argument signatures
ntsk commands --flat # All commands with [read]/[write] safety tags
ntsk commands --flat --json # Flat JSON with mode + supports_yes_flag (best for agents)
ntsk commands --json # Full JSON tree with args, options, and descriptions
ntsk dspm list-types # List valid DSPM resource typesThe commands --flat output lists every leaf command with [read]/[write] tags — the fastest way for a script or AI agent to discover all available commands and their safety level. The --flat --json variant adds "mode" and "supports_yes_flag" fields for programmatic use. Write commands prompt for confirmation; pass --yes to skip.
| Variable | Description |
|---|---|
NETSKOPE_API_TOKEN |
API v2 token for authentication |
NETSKOPE_TENANT |
Tenant hostname (overrides config file) |
NETSKOPE_PROFILE |
Configuration profile to use |
NETSKOPE_CA_BUNDLE |
Custom CA bundle path (for SSL inspection) |
NETSKOPE_WIDE |
Set to 1 to show all table columns |
NO_COLOR |
Disable coloured output when set |
# Check which values are active and their sources
ntsk config show# Bash
ntsk completion install bash
# Zsh
ntsk completion install zsh
# Fish
ntsk completion install fish
# PowerShell
ntsk completion install powershellA ready-to-use Claude Code skill is included at .claude/commands/netskope.md. It teaches an AI agent how to use every netskope CLI command — including flags, field names, gotchas, and workflow patterns.
Setup: Copy the file into your project's .claude/commands/ directory (or symlink it), then use the /netskope slash command in Claude Code:
/netskope show me high severity alerts from the last 24 hours
/netskope investigate user alice@example.com
/netskope export application events from last 7 days as CSV
The skill is also available as a copyable block in the interactive guide.
- Python 3.11 or later
- A Netskope tenant with API access
MIT