Zscaler Internet Access Platform Services Document Zscaler’s Security-as-a-Service cloud platform delivers a safe and productive Internet experience for every user, from any device and from any location. Zscaler effectively moves security into the Internet backbone, operating in more than 100 data centers around the world and enabling organizations to fully leverage the promise of cloud and mobile computing with unparalleled and uncompromising protection and performance. Zscaler delivers unified, carrier-grade Internet security, advanced persistent threat (APT) protection, data loss prevention (DLP), SSL inspection, traffic shaping, policy management and threat intelligence. The Security-as-aService cloud platform offers more than just IT scalability; it allows an organization to scale its business operations securely without the need for on-premises hardware, appliances, or software. ZSCALER CONFIDENTIAL INFORMATION ©2020 Zscaler, Inc. All rights reserved. 1 / Zscaler Internet Access Platform Services Document Table of Contents Introduction................................................................................................................................ 8 Zscaler Internet Access: Key Features ......................................................................................... 9 Zscaler Cloud-Based Architecture ...............................................................................................11 SLA for High Availability and Latency ..........................................................................................14 Traffic Forwarding: GRE Tunnels, IPSec Tunnels, PAC Files, and Proxy Chaining .......................... 15 Overview .....................................................................................................................................15 Description ..................................................................................................................................15 Customer Responsibilities ...........................................................................................................20 Dedicated Proxy Port ................................................................................................................ 21 Overview .....................................................................................................................................21 Description ..................................................................................................................................21 Customer Responsibilities ...........................................................................................................21 Authentication: SAML, LDAP, Passwords, Kerberos, ZAB, SCIM, and Surrogate IP....................... 22 Overview .....................................................................................................................................22 Description ..................................................................................................................................22 Logging and Reporting .............................................................................................................. 29 Overview .....................................................................................................................................29 Description ..................................................................................................................................29 Customer Responsibilities ...........................................................................................................30 Zscaler Nanolog Streaming Service (NSS) for Web Logs .............................................................. 31 Overview .....................................................................................................................................31 Description ..................................................................................................................................31 Customer Responsibilities ...........................................................................................................32 Zscaler Nanolog Streaming Service (NSS) for Firewall and DNS Logs ........................................... 33 Overview .....................................................................................................................................33 Description ..................................................................................................................................33 ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 2 / Zscaler Internet Access Platform Services Document Customer Responsibilities ...........................................................................................................34 Malware Protection .................................................................................................................. 35 Overview .....................................................................................................................................35 Description ..................................................................................................................................35 Customer Responsibilities ...........................................................................................................36 Advanced Threats Protection .................................................................................................... 37 Overview .....................................................................................................................................37 Description ..................................................................................................................................37 Customer Responsibilities ...........................................................................................................38 Sandbox.................................................................................................................................... 39 Overview .....................................................................................................................................39 Description ..................................................................................................................................39 Customer Responsibilities ...........................................................................................................42 Browser Control ........................................................................................................................ 43 Overview .....................................................................................................................................43 Description ..................................................................................................................................43 Customer Responsibilities ...........................................................................................................43 URL Filtering ............................................................................................................................. 44 Overview .....................................................................................................................................44 Description ..................................................................................................................................44 Customer Responsibilities ...........................................................................................................45 Firewall Policy ........................................................................................................................... 46 Overview .....................................................................................................................................46 Description ..................................................................................................................................46 Customer Responsibilities ...........................................................................................................50 FTP Control ............................................................................................................................... 51 Overview .....................................................................................................................................51 Description ..................................................................................................................................51 ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 3 / Zscaler Internet Access Platform Services Document Customer Responsibilities ...........................................................................................................51 Bandwidth Control .................................................................................................................... 52 Overview .....................................................................................................................................52 Description ..................................................................................................................................52 Customer Responsibilities ...........................................................................................................53 SSL Inspection ........................................................................................................................... 54 Overview .....................................................................................................................................54 Description ..................................................................................................................................54 Customer Responsibilities ...........................................................................................................55 SSL Inspection with Customer Root Certificate .......................................................................... 56 Overview .....................................................................................................................................56 Description ..................................................................................................................................56 Customer Responsibilities ...........................................................................................................56 Data Loss Prevention (DLP) ....................................................................................................... 58 Overview .....................................................................................................................................58 Description ..................................................................................................................................58 Customer Responsibilities ...........................................................................................................59 API-based CASB ........................................................................................................................ 60 Overview .....................................................................................................................................60 Description ..................................................................................................................................60 Customer Responsibilities ...........................................................................................................60 Cloud Application Control ......................................................................................................... 61 Overview .....................................................................................................................................61 Description ..................................................................................................................................61 Customer Responsibilities ...........................................................................................................62 Zscaler Identity Proxy ................................................................................................................ 63 Overview .....................................................................................................................................63 Description ..................................................................................................................................63 ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 4 / Zscaler Internet Access Platform Services Document Customer Responsibilities ...........................................................................................................63 File Type Control ....................................................................................................................... 64 Overview .....................................................................................................................................64 Description ..................................................................................................................................64 Customer Responsibilities ...........................................................................................................64 Zscaler Client Connector............................................................................................................ 65 Overview .....................................................................................................................................65 Description ..................................................................................................................................65 Customer Responsibilities ...........................................................................................................66 Mobile Malware Protection ...................................................................................................... 67 Overview .....................................................................................................................................67 Description ..................................................................................................................................67 Customer Responsibilities ...........................................................................................................67 Mobile Applications Control ...................................................................................................... 68 Overview .....................................................................................................................................68 Description ..................................................................................................................................68 Customer Responsibilities ...........................................................................................................68 Priority Categorization Service .................................................................................................. 69 Overview .....................................................................................................................................69 Description ..................................................................................................................................69 Server/IoT Protection................................................................................................................ 70 Overview .....................................................................................................................................70 Description ..................................................................................................................................70 Customer Responsibilities ...........................................................................................................70 Inline Guest Wi-Fi Protection..................................................................................................... 71 Overview .....................................................................................................................................71 Description ..................................................................................................................................71 Customer Responsibilities ...........................................................................................................71 ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 5 / Zscaler Internet Access Platform Services Document Private ZENs (PZENs) ................................................................................................................. 72 Overview .....................................................................................................................................72 Description ..................................................................................................................................72 Customer Responsibilities ...........................................................................................................73 Virtual ZENs (VZENs) ................................................................................................................. 74 Overview .....................................................................................................................................74 Description ..................................................................................................................................74 Customer Responsibilities ...........................................................................................................75 Private Service Edge .................................................................................................................. 76 Overview .....................................................................................................................................76 Description ..................................................................................................................................76 Customer Responsibilities ...........................................................................................................77 Virtual Service Edge .................................................................................................................. 78 Overview .....................................................................................................................................78 Description ..................................................................................................................................78 Customer Responsibilities ...........................................................................................................79 Private Nanolog Streaming Service (NSS) Appliance for Web Logs .............................................. 81 Overview .....................................................................................................................................81 Description ..................................................................................................................................81 Customer Responsibilities ...........................................................................................................82 Intelligent Routing (Guest Wi-Fi) ............................................................................................... 83 Overview .....................................................................................................................................83 Description ..................................................................................................................................83 Customer Responsibilities ...........................................................................................................84 Zscaler Test Tenants .................................................................................................................. 86 Overview .....................................................................................................................................86 Description ..................................................................................................................................86 Customer Responsibilities ...........................................................................................................86 ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 6 / Zscaler Internet Access Platform Services Document Cloud Browser Isolation ............................................................................................................ 87 Overview .....................................................................................................................................87 Description ..................................................................................................................................87 Customer Responsibilities ...........................................................................................................88 ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 7 / Zscaler Internet Access Platform Services Document Introduction The IT landscape has shifted dramatically in today’s world. Cloud computing, mobility, and the Internet of Things are massive, unstoppable trends and have created new challenges for IT departments, ranging from security against new threat vectors to ensuring compliance with corporate policies and protecting against data loss. Organizations are finding that individual point solutions like firewalls, UTMs, IdPs, and virus scanning have difficulty addressing constantly changing threats and are challenging to tie together in a cohesive fashion to effectively identify and block the full breadth of threats. Further, organizations are seeing that such centralized, hardwarebased security gateways simply no longer make sense in today's perimeter-less Internet, cloud, and mobile-first world. Organizations are looking to cloud-based solutions to reduce security administrative overhead and streamline capital investments in security infrastructure. They are seeing the significant value of purchasing security-as-a-service with a Service Level Agreement (SLA) as opposed to purchasing numerous point products that address individual issues and are limited to the corporate perimeter. Zscaler Internet Access (ZIA) meets all these needs and more. Zscaler offers a unified Security-asa Service cloud platform that seamlessly integrates multiple security and compliance applications without the need for on-premises hardware, appliances, or software. The platform provides pervasive security for an organization’s users, scanning all inbound and outbound traffic in real time to ensure compliance with corporate policies and protection from the latest threats. Further, Zscaler’s cloud platform protects users across locations and devices, following users wherever they may be accessing the Internet, and enables access to transaction logs and interactive reports across devices, locations, applications, and platforms to help organizations understand their global security and compliance posture. Finally, Zscaler’s multitenant architecture ensures that organizations benefit from the “network effect.” When a new threat is identified for any one of Zscaler’s more than 5,000 customers, Zscaler immediately updates its signatures, thus protecting all users across its network. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 8 / Zscaler Internet Access Platform Services Document Zscaler Internet Access: Key Features For a list of the ZIA product suites available, see the ZIA Data Sheet. • Unified Policy and Reporting: Through one unified Zscaler Admin Portal, create and manage security policies, view policy recommendations, and perform reporting and analysis of traffic across devices and locations. You can also access supplemental information quickly with tooltips for each field. Through the customizable Admin Portal dashboard, gain real-time visibility into Internet traffic so that quick action can be taken upon anomalous trends or security threats. • Role-based Administration: Control what different admins can do in the ZIA Admin Portal by delegating responsibilities and granularly controlling levels of access to the Admin Portal, ensuring that admins do not create conflicting policies and settings. • Inline Threat Protection: Scan all HTTP/HTTPS inbound/outbound traffic, including SSL encrypted traffic, to secure devices, users, data, and web applications against advanced security threats. • Behavioral Analysis (BA): Implement non-signature based protection against zero-day exploits. • Patient 0 Alert: If your Sandbox policy is configured to allow and scan files for the first-time action, the Zscaler service allows users to download unknown files and then sends the files to the Sandbox for behavioral analysis. If a file is found to be malicious, this becomes a patient 0 event. • URL Filtering: Protect your organization from harmful URLs using granular policies that specify who can access what when, where, and how. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 9 / Zscaler Internet Access Platform Services Document • Cloud Application Control: Manage access to cloud applications like webmail, streaming media, social networking, and instant messaging with granular policies that specify who can access what when, where, and how. • Bandwidth Control: Allocate bandwidth to prioritize business-critical web applications. • Data Loss Prevention (DLP): Protect users across devices and networks to ensure data security, data privacy, and regulatory requirements are met. • Nanolog Streaming Service (NSS): Seamlessly transmit web and firewall logs from the Zscaler Cloud to the enterprise security information and event management (SIEM) in real time. • Zscaler Splunk App: The Zscaler Splunk App provides detailed dashboards and reporting for all Zscaler products using ZIA Nanolog Streaming and ZPA Log Streaming services. The Zscaler Client Connector for Splunk can also ingest DLP incident information, bringing full context for DLP incidents directly into Splunk. • User Authentication: Authenticate users with existing security frameworks, including local password files, Active Directory, Open LDAP, SAML, and Kerberos. • Mobile Security: Apply consistent user-based policy across mobile devices, track mobile traffic, and protect against web-based threats and malicious apps. • Next Generation Firewall: Protect users connecting to the Internet with application visibility and user access-level controls for all ports and protocols. • DNS Tunneling Detection: DNS Tunneling can be used to circumvent traditional security measures and has the potential to introduce a variety of hazards into networks. To counteract this threat, Zscaler has introduced the ability to detect, control, and analyze tunneling traffic. • MCAS Integration: You can now set up an MCAS integration within the Admin Portal to allow the Zscaler service to discover and sync Cloud Apps. Integrating with MCAS allows you to utilize the Zscaler service's policy management functionality (i.e., URL filtering, custom category and Cloud App control) for blocking non-sanctioned applications. • SD-WAN Partner Support: You can now create and manage Software-Defined Wide Area Networking (SD-WAN) partner keys that enable cloud service API access to your locations and VPN credential information. • IKEv2 Support: Zscaler now supports the Internet Key Exchange version 2 (IKEv2) protocol to negotiate IPSec VPN Tunnels. IKEv2 is a fast, less complicated control protocol. It improves on IKEv1 vulnerabilities and simplifies the Security Association (SA) negotiation process. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 10 / Zscaler Internet Access Platform Services Document • Zscaler Client Connector: Install on devices to protect traffic even when users are outside the corporate network. • Shift: Protect users with Zscaler’s DNS anycast servers as well as inline inspection and malware protection. • Virtual Service Edge & Virtual ZENs (VZENs): Deploy to extend Zscaler’s cloud architecture to the customer’s organizational premises using virtual machines (recommended only for organizations with specific regulatory or connectivity requirements). • Packaging Options: Choose from multiple service packages to best address unique business requirements. • Support: Receive expert management and monitoring of all deployed security policies. Zscaler Cloud-Based Architecture Zscaler operates the world’s largest security-as-a-service cloud platform to provide the industry’s only 100% cloud-delivered web and mobile security solution. The Zscaler platform processes more than 40 billion transactions daily from more than 15 million users in 190 countries, across more than 100 data centers located at strategic inter-connection points across the Internet. All hub data centers are certified as ISO 27001 or SAS70 (or a similar local certification) as applicable and are Tier III facilities with redundant connectivity into multiple backbones and dual power feeds with UPS and backup generators. They also possess fire detection and suppression equipment. Failover from one data center to another is seamless. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 11 / Zscaler Internet Access Platform Services Document Zscaler has a highly scalable, global multi-cloud infrastructure. An organization is provisioned on one cloud and its traffic is processed by that cloud only. The name of the cloud on which an organization is provisioned is specified in the administrative URL that the customer admin uses to log in to Zscaler. For example, if an organization logs into https://admin.zscaler.net, then the organization is provisioned on the zscaler.net cloud. Each Zscaler cloud has three key components—the Central Authority, ZIA Public Service Edges and Nanolog clusters. The Central Authority (CA) is the brain and nervous system of a Zscaler cloud. It monitors the cloud and provides a central location for software and database updates, policy and configuration settings, and threat intelligence. The CA consists of one active server and two servers in passive standby mode. The active CA replicates data in real time to the two standby CAs, so any of them can become active at any time. Each server is hosted in a separate location to ensure fault tolerance. ZIA Public Service Edges are full-featured inline Internet security gateways that inspect all Internet traffic bi-directionally for malware and enforce security and compliance policies. An organization can forward its traffic to any ZIA Public Service Edge in the world or use the advanced geo-IP resolution capability of Zscaler to direct its users’ traffic to the nearest ZIA Public Service Edge. When the user moves to a different location, the policy follows the user, with the ZIA Public Service ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 12 / Zscaler Internet Access Platform Services Document Edge downloading the appropriate policy. Each ZIA Public Service Edge can handle hundreds of thousands of concurrent users with millions of concurrent sessions. Except for sandboxing, all inspection engines run within the ZIA Public Service Edge. Customer traffic is not passed to any other component within the Zscaler infrastructure. The TCP stack on the ZIA Public Service Edge runs in user mode and is specially crafted to ensure multitenancy and data security. ZIA Public Service Edges never store any data to disk. Packet data is held in memory for inspection and then, based on policy, is either forwarded or dropped. Log data generated for every transaction is compressed, tokenized, and exported over secure TLS connections to Log Routers that direct the logs to the Nanolog cluster, hosted in the appropriate geographical region, for each organization. ZIA Public Service Edges are always deployed in active-active load balancing mode all over the world, and the CA monitors the health of ZIA Public Service Edges to ensure availability. Nanolog clusters store transaction logs and provide reports. Each cluster consists of one active server and two servers in passive standby mode. The active Nanolog immediately replicates data to the other two servers, so any of them can become active at any time, with no data loss. Each Nanolog server is hosted in a separate location to ensure fault tolerance. Every second, a Nanolog cluster receives logs from all over the world, correlates them to a specific customer organization, and writes them to disk for high-speed retrieval of reporting and analytics. A Nanolog cluster processes over 12 billion logs per day. Additionally, Zscaler offers a Nanolog Streaming Service (NSS), which uses a virtual appliance to stream web and firewall traffic logs in real time from the Zscaler Nanolog to the customer’s security information and event management (SIEM) system. Additionally, each cloud has various support systems and servers, including: • Sandbox servers, where files selected for BA are sent for analysis and reports are stored. • PAC file servers, which host Zscaler PAC files and custom PAC files uploaded to Zscaler. Configuring browsers to use PAC files is one of the traffic forwarding methods that Zscaler supports. • Administrative interface servers, which provide an intuitive, multi-tenant interface for policy management and reporting. • Log Routers, which ensure logs for each organization are stored in the appropriate Nanolog cluster. All components communicate with each other over an encrypted SSL tunnel. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 13 / Zscaler Internet Access Platform Services Document Finally, Zscaler Feed Central is a separate Zscaler cloud used solely for the centralized distribution of various feeds to the Zscaler clouds. Zscaler has a number of partnerships—with Microsoft, Google, RSA, Verisign, and others—for getting data feeds, including feeds for URL filtering, antivirus definitions, and IP reputation. Zscaler Feed Central distributes its threat intelligence and other feeds to the CA, which then sends updates to the ZIA Public Service Edges, ensuring that every ZIA Public Service Edge has the latest version of the URL database and the latest malware and threat information. SLA for High Availability and Latency With Zscaler’s high-performance architecture, customers can enable all features and provide full security to users without compromising performance. Zscaler provides Service Legal Agreements (SLA) for high availability and latency (see http://www.zscaler.com/legal/end-user-subscriptionagreement.php). Customers can validate that SLAs are met by going to https://trust.zscaler.com, where they can find updated information about each cloud's status, maintenance, and incident events. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 14 / Zscaler Internet Access Platform Services Document Traffic Forwarding: GRE Tunnels, IPSec Tunnels, PAC Files, and Proxy Chaining Overview Customer organizations must forward all Internet traffic to Zscaler to allow Zscaler to scan web and mobile traffic bi-directionally. Zscaler supports several methods for forwarding Internet traffic, including GRE tunnels, IPSec tunnels, PAC files, and proxy chaining. Zscaler recommends that customers use a combination of tunneling and PAC files to forward traffic to Zscaler. If the customer has an internal router, switch, or firewall that supports GRE, and the egress port has a static address, Zscaler recommends that the customer configure a GRE tunnel to forward all outbound traffic from the customer’s location to Zscaler. If the customer’s router or firewall does not support GRE or if the customer uses dynamic IP addresses, the customer can use an IPSec VPN tunnel instead. Note that IPSec tunnels have additional processing overhead on the customer’s equipment, compared to GRE tunnels. Zscaler also recommends that the customer deploy mechanisms such as IP SLA to monitor tunnel health and enable fast failover. In addition to the GRE or IPSec VPN tunnel, Zscaler recommends that customers install a PAC file for each user to ensure coverage outside the corporate network. Description Zscaler supports the following forwarding methods. GRE Tunnel • If the customer has an internal router, switch, or firewall that supports GRE, and the egress port has a static address, Zscaler recommends that the customer configure a GRE tunnel to forward all outbound traffic from the customer’s location to Zscaler. • Zscaler recommends that the customer also install a PAC file for each user to ensure coverage outside the corporate network. • Zscaler recommends the following deployments. They provide visibility into the internal IP addresses, which can be used for Zscaler security policies and logging. They also ensure ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 15 / Zscaler Internet Access Platform Services Document high availability. If the primary GRE tunnel or an intermediate connection goes down, all traffic is then rerouted through the backup GRE tunnel to the secondary data center. o GRE tunnels from the internal router to the ZIA Public Service Edges: Configure two GRE tunnels from an internal router behind the firewall to the ZIA Public Service Edges—a primary tunnel from the router to a ZIA Public Service Edge in one data center, and a secondary tunnel from the router to a ZIA Public Service Edge in another data center. o GRE tunnels from the corporate firewall to the ZIA Public Service Edges: Configure two GRE tunnels from the firewall to the ZIA Public Service Edges—a primary tunnel from the firewall to a ZIA Public Service Edge in one data center, and a secondary tunnel from the firewall to a ZIA Public Service Edge in another data center. The customer must ensure that if the primary tunnel goes down, the router detects it and changes the routing table or routing instance so that the secondary tunnel is used for traffic forwarding and vice versa, with mechanisms like IP SLA that are native to the router. IPSec VPN Tunnel • If the customer’s router or firewall does not support GRE, or if the customer uses dynamic IP addresses, the customer can use an IPSec VPN tunnel to forward traffic to Zscaler. • Zscaler recommends that the customer also install a PAC file for each user to ensure coverage outside the corporate network. • Zscaler recommends the following deployments. They provide visibility into the internal IP addresses, which can be used for Zscaler security policies and logging. They also ensure high availability. If the primary tunnel or an intermediate connection goes down, all traffic is then rerouted through the backup tunnel to the secondary data center. • IPSec tunnels from the internal router to the ZIA Public Service Edges: Configure two IPSec tunnels from an internal router to the ZIA Public Service Edges—a primary tunnel ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 16 / Zscaler Internet Access Platform Services Document from the router to a ZIA Public Service Edge in one data center and a secondary tunnel from the router to a ZIA Public Service Edge in another data center. • IPSec tunnels from the corporate firewall to the ZIA Public Service Edges: Configure two IPSec tunnels from the firewall to the ZIA Public Service Edges—a primary tunnel from the firewall to a ZIA Public Service Edge in one data center, and a secondary tunnel from the firewall to a ZIA Public Service Edge in another data center. On the firewall, the customer defines one rule to send HTTP and HTTPS traffic through the IPSec tunnel to ZIA Public Service Edges. • The customer must ensure that if the primary tunnel goes down, that the router detects it and changes the routing table or routing instance so that the secondary tunnel is used for traffic forwarding and vice versa, with mechanisms like IP SLAs that are native to the router. • IPSec VPN tunnels offer the following benefits: o They support failover if the primary ZIA Public Service Edge becomes unavailable. o No configuration is required on computers or laptops. o Users on the customer’s corporate network cannot bypass Zscaler. PAC Files • The customer can use either a default PAC file or a custom PAC file hosted by Zscaler. • The default PAC file uses Geo-location technology to find the ZIA Public Service Edges that are closest to the user and instructs the browser to forward its internet traffic to the nearest ZIA Public Service Edge. Because it is the browser itself that is configured to retrieve the PAC file and forwards traffic accordingly, traffic is forwarded to Zscaler regardless of the user’s network. • The customer must ensure that users do not have admin rights so they cannot circumvent Zscaler by installing a nonstandard browser. • Users can have local admin rights but require network admin rights to change the PAC file. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 17 / Zscaler Internet Access Platform Services Document • Zscaler recommends that the customer either use the Zscaler default PAC file or copy and paste it into a new PAC file, and then add any necessary arguments and exceptions. • Zscaler recommends that the customer use the variables $(GATEWAY) and $(SECONDARY_GATEWAY) to define the primary and secondary ZIA Public Service Edges and to ensure the device always connects to the nearest ZIA Public Service Edge regardless of the location of the device. • PAC files offer the following benefits: o They direct the browser to forward traffic to Zscaler whether the user is onsite or offsite. o All major browsers support PAC files. o Microsoft Internet Explorer PAC settings can be enforced organization-wide using Microsoft Active Directory Group Policies (GPO). Proxy Chaining • This is a quick and easy way to forward the customer’s traffic to Zscaler for evaluation purposes, but Zscaler does not recommend proxy chaining as a long-term solution because proxy servers that support failover support only manual failover, which is not recommended for production environments. • The customer’s organization can configure the proxy server to forward traffic to a ZIA Public Service Edge. This method leverages the customer’s existing proxy servers, with no additional changes to the network. • The latency of the proxy server will affect the traffic forwarding latency. • If the proxy server also performs caching, downstream authentication could be an issue. • If the local proxy has a cache, it could affect policy enforcement and reporting. • Zscaler recommends that the customer also install a PAC file for each user to ensure coverage outside the corporate network. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 18 / Zscaler Internet Access Platform Services Document ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 19 / Zscaler Internet Access Platform Services Document Customer Responsibilities • The customer must ensure the organization has been provisioned on Zscaler. • The customer must use one of the supported methods to forward its internet traffic to Zscaler and ensure their traffic is forwarded to Zscaler. Customer must ensure redundancy. • The customer must ensure that firewall configurations and network settings allow the types of traffic necessary. See https://ips.<zscaler-cloud-name>/addresses. For example, customers on the zscalerone cloud should go to https://ips.zscalerone.net/addresses. • The customer is responsible for ensuring that internal traffic (to the corporate intranet) is not directed to Zscaler. • For GRE and IPSec tunnels and proxy chaining, the customer must use hardware that is interoperable and supported by Zscaler. The customer must ensure that hardware is installed and operated according to applicable third-party vendor specifications and recommendations, and ensure that hardware has the capacity required for forwarding traffic to Zscaler. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 20 / Zscaler Internet Access Platform Services Document Dedicated Proxy Port Overview The customer can subscribe to one or more dedicated proxy ports, associate them with a location, and then forward the organization’s remote user traffic to those ports. Description Forwarding remote users to the customer’s subscribed ports enables Zscaler to do the following: • When SSL inspection is enabled at the location, apply all the SSL settings to remote user traffic, including the ability to exclude URL categories and custom domains from decryption. This also allows remote users to automatically authenticate using the customer’s Security Assertion Markup Language (SAML) ID provider. • Apply the location’s policies, instead of the default policy, to remote user traffic that cannot be authenticated, such as transactions that use unknown agents or non-HTTP protocols. • Support FTP over HTTP for remote users, enabling Zscaler’s anti-virus engine to scan content for viruses and spyware when a remote user’s browser connects to FTP sites and downloads files. • Identify a remote user’s organization and display its logo on the login page. In addition, if SAML authentication is used, remote users are not prompted to enter their login name. • Customer can indicate a port preference between 10001 to 60000. If the port is available, it will be allocated to the customer. Otherwise, a random unused port is allocated. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to the subscribed proxy port. • The customer must ensure proper settings are configured in the ZIA Admin Portal. • The customer must ensure that the first transaction is a transaction that can be authenticated by Zscaler. The first transaction may be an HTTPS transaction from a browser if Zscaler is permitted to temporarily intercept it. • The customer is responsible for loading SSL certificates as trusted certificates on the browser to ensure SSL interception does not trigger warnings from the browser. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 21 / Zscaler Internet Access Platform Services Document Authentication: SAML, LDAP, Passwords, Kerberos, ZAB, SCIM, and Surrogate IP Overview Authentication enables Zscaler to identify the traffic that it receives so it can enforce configured department, group, and user policies, and provide user and department logging and reporting. Though Zscaler supports various mechanisms, it recommends deploying Identity Federation using SAML for provisioning and authentication. Description Zscaler supports the following methods for authentication. Security Assertion Markup Language (SAML) Description • Zscaler supports SAML 2.0 with POST Binding and above for authentication. • This is the method Zscaler recommends for authentication. • Using SAML for authentication enables Single Sign-On (SSO), so users can authenticate once to an identity provider (IdP) and then access various services. • SAML requires no changes to the existing firewall, but remote users who are trying to authenticate will require access to the SAML IdP from the internet. • First-time Zscaler authentication may be made transparent to the user. • SAML can be obtained for free through some Zscaler partners. Requirements • Obtain the SAML service and implement it. • If the customer wants to use a cloud-based IdP, the customer must check its availability in their region. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 22 / Zscaler Internet Access Platform Services Document Secure Lightweight Directory Access Protocol (LDAP) Description • If the customer’s organization uses a directory server like an Active Directory (AD) or an LDAP server to manage user information, Zscaler can synchronize user information from the directory server to the Zscaler database and perform an LDAP query to the directory server to authenticate those users. • With LDAP, the customer’s organization can use the customer’s existing authentication infrastructure, and no software or hardware installation is required on site. • Zscaler synchronizes only the email address, the name, and the user’s group and department. Passwords are not synchronized or saved in the Zscaler cloud. Requirements • The customer must configure the firewall to allow the Zscaler service, as described in https://ips.<zscaler- cloud-name>/addresses. For example, customers on the zscalerone cloud should go to https://ips.zscalerone.net/addresses. • Zscaler must have read-only access to the directory. • The directory server must allow Zscaler to perform an LDAP BIND. Passwords (Used with Hosted User Database only) Description • When users are added directly to the Zscaler database (through adding information manually on the ZIA Admin Portal, importing information from a CSV file, or ZAB), Zscaler can perform password-based authentication. • The passwords are uploaded to the Zscaler database with the username, group, and department information. Passwords are stored in the database in a salted hashed format. • Valid email addresses are not required if the customer administrator can manage password changes. With one-time token enabled, valid email addresses are required, but ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 23 / Zscaler Internet Access Platform Services Document users will manage their own password changes; the customer administrator need not manage password changes. • The customer can define the complexity of passwords and configure expiry periods. For additional security, the customer can require users to enter a password different from their corporate password. • No software or hardware installation is required on site. Requirements • Administrators need to manage passwords if valid email addresses are not used. Kerberos Description • This is a ticket-based authentication protocol that does not use cookies for authentication, so Zscaler can authenticate users for applications that do not use cookies, like Office 365. • Kerberos enables SSO authentication. Users authenticate themselves once with their domain controller, when they log in to their corporate domain. They do not have to log in and authenticate to Zscaler. • The customer’s organization can use Kerberos as its sole authentication method or combine it with another method, such as SAML or LDAP. • Kerberos is a secure open standard protocol that most operating systems support, including Windows 7, Windows 8, OS X, Linux, and FreeBSD. Additionally, most browsers support Kerberos authentication, including Internet Explorer, Firefox, and Safari. • It can be used to authenticate remote users (DirectAccess or a third-party VPN solution that can provide connectivity to the Domain Controller is required). • Zscaler can enforce granular user, group, and department policies on browser-based FTP transactions as well as HTTPS transactions, without having to decrypt the HTTPS transactions. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 24 / Zscaler Internet Access Platform Services Document • The customer’s organization does not need to configure its firewall to allow incoming connections from the ZIA Public Service Edges. • Zscaler does not support Kerberos on Windows XP, Apple iOS, or Android devices. Requirements • The customer must use a PAC file to forward traffic to Zscaler. Zscaler supports Kerberos authentication only for traffic forwarded in explicit mode. Therefore, even if a location is forwarding traffic to Zscaler through a GRE or IPSec tunnel, the customer must use a PAC file to forward traffic in order to use Kerberos for authentication. • Users must be provisioned on Zscaler before they can use Kerberos for authentication. The login name that is used for provisioning must be identical to the name in the Kerberos token. • Ensure that the DNS server on site can resolve Zscaler host names (Zscaler PAC servers; Central Authority (CA), which hosts the Zscaler Key Distribution Center (KDC); and ZIA Public Service Edges). If this is not possible from the location, then the customer’s organization must conditionally forward Zscaler cloud domain resolution to the Zscaler DNS servers. • Zscaler KDC must be reachable from the users’ computers. • Domain controller must be reachable from the users’ computers. • Additionally, the following are required in a Windows environment: o A domain controller that runs Windows Server 2003 or higher. o Client devices must run Windows Vista or higher. Zscaler Authentication Bridge (ZAB) Description • ZAB is a virtual appliance that enables the customer’s organization to provision users by automatically importing user information from an AD or LDAP server to the Zscaler database, without requiring inbound connections to the customer’s directory server. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 25 / Zscaler Internet Access Platform Services Document • ZAB can be used solely as a provisioning tool in conjunction with another authentication mechanism, such as SAML or Kerberos. Alternatively, it can be used for authentication as well, using LDAP with SSL client certificates. • The virtual appliance is managed and maintained by the customer’s organization. • ZAB requires minimal administration. After the customer deploys it, the customer can configure settings to automatically synchronize users on demand or daily, weekly, or monthly. • User data can be synchronized periodically or on demand. • ZAB does not synchronize passwords. Passwords are always stored and maintained on the customer’s directory server. Requirements • The customer must download and install the virtual appliance. • The customer must adhere to the resource requirements of the virtual appliance and Hypervisor. ZAB requires outbound connections to Zscaler. The customer must ensure that their outbound firewall is configured to allow the necessary connections, as described in the following: https://ips.<zscaler-cloud-name>/addresses/zab.html. For example, customers on the zscalerone cloud should go to https://ips.zscalerone.net/addresses/zab.html. Customer Responsibilities • The customer must forward its internet traffic to Zscaler. • The customer must use one of the supported methods to authenticate users. • The customer must use third party software and hardware that are interoperable and supported by Zscaler. The customer must ensure that the software and hardware are installed and operated according to applicable third-party vendor specifications and recommendations, and ensure that they have the necessary capacity. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 26 / Zscaler Internet Access Platform Services Document Surrogate IP Description • The customer can enable the Zscaler service to map a user to a device IP address so it applies the user’s policies, instead of the location’s policies, to traffic it receives from unknown user agents, and optionally, from known browsers. • If the customer enables Surrogate IP for known browsers, the service will leverage IP-touser mapping to authenticate users and apply user policies even if users browse to sites that support cookies. This enables the service to authenticate without requiring the browser to complete HTTP redirects for every transaction, ensuring performance even for users who connect, for example, over high-latency satellite links. • If the user browses the internet from multiple IP addresses, the service maps all the IP addresses to the user and associates the transactions with the user in the logs. • If the customer enables this feature on a location with at least one subscribed port, the service maps the external IP address and not the internal or device IP address to the user, so it can apply user-level policies to remote user traffic that it cannot authenticate. Requirements • The customer’s organization must forward traffic to Zscaler with one of the following methods: o A GRE or IPSec tunnel without NAT. o Proxy chaining with the XFF Forwarding option enabled on the location. o A dedicated proxy port. • The customer must enable authentication for the location in the Admin Portal. • The customer must enable this feature in the Admin Portal. NOTE: There can be scenarios in which the service does not authenticate traffic (for example, traffic to URLs or cloud apps that were selected under the Authentication Bypass setting within the ZIA Admin Portal, or traffic to applications that do not support cookie authentication). For policies in which users and departments can be specified in the criteria, the customer has control over which rules the service applies to such unauthenticated traffic. This is useful for customers ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 27 / Zscaler Internet Access Platform Services Document who currently place a default block on internet traffic (i.e., a URL filtering rule that blocks all traffic which is not explicitly allowed through the URL filtering policy). ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 28 / Zscaler Internet Access Platform Services Document Logging and Reporting Overview Zscaler gives the customer instant, detailed visibility into globally correlated user transaction logs across devices, locations, applications, and platforms. Zscaler’s dashboards provide real-time visibility into the customer’s internet traffic so that Internet usage can be tracked, and action quickly taken upon anomalous trends or security threats. Zscaler’s Analytics lets the customer interactively mine billions of transaction logs for reports that provide insight on specific queries. Description • Zscaler automatically logs all user transactions and stores them in the Zscaler cloud. Transactions are stored for six months. To comply with local laws and regulations, the customer can specify in which geographical region logs are stored. For example, a German organization may have its logs stored in Europe. • Zscaler only logs traffic metadata, user and company binary identifiers, and other transaction information. There is no actual content in the logs. For example, if a user sends email through Gmail or a similar service, Zscaler only logs information about the transaction; it does not log the content. • Zscaler does not keep any data relevant to PCI/HIPAA compliance in its cloud. • Multiple dashboards provide different views and present data in interactive charts, so the customer can instantly jump from a chart to individual transactions. • The customer can generate real-time reports that give specific insights into web and mobile activity by user, department, or location. Zscaler offers a wide range of standard reports or the customer can create custom reports. • Zscaler also provides an HTML-based Executive Report designed for sharing by email or in print with an organization’s executive audiences. The report provides a snapshot of an organization’s security posture and highlights the value derived from the Zscaler platform. • Interactive CIO and CISO reports that provide detailed information in graphical widgets and allow readers to drill down into the logs and analytics behind the information. • The customer can schedule reports for regular delivery to specified recipients. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 29 / Zscaler Internet Access Platform Services Document • The customer can exclude locations from all user-related reports in the dashboard, Interactive Reports, and the Executive Report. • The customer can seamlessly drill down from any dashboard or report to the logs, where they can view details like the specific URLs that users requested, risk score of each URL, and much more. The customer can also annotate any dashboard or report with notes. • As the customer works with data for reporting, the tool records the workflow in the History bar below the chart. Every time the customer makes a change to the chart, such as adding a filter or changing the chart type, the ZIA Admin Portal adds the previous version to the History bar. The customer can then click any chart in the History bar to see it again. • The customer can also implement role-based reporting, allowing the customer to define different roles for different users, and specify what reports and dashboards those users can access. • Admins can customize their dashboards if their role includes full dashboard access. • CIO, CTO, and CISO Insights reports provide monthly summaries of the organization’s IT and security posture. • An Industry Peer Comparison report compares the customer’s organizations performance to that of both peer organizations and all organizations using the Zscaler service. • A Company Risk Score report allows organizations to monitor and assess their organizational, departmental, location, and user-level risk exposure. • A Security Policy Audit report allows you to view your Security Policy settings and improve them by following best practices guidelines. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • Authentication is required for user and department logging and reporting. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 30 / Zscaler Internet Access Platform Services Document Zscaler Nanolog Streaming Service (NSS) for Web Logs Overview Zscaler’s NSS is a virtual machine (VM) the customer can use to stream web traffic logs in real time from the Zscaler Nanolog to the customer’s on-premises security information and event management (SIEM) system. NSS helps the customer comply with regulatory mandates on local log archival, correlate logs from multiple devices, and conduct historical web log analysis. Description • When an organization deploys NSS, NSS opens a secure tunnel to the Nanolog in the Zscaler cloud. The Nanolog then streams copies of the logs to NSS in a highly compressed format to reduce bandwidth footprint; the original logs are retained on the Nanolog. • When NSS receives the logs from the Nanolog, it unscrambles them, applies the configured filters to exclude unwanted logs, converts the filtered logs to the configured output format so they can be parsed by the customer’s SIEM, and then streams the logs to the SIEM over a raw TCP connection. • For full site redundancy, each organization can subscribe to up to two NSS systems for web logs in an active-active configuration. Each NSS supports up to eight parallel SIEM connections called feeds. Each feed can have a different list of fields, a different format, and different filters. • NSS can be deployed via VMWare, AWS, or Azure. • NSS requires minimal administration. After the customer deploys it, NSS automatically polls Zscaler for updates and installs them. • For monitoring purposes, the customer can configure a separate alert feed. Zscaler will send the alerts in an RFC- compliant syslog format to the specified IP address and port. • The customer can open a Sandbox report based on the MD5 parameter retrieved from the logs in the SIEM. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 31 / Zscaler Internet Access Platform Services Document Customer Responsibilities • The customer must use a SIEM that is interoperable and supported by Zscaler. • The customer must ensure that all the requirements to run NSS as a virtual machine are met. • The customer must adhere to the Hypervisor, VM specifications, and internet bandwidth requirements. • Ensure that all firewall requirements are met as detailed in https://ips.<zscaler-cloudname>/addresses/nss.html. For example, customers on the zscalerone cloud should go to https://ips.zscalerone.net/addresses/nss.html. NSS requires only outbound connections to the Zscaler cloud. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 32 / Zscaler Internet Access Platform Services Document Zscaler Nanolog Streaming Service (NSS) for Firewall and DNS Logs Overview Zscaler’s NSS Firewall is a virtual machine (VM) the customer can use to stream firewall and DNS logs in real time from the Zscaler Nanolog to the customer’s on-premises security information and event management (SIEM) system. NSS helps the customer comply with regulatory mandates on local log archival, correlate logs from multiple devices, and conduct historical web log analysis. Description • When an organization deploys NSS, NSS opens a secure tunnel to the Nanolog in the Zscaler cloud. The Nanolog then streams copies of the firewall and DNS logs to NSS in a highly compressed format to reduce bandwidth footprint; the original logs are retained on the Nanolog. • For firewall logs, the customer can stream full session logs (all sessions of firewall rules are logged individually, except HTTPS), aggregate logs (individual sessions are grouped together based on {user, rule, network service, network application} and recorded periodically), or both full session and aggregate logs. For DNS logs, the customer can stream logs for each request. • When NSS receives the logs from the Nanolog, it unscrambles them, applies the configured filters to exclude unwanted logs, converts the filtered logs to the configured output format so they can be parsed by the customer’s SIEM, and then streams the logs to the SIEM over a raw TCP connection. • For full site redundancy, each organization can subscribe to up to two NSS systems (for firewall and DNS logs) in an active-active configuration. Each NSS supports up to eight parallel SIEM connections called feeds. Each feed can have a different list of fields, a different format, and different filters. • NSS can be deployed via VMWare, AWS or Azure. • NSS requires minimal administration. After the customer deploys it, NSS automatically polls Zscaler for updates and installs them. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 33 / Zscaler Internet Access Platform Services Document • For monitoring purposes, the customer can configure a separate alert feed. Zscaler will send the alerts in an RFC- compliant syslog format to the specified IP address and port. Customer Responsibilities • The customer must use a SIEM that is interoperable and supported by Zscaler. • The customer must ensure that all the requirements to run NSS as a virtual machine are met. • The customer must adhere to the Hypervisor, VM specifications, and internet bandwidth requirements. • Ensure that all firewall requirements are met as detailed in https://ips.<zscaler-cloudname>/addresses/nss.html. For example, customers on the zscalerone cloud should go to https://ips.zscalerone.net/addresses/nss.html. NSS requires only outbound connections to the Zscaler cloud. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 34 / Zscaler Internet Access Platform Services Document Malware Protection Overview Zscaler provides inline signature-based anti-malware protection, detecting and blocking all known viruses, spyware, and other kinds of malware. Description • Zscaler scans inbound and outbound HTTP (and HTTPS traffic if SSL Inspection is enabled) in real-time with near-zero latency. Zscaler scans files with up to five layers of recursive compression. • Zscaler uses a real-time signature database of objects on the internet known to be unsafe and runs the customer’s traffic through multiple anti-virus engines. • Zscaler runs the customer’s traffic through multiple engines and leverages malware feeds from more than 20 threat- sharing partners like Microsoft, Adobe, and Google. • Zscaler has a recommended default malware protection policy to ensure the security of the customer’s traffic. While the customer can modify this default policy, Zscaler recommends that the customer not change the default settings. • By default, Zscaler allows users to upload and download password-protected archive files, but the customer can change these settings to suit business needs. • By default, Zscaler allows users to upload and download files that are not scannable because they are in an unrecognized file format, excessive in size, or recursively compressed, but the customer can change these settings to suit business needs. • Zscaler displays end user notifications when users are blocked. The customer can create custom end user notifications, configured in different languages with images and links to sources that further educate users on compliance policies. The customer can also redirect users to a URL that hosts the customer’s own end user notifications and use JavaScript to display content in other languages. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 35 / Zscaler Internet Access Platform Services Document Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 36 / Zscaler Internet Access Platform Services Document Advanced Threats Protection Overview Zscaler’s Advanced Threats Protection provides a variety of advanced security features. Description • Zscaler identifies suspicious content within a page (injected scripts, vulnerable ActiveX, zero-pixel iFrames, and much more) as well as domain information to calculate a Zscaler PageRisk™ score. This score is evaluated against a PageRisk™ tolerance value that the customer sets, and Zscaler will allow or block the page depending on the value. • Zscaler leverages malware feeds from more than 20 threat-sharing partners like Microsoft, Adobe, and Google to protect against the latest threats. • Zscaler’s Advanced Threats Protection policy provides access to the following features: o Botnet Protection: Zscaler can protect against botnets that could be secretly installed on user devices to perform malicious tasks at the instruction of Command & Control servers. o Malicious Active Content Protection: Zscaler can protect against websites that attempt to download dangerous content to user browsers. o Fraud Protection: Zscaler can protect against phishing sites that mimic legitimate sites (such as banking and financial sites) in order to collect confidential information. o Cross-Site Scripting (XSS) Protection: Zscaler can protect against XSS, in which malicious code injected into websites are downloaded to user browsers from compromised web servers. o Suspicious Destinations Protection: Zscaler can block requests to any country based on ISO3166 mapping of countries to their IP address space. Websites are blocked based on the location of the web server. o Unauthorized Communication Protection: Zscaler can protect against communications like IRC tunneling applications and "anonymizer" sites that are used to bypass firewalls and proxies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 37 / Zscaler Internet Access Platform Services Document o Peer-to-Peer (P2P) File Sharing Protection: Zscaler can block BitTorrent, an application that could enable users to illegally share copyrighted or protected content. o P2P Anonymizer Protection: Zscaler can block Tor, an application that could enable users to bypass policies controlling what websites they might visit or internet resources they might access. o P2P VoIP Protection: Zscaler can block applications like Google Talk and Skype to protect against the high bandwidth utilization associated with such applications. • Zscaler displays end user notifications when users are blocked. The customer can create custom end user notifications, configured in different languages with images and links to sources that further educate users on compliance policies. The customer can also redirect users to a URL that hosts the customer’s own end user notifications and use JavaScript to display content in other languages. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 38 / Zscaler Internet Access Platform Services Document Sandbox Overview Zscaler provides an additional layer of security against zero-day threats and Advanced Persistent Threats (APTs) with integrated file sandboxing analysis. Zscaler offers two versions: Standard and Cloud Sandbox. Description Standard Sandbox • Zscaler conducts sandboxing analysis on suspicious Windows executables and Windows libraries downloaded from suspicious URLs. A portion of the Windows executables and libraries are collected and run in a virtual environment to detect and block threats. • If a user attempts to download a file that was found to be malicious by the Sandbox, Zscaler displays an end user notification. The customer can create custom end user notifications, configured in different languages with images and links to sources that further educate users on compliance policies. The customer can also redirect users to a URL that hosts the customer’s own end user notifications and use JavaScript to display content in other languages. • Zscaler logs transactions in real time and provides behavioral analysis data. The logs show the threat name listing the exact malware, such as Trojan.Zbot, Backdoor.Caphaw, or just the malware category, based on the behavior recognized by Zscaler, whenever possible. • The logs also contain an MD5 column that displays a hash of all files analyzed. With basic Sandbox, the customer cannot view the behavioral analysis report that provides further information about a file and its behavior. • The transaction logs list the malicious files that were detected by Cloud Sandbox—files that fell outside the scope of suspicious executables/libraries from suspicious URLs. These files are not blocked (because no policy exists to enforce the blocks), but they are detected and displayed as malicious in the customer’s transaction logs. • If your Sandbox policy is configured to allow and scan files for the first-time action, the Zscaler service allows users to download unknown files and then sends the files to the ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 39 / Zscaler Internet Access Platform Services Document Sandbox for behavioral analysis. If a file is found to be malicious, this becomes a patient 0 event. • If any executables fail to run properly on the original VM or OS, Sandbox now supports executing them on multiple VMs or OSs to see the behavior. • Once Zscaler detects malicious files, it propagates fingerprints of malicious files to all ZIA Public Service Edges throughout the cloud, effectively maintaining a real time blacklist to prevent users anywhere in the world from downloading malicious files. Cloud Sandbox • With Cloud Sandbox, the customer can create multiple policy rules. For each rule, the customer can specify: o o Criteria: ▪ File types ▪ URL Categories ▪ Users, Groups, Departments, and Locations ▪ Sandbox Categories (Adware, Malware/Botnet, P2P/Anonymizer) Action: ▪ Allow or Block ▪ Action that Zscaler takes when a user downloads a file for the first time: Allow and do not scan, Allow and scan, Quarantine during analysis and allow download only after analysis. • Zscaler provides a default rule. The customer cannot delete the default rule but can modify the Sandbox Categories (in Criteria) and whether the rule allows or blocks (in Action). The customer can also add rules. Rules are applied in the rule order list from first to last. The default rule is always the last rule checked. • Zscaler conducts sandboxing analysis for all supported file types: o o Archives: ▪ RAR ▪ ZIP Scripts inside ZIP archives: ▪ .js ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 40 / Zscaler Internet Access Platform Services Document o o o ▪ .vbs ▪ .svg ▪ .ps1 ▪ .hta ▪ .wsf ▪ .cmd ▪ .lnkRAR Executables: ▪ Windows Executables ▪ Windows Library Microsoft Office: ▪ Microsoft Word ▪ Microsoft Excel ▪ Microsoft PowerPoint ▪ Microsoft RTF Mobile: ▪ o o Web Content: ▪ Adobe Flash ▪ Java Applet Other: ▪ • Android Application Package Adobe PDF If a user attempts to download a file that was found to be malicious by the sandbox, Zscaler displays an end user notification. The customer can create custom end user notifications, configured in different languages with images and links to sources that further educate users on compliance policies. The customer can also redirect users to a URL that hosts the customer’s own end user notifications and use JavaScript to display content in other languages. • Zscaler logs transactions in real time and provides behavioral analysis data. The logs show the threat name listing the exact malware, such as Trojan.Zbot, Backdoor.Caphaw, or just the malware category, based on the behavior recognized by Zscaler, whenever possible. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 41 / Zscaler Internet Access Platform Services Document • The logs also contain an MD5 column that displays a hash of all files analyzed. With Cloud Sandbox, the customer can click a value in this column to view the Sandbox report. Sandbox reports provide information about a file and its behavior as well other types of information, including forensic details like which registry keys were changed, which network connections were initiated, and which files were read. • Once Zscaler detects malicious files, it propagates fingerprints of malicious files to all ZIA Public Service Edges throughout the cloud, effectively maintaining a real time blacklist to prevent users anywhere in the world from downloading malicious files. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings apply. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 42 / Zscaler Internet Access Platform Services Document Browser Control Overview Zscaler can warn or block users from connecting to the internet when they are using outdated or vulnerable browsers, plugins, and applications. Description • Zscaler examines and assesses all applications that are used to access the internet to ensure that they are not outdated or unsafe. Zscaler examines browser versions and patches (as well as beta browsers), Internet applications (for example, Adobe Flash, Java, Apple QuickTime), and media download applications (for example, Windows Media Player). • The customer can choose to block specific browser versions. • Zscaler displays end user notifications when users are blocked. The customer also can create custom end user notifications. • Zscaler displays end user notifications when users are warned or blocked. The customer can create custom end user notifications, configured in different languages with images and links to sources that further educate users on compliance policies. The customer can also redirect users to a URL that hosts the customer’s own end user notifications and use JavaScript to display content in other languages. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 43 / Zscaler Internet Access Platform Services Document URL Filtering Overview Zscaler’s URL Filtering Policy protects the customer’s organization from inappropriate or harmful web content. Description • The customer can create policy rules specifying the following criteria: URL categories, HTTP Request, Users, Groups, Departments, Locations, and Time. The rule also allows the customer to set daily quotas by bandwidth or time, and specify whether Zscaler allows, cautions against, or blocks access. Zscaler scans every HTTP request and response to enforce the URL filtering policy the customer defines, irrespective of location or device. • To enable granular access control, Zscaler organizes URLs into a hierarchy of categories. The customer can choose from six predefined classes, which are each divided into predefined super-categories (30 in total), and then further into predefined categories. The six predefined classes are Bandwidth Loss, Business Use, General Surfing, Legal Liability, Productivity Loss, and Security Risk. The customer can limit access at the class level or drill down further into super- categories and categories, depending on business needs. In addition to the predefined categories, the customer can create custom categories based on URLs or on keywords within the URLs or page content. • Zscaler leverages multiple global databases that are updated daily with feeds from various partners. When any given URL is not already covered by the database, Zscaler uses its Dynamic Content Classification (DCC) engine to scan the page for any content that would place it in the predefined Legal Liability class. The URL is then classified and the original request for the page is handled according to the customer’s policy for URLs in that class. • Zscaler displays end user notifications when users are cautioned or blocked. The customer can create custom end user notifications, configured in different languages with images and links to sources that further educate users on compliance policies. The customer can also redirect users to a URL that hosts the customer’s own end user notifications. • In certain cases, the customer can allow some users or groups to override a block. For example, in an educational setting, the customer can block students from access to ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 44 / Zscaler Internet Access Platform Services Document YouTube, but allow the teachers. Users will be prompted to enter their override password, and they will be able to access the blocked page during their current browser session. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • SSL inspection may be required for applying granular policy to encrypted sites. Otherwise, companywide policy will apply. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 45 / Zscaler Internet Access Platform Services Document Firewall Policy Overview Zscaler protects users connecting to the internet and provides application visibility and user accesslevel controls for all ports and protocols, including applications that are difficult to manage and maintain, like port hopping applications (e.g., Skype, BitTorrent, Tor) and cloud-based business applications with changing IP addresses (e.g., MS Office365, Google Apps, Salesforce.com). Zscaler offers two versions: Standard and Cloud Firewall. Description Standard Firewall • Zscaler’s Standard Firewall supports all ports and protocols. • The Standard Firewall functions on 5-tuple policy (Source IP, Destination IP, Source Port, Destination Port, and Protocol). • By default, the firewall has a default filtering rule that allows all internet traffic. Rules are applied in the rule order list from first to last. The default rule is always the last rule checked. The customer cannot delete the default rule but can modify its action and logging option. • For each new firewall filtering rule, the customer can specify: o Criteria: ▪ Where and When: Locations and Time interval. ▪ Network Services: The customer can choose from a list of predefined network services and add custom network services. The customer can also create and add network service groups. ▪ Source IPs: IP addresses and source IP groups created by the customer. ▪ Destination IPs: IP addresses, destination IP groups created by the customer, IP-based countries, IP categories. o Action: For each rule, the customer can specify one of four actions: Allow, Block/Drop, Block with ICMP error message, Block with TCP reset. • The Standard Firewall dashboard provides network service visibility. • Full Logging is available with an additional license. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 46 / Zscaler Internet Access Platform Services Document o Hourly (default mode for rules that allow traffic): Individual sessions are grouped together based on {user, rule, network service, network application}. o Full (default mode for rules that block traffic): Logs all sessions of the rule individually, except HTTP(S). • The customer can subscribe to Zscaler’s Nanolog Streaming Service (NSS) to stream firewall logs to an on-premises security information and event management (SIEM) system. • If a web policy and firewall policy are configured for a web application, web policy is applied first, then firewall policy is enforced. • NAT Control: The standard firewall can perform destination NAT. o The customer can create NAT control rules using the same criteria as firewall filtering rules (except for network applications which NAT control does not support), as well as users and groups, which requires cloud firewall. o For each rule, the customer can choose to redirect traffic either to specific IP addresses or ports. Cloud Firewall • The Cloud Firewall supports all ports and protocols. • The Cloud Firewall redirects outbound HTTP, HTTPS, FTP and DNS traffic that is destined to a non-standard port and that does not match any predefined network service to the web engine for inspection. For example, if HTTP traffic is destined to a server on a non-standard port, Zscaler redirects the traffic to the web proxy engine even if the port is not configured in an HTTP predefined services group. This option is enabled by default. • With Cloud Firewall, the customer has application visibility and control, as well as userbased policy control. • Web-based and non-web-based applications are classified by Zscaler’s advanced Deep Packet Inspection (DPI) engine. • User-level support: To enforce firewall policy at the user level, authentication and surrogate IP must be enabled. Otherwise, the firewall applies organization and location policies. • With Cloud Firewall, full logging and reporting is included. • The Cloud Firewall dashboard provides network applications visibility. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 47 / Zscaler Internet Access Platform Services Document • By default, the firewall has a default filtering rule which allows all internet traffic. Rules are applied in the rule order list from first to last. The default rule is always the last rule checked. The customer cannot delete the default rule but can modify its action and logging option. • For each new firewall filtering rule, the customer can specify: o Criteria: ▪ Who, Where, and When: Users, Groups, Departments, Locations, and Time Interval. ▪ Network services: The customer can choose from a list of predefined network services and add custom network services. The customer can create network services with overlapping ports for the same protocols and add these network services to the firewall control policy. For example, FTP on port 21 is a standard network service. A custom network service that includes port 21 can be defined. The customer can also create and add network service groups. ▪ Network applications: The customer can choose from a list of predefined network applications. The customer can also create and add network application groups. ▪ Source IPs: IP addresses and source IP groups created by the customer. ▪ Destination IPs: IP addresses, destination IP groups created by the customer, IP-based countries, IP categories. o Action: For each rule, the customer can specify one of four actions: Allow, Block/Drop, Block with ICMP error message, Block with TCP reset. o Logging option: ▪ Hourly (default mode for rules that allow traffic): Individual sessions are grouped together based on user, rule, network service, and network application. ▪ Full (default mode for rules that block traffic): Logs all sessions of the rule individually, except HTTP/HTTPS. • If a web policy and firewall policy are configured for a web application, web policy is applied first, then firewall policy is enforced. • NAT Control: The Cloud Firewall can perform destination NAT. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 48 / Zscaler Internet Access Platform Services Document o The customer can create NAT control rules using the same criteria as firewall filtering rules, except for network applications which NAT control does not support. o For each rule, the customer can choose to redirect traffic either to specific IP addresses and ports, or to support domains with multiple destination IP addresses or with destination IP addresses that may change, customers can enter FQDNs as well as IP addresses in the destination field for each rule. • DNS Control: With Cloud Firewall, the customer can control DNS requests and responses. o The DNS Control policy has default rules that allow all DNS traffic. Rules are applied in the rule order list from first to last. The default rule is always the last rule checked. The customer cannot delete the default rules but can modify their actions. o For each new DNS transaction rule, the customer can specify: ▪ Criteria: • Who, Where, and When: Users, Groups, Departments, Locations, and Time Interval. • Who, Where, and When: Users, Groups, Departments, Locations, and Time Interval. • Source IPs: IP addresses and source IP groups created by customer. • Destination/Resolved IPs: DNS Server IP addresses, DNS Server IP groups, Resolved IP-based Countries, Requested Domain/Resolved IP Categories. ▪ Action: For each rule, the customer can specify one of four actions: Allow, Block, Redirect request, and Redirect response. o Zscaler logs all sessions of the rule individually, except HTTP(S). This option cannot be changed. o DNS Tunneling can be used to circumvent traditional security measures and has the potential to introduce a variety of hazards into networks. To counteract this threat, Zscaler has introduced the ability to detect, control, and analyze tunneling traffic. o The DNS dashboard give the customer visibility into applications running in the customer’s networks. o An Advanced Settings option to enable ZIA Public Service Edges to optimize DNS resolution is also available. If this is used, the Zscaler proxy will intercept the HTTP ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 49 / Zscaler Internet Access Platform Services Document or HTTPS request and perform its own DNS resolution. It then overrides the destination IP if the answers are different. This can minimize the geographical distance a query travels and reduce latency. o • Zscaler supports DNS queries sent over UDP and TCP. The customer can subscribe to Zscaler’s Nanolog Streaming Service (NSS) to stream firewall and DNS logs to an on-premises security information and event management (SIEM) system. Customer Responsibilities • The customer is responsible for ensuring that IP traffic is forwarded to Zscaler from a known location via a GRE or IPSec tunnel. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • To enforce firewall policies at the user level, authentication and surrogate IP must be enabled. Otherwise, the firewall applies organization and location policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 50 / Zscaler Internet Access Platform Services Document FTP Control Overview Zscaler by default does not allow users from a location to upload or download files from FTP sites, but the customer can configure the policy to allow access to specific sites. Description • The FTP policy applies to traffic from the known locations of an organization. • Zscaler supports FTP over HTTP. The anti-virus engine will scan the content for Viruses and Spyware. These connections are also subject to rules created under the URL Filtering Policy in the ZIA Admin Portal. • Zscaler supports passive FTP only. If the destination server does not support passive FTP, Zscaler generates an alert message to this effect in the end user's browser. • If a remote user uses a dedicated port, then Zscaler supports FTP over HTTP for remote users. So, when a remote user’s browser connects to FTP sites and downloads files, Zscaler’s anti-virus engine will be able to scan the content for viruses and spyware. • Zscaler does not support Anti-Virus (AV) scanning for native FTP traffic. • URL Filtering Policy rules take precedence over the FTP Control policy. For example, you have a URL Filtering Policy rule that blocks access to Adult Material, Zscaler will block users who try to transfer files from ftp://ftp.playboy.com/ • User, department, or group-level URL filtering rules blocking access to specific sites will not be enforced for FTP sites because FTP does not support cookies. Only rules applied to all users will be enforced. For example, if you have a catch-all URL Filtering Policy rule that is defined to "Block Access to Adult Material." So, anyone attempting to access ftp://ftp.playboy.com/ will be blocked. Customer Responsibilities • The customer is responsible for ensuring that traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 51 / Zscaler Internet Access Platform Services Document Bandwidth Control Overview Zscaler provides built-in web bandwidth control and traffic shaping capabilities for web applications and URL categories to ensure that business critical applications are prioritized, and that recreational or non-business critical applications do not affect productivity. Description • Zscaler provides bandwidth control at two levels. At the first level, Zscaler provides bandwidth control by location. The customer can configure maximum upload and download bandwidth limits for each location in the organization. These limits apply to all internet traffic for the location, irrespective of the web application traffic flowing through the network. At the second level, for each location, the customer can define bandwidth control policy based on application classes. • Zscaler defines the following bandwidth classes: Business & Economy, Financial Apps, General Surfing, Large Files, Productivity, Sales/Support Apps, Streaming Media/File Share, VoIP, and Web Conferencing. The customer must add URL categories and cloud applications (or cloud application categories) to the predefined bandwidth classes. The customer can also add custom application classes that the customer defines. • In the bandwidth control policy, the customer can set bandwidth control rules to prioritize business-critical applications and define how bandwidth is allocated when contention occurs. Each rule defines a maximum and minimum guaranteed percentage of bandwidth for the application classes in the rule along with other parameters like maximum concurrent connections, location, and time of day. • The Zscaler bandwidth algorithm allows an application class full bandwidth utilization until there is contention for the bandwidth by a traffic class with a higher priority. When application classes compete for bandwidth, Zscaler takes action based on rules that the customer configures in the bandwidth control policy. • Zscaler rebalances the bandwidth in real time and buffers packets for application classes that hit the bandwidth quota limit. This behavior ensures that business critical applications get priority, with no deterioration in quality. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 52 / Zscaler Internet Access Platform Services Document • Zscaler applies the policy to all HTTP and HTTPS traffic from the location. The customer does not need to enable SSL interception because it works at the TCP level. • The Bandwidth Control dashboard provides real-time visibility into your organization’s bandwidth usage. All customers can view the Total Bandwidth Consumption graph, even if their organization does not have a Bandwidth Control subscription. This graph displays the 95th percentile trend line, which is based on the 95th percentile of inbound or outbound traffic, whichever is higher. Customers can view bandwidth usage in 30-day time intervals, with the ability to drill down incrementally to 5-minute intervals. All other widgets on the Bandwidth Control dashboard require a subscription. In addition to the dashboard, administrators for organizations subscribed to Bandwidth Control can access interactive Bandwidth Control reports and in Web Insights, use the bandwidth control data type and filters to analyze bandwidth usage. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • The customer is responsible for adding URL categories and cloud applications or cloud application categories to the predefined bandwidth classes before defining bandwidth control rules. • The customer is responsible for ensuring that the bandwidth values set for each location are correct. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 53 / Zscaler Internet Access Platform Services Document SSL Inspection Overview Zscaler can perform SSL inspection and decrypt HTTPS traffic to protect the customer’s organization against dangerous content hidden in incoming or outgoing HTTPS traffic. Description • Zscaler decrypts and inspects HTTPS traffic to and from the user’s browser and to and from the destination server, blocking any malicious content. • When performing SSL inspection, Zscaler terminates the SSL connection on the proxy to inspect content, and then reestablishes the connection to the destination server. Zscaler does the same with the HTTPS traffic from the destination server to the user’s browser. • Zscaler provides the following features when an organization enables SSL Inspection: o Granular URL and cloud app control policies: Zscaler can enforce granular user, group, and location policies, as well as read-only controls. o Globally bypass URLS and URL categories: The customer can prevent Zscaler from decrypting transactions to specific URLs or URL categories, as well as to specific cloud applications or cloud application categories. o Content filtering: The customer can configure Zscaler to enforce SafeSearch, enabling it to block malicious or inappropriate content in a page, such as during a Google search. o Block unscannable transactions: The customer can enable Zscaler to block the transactions of applications that Zscaler cannot decrypt because they use nonstandard encryption methods and algorithms. • Zscaler supports the OCSP protocol to verify the validity of server certificates and block access to sites with server certificates that are unknown or have a revoked status. Further, Zscaler displays an end user notification when it blocks access to a site due to a bad certificate (if the certificate issuer is unknown, if the certificate has expired, or if the Common Name in the certificate does not match) and logs these transactions with “bad server cert” in the policy field. • Zscaler supports TLS version 1.2. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 54 / Zscaler Internet Access Platform Services Document Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • The customer must ensure that Zscaler’s root certificate or customer’s root certificate is configured in the browser. • When the customer enables SSL inspection, the customer is responsible for creating a list of URL categories that are exempt from SSL inspection (for example, the list can include URLs in the Finance or Health category). The customer must configure this list carefully because it is applied globally throughout an organization and takes precedence over per-location SSL inspection. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 55 / Zscaler Internet Access Platform Services Document SSL Inspection with Customer Root Certificate Overview For SSL inspection, Zscaler gives the customer the option of using an intermediate certificate signed by the customer’s own trusted Certificate Authority (CA), rather than the default Zscaler intermediate certificate. Description • The customer can use an intermediate root certificate signed by the customer’s own root CA. • The customer can upload a certificate chain in addition to the intermediate root certificate, allowing the Zscaler service to send the intermediate root certificate along with the key chain to a user’s device during SSL inspection. • After the signed intermediate root certificate has been uploaded to Zscaler, Zscaler can start using the intermediate certificate immediately. Zscaler presents the site certificate generated using the customer’s intermediate certificate to the user’s browser, and the browser can then validate the intermediate certificate through the root certificate in its certificate store. • The customer can control the validity period of the intermediate certificate or revoke it on the ZIA Admin Portal. • The customer uses AES as the key signing algorithm for both the Zscaler root CA as well as for signing the private key of self-signed certificates. • If necessary, the customer can locate Certificate Revocation Lists (CRLs) that provide the serial numbers of revoked certificate issuers. The Zscaler service provides a CRL distribution point (CDP) for every certificate if generates. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • The customer must ensure that the customer’s root certificate is configured in the browser. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 56 / Zscaler Internet Access Platform Services Document • The customer is responsible for ensuring that the customer’s root certificate is valid in the ZIA Admin Portal. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 57 / Zscaler Internet Access Platform Services Document Data Loss Prevention (DLP) Overview Zscaler protects users across devices and networks, scanning internet traffic, including SSLencrypted traffic, to monitor or block any unauthorized or sensitive data leaving the customer’s organization, in accordance with configured policies. Description • The customer can configure a DLP policy by adding rules referencing DLP engines which contain one or more DLP dictionaries. • DLP dictionaries contain algorithms designed to detect valid number data like credit card and social security numbers or other kinds of information relevant to the organization’s compliance policies. Zscaler provides multiple predefined dictionaries. The customer can also create custom dictionaries of the following types: o Patterns: Write regular expressions to match on important patterns o Phrases: Write single or multi-word keywords to match on important phrases o Exact Data Match (EDM): With an additional license, use indexed data templates to match on tabular data records • DLP engines are collections of DLP dictionaries that enable the identification of sensitive information across multiple dictionaries. Zscaler provides multiple predefined DLP engines, and the customer can create custom engines as well. • You can define granular policy rules that reference one or more DLP engines for the type of data you want to identify. In addition, for each rule you can choose to allow or block specific data that meet one or more of the following criteria: URL category, cloud application, file type, minimum data size, users, groups, departments, location, and time Interval. • For each rule, the customer can specify whether to send a notification to auditors when a violation occurs. The customer has the option to include attachments of the violating content. • You can create Exact Data Match (EDM) index templates and apply them to custom DLP dictionaries and engines. EDM templates allow the Zscaler service to identify a record from a structured data source that matches predefined criteria. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 58 / Zscaler Internet Access Platform Services Document • Zscaler displays end user notifications when users are blocked. The customer can create custom end user notifications, configured with images and links to sources that further educate users on compliance policies. The customer can also redirect users to a URL that hosts the customer’s own end user notifications. • If the customer’s organization has its own on-premises DLP solution, the customer can configure Zscaler DLP rules to forward information via secure Internet Content Adaption Protocol (ICAP) to the DLP server. There are two main options when forwarding content. One option includes using Zscaler DLP engines, and the other, bypassing Zscaler DLP engines. o If Zscaler DLP engines are used, the Zscaler service uses its DLP engines to detect, and allow or block, specified data. It then forwards information to the customer’s DLP server. o If Zscaler DLP engines are bypassed, the Zscaler DLP engines do not scan for any specific data. The service only filters, and allows or blocks content, based on specified criteria before forwarding the content to the customer’s DLP server. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • Authentication is required for Zscaler to enforce user, group, and department policies. • The customer is responsible for setting up and maintaining the Index Tool virtual machine for Exact Data Match-based rules. • The customer is responsible for indexing data for Exact Data Match-based rules. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 59 / Zscaler Internet Access Platform Services Document API-based CASB Overview Zscaler API-based CASB provides cloud-based security within SaaS applications (e.g., Box, Office 365, etc.). The service continuously monitors corporate sanctioned SaaS applications via application API, scans the files stored in the SaaS applications in accordance with rules and policies determined by the customer, monitors these SaaS applications for unauthorized or inappropriate sharing, and automatically remediates data exposure issues and malware activity. Description • The customer can configure a CASB policy to protect their sensitive data and prevent malware related threats. • CASB DLP policies will look for DLP violations based on content match and sharing context. Content matching can be done based on keywords, patterns, regular expressions, predefined and custom DLP dictionaries, predefined and custom DLP engines, and Exact Data Match (EDM). Data exposure is detected based on public, external, and internal sharing. • When a violation is detected based on DLP policies, customers are able to take action, such as removing sharing permissions and quarantining known or unknown threats. Customer Responsibilities • The customer is responsible for connecting their sanctioned SaaS applications with Zscaler’s API-based CASB service. • The customer must ensure proper time interval settings for historical data scanning. • The customer is responsible for setting up and maintaining DLP and malware policies for API-based data scanning. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 60 / Zscaler Internet Access Platform Services Document Cloud Application Control Overview In addition to URLs, Zscaler enables the customer to manage user access to cloud applications (e.g., Facebook, Gmail, etc.). Description • The customer can create a rule and specify the following criteria: Cloud Applications, Users, Groups, Departments, Locations, and Time. The rule also allows the customer to set daily quotas by bandwidth or time, and specify whether Zscaler allows, cautions against, or blocks access. • Zscaler organizes cloud applications into nine broad categories: Consumer, Enterprise Collaboration, Enterprise Productivity, Instant Messaging, Sales & Marketing, Social Networking & Blogging, Streaming Media & File Sharing, System & Development, and Webmail. • For four of the categories (Instant Messaging, Social Networking & Blocking, Streaming Media & File Sharing, and Webmail), Zscaler allows the customer to provide read-only controls. For example, the customer can set read-only controls for social networking sites so that users can read content but not post. • Zscaler displays end user notifications when users are cautioned or blocked. The customer can create custom end user notifications, configured in different languages with images and links to sources that further educate users on compliance policies. The customer can also redirect users to a URL that hosts the customer’s own end user notifications. • The cloud application policy takes precedence over the URL filtering policy by default. • The customer can configure Zscaler to allow users to access Google apps (including Gmail) for specific domains only. For example, the customer can allow users to sign in to their corporate Gmail accounts, but block them from signing in to their personal Gmail accounts. • The customer can send all Office 365 traffic to the Zscaler cloud and enable the Office 365 One-Click Configuration feature in the ZIA Admin Portal. The Zscaler service then automatically performs the necessary configurations to enable Office 365. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 61 / Zscaler Internet Access Platform Services Document • The Zscaler service fingerprints more than 300 applications, including Office 365 applications, so that customers do not have to worry about URL changes for Office 365 applications. • The Cloud Applications dashboard features a reporting widget named, Cloud Applications Trend, which displays all the cloud apps used by the customer’s organization. Zscaler has partnered with McAfee Skyhigh (formerly Skyhigh Networks) to provide a risk profile for each application. The customer can point to a cloud app in the widget and view the risk score provided by all three, as well as the aggregated score provided by Zscaler. The customer can also download the data as a CSV file for further analysis, but this information is available on the dashboard and as a CSV file only, not in logs. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • SSL inspection might be required for applying granular policy to encrypted sites. Otherwise, company-wide policy will apply. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 62 / Zscaler Internet Access Platform Services Document Zscaler Identity Proxy Overview The customer can configure Zscaler as an identity provider (IdP) for the following cloud applications: Salesforce, Box, and Google Apps. This feature enables the customer to ensure that users can only access these applications through the Zscaler service. Description • The customer can restrict users on their corporate network to accessing these applications only through Zscaler, from their corporate accounts. Users off the corporate network can access these applications with their corporate credentials only if they are connecting through Zscaler. • In addition to configuring settings in the ZIA Admin Portal, the customer must configure Zscaler as the identity provider (IdP) for each application, and enable single sign-on (SSO) for each application. • The login process is transparent for the end user. Once Identity Proxy is configured, and users are authenticated with the Zscaler service, users do not need to authenticate again with the cloud applications. The Zscaler service transforms its authentication cookie to log users in to the cloud application. • The customer can log user access to cloud applications from any location or device, as well as from agent-less deployments. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure that an authentication mechanism has been installed and that users are provisioned on the Zscaler service. • The customer must enable SSL inspection for locations that use Identity Proxy. • The customer must configure Zscaler as the identity provider (IdP) for each application. • The customer must ensure proper settings are configured in the ZIA Admin Portal. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 63 / Zscaler Internet Access Platform Services Document File Type Control Overview Zscaler enables the customer to manage users’ ability to upload or download various file types. Description • The customer can create a rule in the File Type Control policy and specify the following criteria: File Type, URL Categories, Users, Groups, Departments, Locations, and Time. The rule allows the customer to distinguish between uploads and downloads and specify whether the Zscaler service allows, cautions against, or blocks the upload or download. • Zscaler defines various file types the customer can control, including Archive (like .zip, 7-zip, or .stuffit), Audio (like .mp3 or .wav), Executable (like .exe or .lnk), Image (like .bmp, WebP, or .psd), Microsoft Office (like .xls or .doc), Mobile (like .apk or .ipa), Video (like .avi or .mov), Web Content (like .jar or .js), and other file types. • The customer can create rules for unknown file types. Zscaler performs MIME type checks for application types which are not well-defined. • The customer has the option to block unscannable files or password-protected files. • The Zscaler service displays end user notifications when users are cautioned or blocked. The customer can create custom end user notifications, configured in different languages with images and links to sources that further educate users on compliance policies. The customer can also redirect users to a URL that hosts the customer’s own end user notifications. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • SSL inspection might be required for applying granular policy to encrypted sites. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 64 / Zscaler Internet Access Platform Services Document Zscaler Client Connector Overview The Zscaler Client Connector is an application that can be installed on user devices to protect their traffic, even when they are outside of the corporate network. Description • By default, the Zscaler Client Connector captures web traffic from a user’s device, establishes a lightweight tunnel to the ZIA Public Service Edge closest to the user, and forwards the traffic through the tunnel so the ZIA Public Service Edge can apply security and access policies as configured in the ZIA Admin Portal. • Zscaler Client Connector supports all authentication mechanisms supported by the Zscaler service, including SAML with two-factor authentication. • Zscaler Client Connector can detect when users connect to a trusted network and disable its web security service so that user traffic is forwarded to the Zscaler service via the network’s configured traffic forwarding mechanism. • Zscaler Client Connector can detect when users connect to Wi-Fi hotspots that requires them to pay or accept a use policy before accessing the web. The app can disable its web security service for a specified period of time, allowing users to take steps to access the network, before automatically re-enabling its service. • The Zscaler Client Connector Portal is a web-based portal dedicated to app management, accessible directly from the ZIA Admin Portal. From the portal, the customer can configure app settings that Zscaler Client Connector downloads when users enroll with the Zscaler service. After enrollment, Zscaler Client Connector regularly checks for and downloads any updates the customer makes to these settings in the portal. • The Zscaler Client Connector Portal provides a dashboard that provides real-time information about enrolled devices, including the status of apps running on users’ devices and device fingerprints. • The customer can modify the app’s behavior. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 65 / Zscaler Internet Access Platform Services Document • The customer can add a custom PAC file when configuring settings so that the app forwards web traffic according to its instructions, or the customer can allow a user’s browser proxy settings to be applied. • The customer can configure settings to prevent users from disabling the app and bypassing its web security service. • The customer can configure settings so that the app auto-updates whenever the Zscaler service releases a new version. The customer also has the option of testing new versions first, then pushing auto-updates from the Zscaler Client Connector Portal. Customer Responsibilities • The customer must ensure an authentication mechanism has been installed and users have been provisioned on the Zscaler service. • The customer must ensure appropriate security and access policies have been configured in the ZIA Admin Portal. To enable SSL inspection for traffic forwarded by Zscaler Client Connector, enable SSL inspection for mobile traffic in the ZIA Admin Portal. • The customer is responsible for deploying the Zscaler Client Connector on user devices. • The customer is responsible for configuring and managing app settings in the Zscaler Client Connector Portal. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 66 / Zscaler Internet Access Platform Services Document Mobile Malware Protection Overview Zscaler provides mobile data and app security for Apple and Android mobile devices when devices are connected to a corporate Wi-Fi network that is sending traffic to Zscaler transparently over a GRE or IPSec tunnel. Description • Zscaler scans mobile traffic and provides comprehensive protection against malware and advanced security threats. • Zscaler can block apps that leak certain types of information. The customer can choose to block apps that send: • o Unencrypted user credentials o Location information o Personally Identifiable Information (PII) o Device identifiers o Communications to ad servers o Communications to unknown servers Zscaler provides detailed traffic visibility and granular reporting for mobile applications and device types. Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • SSL inspection might be required for applying granular policy. The customer is responsible for installing the Zscaler root certificate on user devices. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 67 / Zscaler Internet Access Platform Services Document Mobile Applications Control Overview Zscaler can restrict the stores from which users download apps for their mobile devices. Devices must be connected to a corporate Wi-Fi network that is sending traffic to Zscaler transparently over a GRE or IPSec tunnel. Description • Zscaler can enforce rules to restrict the stores from which users download apps for their mobile devices. The customer can create rules to allow or block based on the following criteria: o App Stores o Users o Groups o Departments o Locations o Time Customer Responsibilities • The customer is responsible for ensuring that internet traffic is forwarded to Zscaler. • The customer must ensure proper settings are configured in the ZIA Admin Portal. Otherwise, default settings will apply. • SSL inspection might be required for applying granular policy. The customer is responsible for installing the Zscaler root certificate on user devices. • Authentication is required for Zscaler to enforce user, group, and department policies. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 68 / Zscaler Internet Access Platform Services Document Priority Categorization Service Overview Customers who want to reduce the percentage of Zscaler-uncategorized content traversing their network can subscribe to the Zscaler Priority Categorization service. This service significantly improves the end user experience for customers with strict policies that block or caution uncategorized sites. Customers who allow uncategorized content will improve security and acceptable use policy controls as some uncategorized sites might be sites that would have been blocked if properly categorized. Description • The Zscaler service examines and assesses the top 100 uncategorized domains (based on transactions) on a daily basis and categorizes them • The Zscaler service cannot categorize all sites. For example, a site might be unreachable, be a login site, or might have no viewable content. In such cases, the service continues down the list of uncategorized domains until 100 domains have been categorized. A monthly email report of sites that the service was unable to categorize is sent to the customer. The customer can attempt to categorize the sites and send them to Zscaler, or manually add them to a custom URL Category. • The Zscaler service performs this categorization every day. The top domains for weekends (i.e., Saturday and Sunday) and major holidays are categorized on the following business day. • If the uncategorized domains for the day are less than 100, the Zscaler service only categorizes that day’s uncategorized sites. • Zscaler provides customers with an email alias for questions and feedback that will receive priority responses. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 69 / Zscaler Internet Access Platform Services Document Server/IoT Protection Overview Zscaler Internet Access (ZIA) protects user (e.g., employee, contractor, etc.) traffic and does not, by default, cover other device traffic. Some customers have requirements to send other traffic through ZIA for policy control and threat protection. Examples of traffic not included in user traffic, and considered device protected traffic, include server-initiated traffic (i.e., the server is the client), other devices calling out to the internet (i.e., IoT, Point of Sale, public kiosk). An example for protecting device traffic includes customers restricting a server to only communicating to certain IP addresses or URLs so they can report on any unexpected server traffic. Description • Allows customers to send non user traffic (such as server sourced traffic or IoT) through Zscaler’s service. • All subscribed licenses (i.e., Advanced Threats Protection, Data Loss Prevention, etc.) apply to server traffic as well. • Traffic is purchased by GB per month. Customer Responsibilities • The customer must purchase the appropriate level of monthly traffic, based on their best estimates. Traffic can reasonably grow over time without additional charges during the term of the contract as defined in the End User Subscription Agreement (EUSA). If the growth amount is exceeded, then the customer must purchase additional GB of monthly traffic. • The customer must ensure that traffic is directed to the Zscaler service. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 70 / Zscaler Internet Access Platform Services Document Inline Guest Wi-Fi Protection Overview Zscaler Internet Access (ZIA) protects user (employee, contractor, etc.) traffic and does not, by default, cover non-employee devices traffic. With this service customers can provide protection for Guest Wi-Fi devices (i.e., traffic not associated with a user seat already covered under the service). Guest Wi-Fi protection can be used for URL filtering by domain category. The customer can select from various filtering options to block access to legal liability sites, such as gambling, drugs, profanity, violence, etc., sites or sites with adult material, such as nudity, pornography, etc. Description • Allows customers to send Guest Wi-Fi users traffic through Zscaler’s service. • All subscribed licenses (i.e., Advanced Threats Protection, Data Loss Prevention, etc.) apply to server traffic as well. • Traffic is purchased by GB per month. Customer Responsibilities • The customer must purchase the appropriate level of monthly traffic, based on their best estimates. Traffic can reasonably grow over time without additional charges during the term of the contract as defined in the End User Subscription Agreement (EUSA). If the growth amount is exceeded, then the customer must purchase additional GB of monthly traffic. • The customer must ensure that traffic is directed to the Zscaler service. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 71 / Zscaler Internet Access Platform Services Document Private ZENs (PZENs) Overview When the customer has certain requirements that make forwarding their traffic to ZIA Public Service Edges less than ideal, the customer can extend the Zscaler cloud architecture to their organization’s premises by deploying Private ZENs (PZENs). PZENs use Zscaler hardware, shipped to the customer and hosted by the customer, to function as full-featured ZIA Public Service Edges dedicated to an organization’s traffic. PZENs perform the same service as the ZIA Public Service Edges in the Zscaler cloud, including support for features such as Firewall, Sandbox, and Data Loss Prevention (DLP). Description • PZENs are part of the Zscaler cloud and communicate with it for user authentication and policy updates, as well as for logging and reporting. Logs are transmitted to and stored on the Zscaler cloud as a central repository for integrated analytics. Customers can view and monitor internet traffic activity on the ZIA Admin Portal dashboard and make full use of the real-time logging and interactive reporting capabilities of the service. • An organization can send its internet traffic to a PZEN through a GRE tunnel, PAC file, or L2 redirect. • Admins define policies only once through the ZIA Admin Portal. After users are signed in and authenticated to the Zscaler service, the service will always apply their policies, whether they connect to an on-premises PZEN or to a ZIA Pubic Service Edge anywhere in the world. • PZENs are easy to deploy and require minimal administration. Customers have some access to the PZENs for monitoring and configuration. Zscaler requires Intelligent Platform Management Interface (IPMI) access to the PZENs. • PZENs are horizontally scalable so customers can easily add more PZENs as their traffic increases. • PZENs are deployed in a cluster, which features built-in load balancers to ensure availability and redundancy. The load balancers are specifically designed to distribute user traffic evenly across them. Zscaler does not recommend using external load balancers. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 72 / Zscaler Internet Access Platform Services Document • PZENs can be deployed in standalone mode for testing purposes only. Zscaler does not support standalone PZENs in production environments with live user traffic. • When a new PZEN software update is available, PZENs in a cluster will automatically stagger their updates to ensure high availability. No administrative interaction is required. • If a PZEN has intermittent connectivity to the Zscaler cloud, the weblogs are queued and sent when possible, instead of being dropped. The weblogs and their delays are shown in transaction drilldowns in the ZIA Admin Portal. The Nanolog Streaming Service (NSS) also has fields to distinguish between weblog generation time and weblog transmission time. Customer Responsibilities • The customer must forward its internet traffic to Zscaler. • The customer must ensure that all requirements to deploy PZENs, and run a PZEN cluster, are met. • The customer can deploy PZENs behind the firewall or in the DMZ. • A PZEN cluster requires outbound connections to Zscaler. The customer must ensure that their outbound firewall is configured to allow the necessary connections, as described in: https://ips.<zscaler-cloud- name>/pzr. For example, customers on the zscalertwo.net cloud should go to https://ips.zscalertwo.net/pzr. • The customer must deploy PZENs in clusters for productions environments and have a PZEN subscription for each PZEN instance in a cluster. A PZEN cluster must contain at least two PZEN instances. Zscaler does not support PZEN standalones in production environments with live user traffic. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 73 / Zscaler Internet Access Platform Services Document Virtual ZENs (VZENs) Overview When the customer has certain requirements that make forwarding their traffic to public ZIA Public Service Edges less than ideal, the customer can extend the Zscaler cloud architecture to their organization’s premises by deploying Virtual ZENs (VZENs), which use virtual machines (VMs) to function as full-featured ZIA Public Service Edges dedicated to an organization’s traffic. VZENs perform the same service as the ZIA Public Service Edges in the Zscaler cloud, including support for features such as Firewall, Sandbox, and Data Loss Prevention (DLP). Description • VZENs are part of the Zscaler cloud and communicate with it for user authentication and policy updates, and for logging and reporting. Logs are transmitted to and stored on the Zscaler cloud as a central repository for integrated analytics. Customers can view and monitor internet traffic activity on the ZIA Admin Portal dashboard and make full use of the real-time logging and interactive reporting capabilities of the service. • An organization can send its internet traffic to a VZEN through a GRE tunnel, PAC file, or L2 redirect. • Admins define policies only once through the ZIA Admin Portal. After users are signed in and authenticated to the Zscaler service, the service will always apply their policies, whether they connect to an on-premises VZEN or to a ZIA Public Service Edge anywhere in the world. • VZENs are easy to deploy and require minimal administration. Customers have full access to VZENs for monitoring and configuration. Zscaler does not require access to VZENs. • VZENs are horizontally scalable so customers can easily add more VZENs as their traffic increases. • VZENs are deployed in a cluster, which features built-in load balancers to ensure availability and redundancy. The load balancers are specifically designed to distribute user traffic evenly across them. Zscaler does not recommend using external load balancers. • VZENs can be deployed in standalone mode for testing purposes only. Zscaler does not support standalone VZENs in production environments with live user traffic. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 74 / Zscaler Internet Access Platform Services Document • Zscaler offers three VZEN SKUs, targeted for different throughput and performance requirements: small (30 Mbps), medium (up to 100 Mbps), and large (up to 600 Mbps). • An SSL acceleration card (sold separately) is recommended for deployments with a throughput requirement of more than 100Mbps. • When a new VZEN software update is available, VZENs in a cluster automatically stagger their updates to ensure high availability. No administrative interaction is required. • If a VZEN has intermittent connectivity to the Zscaler cloud, the weblogs are queued and sent when possible instead of being dropped. The weblogs and their delays are shown in transaction drilldowns in the ZIA Admin Portal. The Nanolog Streaming Service (NSS) also has fields to distinguish between weblog generation time and weblog transmission time. • Customers can use SNMP to monitor a VZEN. Traps can be raised in case of an adverse event that impacts traffic processing. SNMP is configured locally on the VZEN. Customer Responsibilities • The customer must forward its internet traffic to Zscaler. • The customer must ensure that all requirements to deploy VZENs, and run a VZEN cluster as a virtual machine, are met. • The customer can deploy VZENs behind the firewall or in the DMZ. • The customer must download and install the virtual appliance. • A VZEN cluster requires outbound connections to Zscaler. The customer must ensure that their outbound firewall is configured to allow the necessary connections, as described in: https://ips.<zscaler-cloud-name>/vzen. For example, customers on the zscalertwo.net cloud should go to https://ips.zscalertwo.net/vzen • The customer must deploy VZENs in clusters for productions environments and have a VZEN subscription for each VZEN instance in a cluster. A VZEN cluster must contain at least two VZEN instances. Zscaler does not support VZEN standalones in production environments with live user traffic. • The customer must adhere to the Hypervisor and virtual machine (VM) specifications, as well as internet bandwidth requirements. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 75 / Zscaler Internet Access Platform Services Document Private Service Edge Overview A private deployment of Service Edge brings the scale, reliability, and security capabilities of the Zscaler cloud as close to your users as possible—right at the edge of your network. Private Service Edge uses Zscaler hardware, shipped to the customer and hosted by the customer, to function as full-featured ZIA Public Service Edges dedicated to an organization’s traffic. Service Edge performs the same service as the ZIA Public Service Edges in the Zscaler cloud, including support for features such as Firewall, Sandbox, and Data Loss Prevention (DLP). Description • Private Service Edge is part of the Zscaler cloud and communicate with it for user authentication and policy updates, as well as for logging and reporting. Logs are transmitted to and stored on the Zscaler cloud as a central repository for integrated analytics. Customers can view and monitor internet traffic activity on the ZIA Admin Portal dashboard and make full use of the real-time logging and interactive reporting capabilities of the service. • An organization can send its internet traffic to a Private Service Edge through a GRE tunnel, PAC file, or L2 redirect. • Admins define policies only once, through the ZIA Admin Portal. After users are signed in and authenticated to the Zscaler service, the service will always apply their policies, whether they connect to an on-premises private deployment of a Private Service Edge or to a ZIA Public Service Edge anywhere in the world. • Private Service Edge is easy to deploy and require minimal administration. Customers have some access to the Private Service Edge for monitoring and configuration. Zscaler requires Intelligent Platform Management Interface (IPMI) access to a Private Service Edge. • Private Service Edge is horizontally scalable so customers can easily add more as their traffic increases. • Private Service Edge is deployed in a cluster, which features built-in load balancers to ensure availability and redundancy. The load balancers are specifically designed to ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 76 / Zscaler Internet Access Platform Services Document distribute user traffic evenly across them. Zscaler does not recommend using external load balancers. • Private Service Edge can be deployed in standalone mode for testing purposes only. Zscaler does not support standalone Service Edges in production environments with live user traffic. • When a new Service Edge software update is available, the Private Service Edges in a cluster will automatically stagger their updates to ensure high availability. No administrative interaction is required. • If a Private Service Edge has intermittent connectivity to the Zscaler cloud, the weblogs are queued and sent when possible, instead of being dropped. The weblogs and their delays are shown in transaction drilldowns in the ZIA Admin Portal. The Nanolog Streaming Service (NSS) also has fields to distinguish between weblog generation time and weblog transmission time. Customer Responsibilities • The customer must forward its internet traffic to Zscaler. • The customer must ensure that all requirements to deploy Service Edges, and run a Service Edge cluster, are met. • The customer can deploy Service Edge behind the firewall or in the DMZ. • A private deployment of Service Edge cluster requires outbound connections to Zscaler. The customer must ensure that their outbound firewall is configured to allow the necessary connections, as described in: https://ips.<zscaler-cloud- name>/zia_sedge. For example, customers on the zscalertwo cloud should go to https://ips.zscalertwo.net/zia_sedge. • The customer must deploy Private Services Edge in clusters for production environments and have a Private Service Edge subscription for each instance in a cluster. A Service Edge cluster must contain at least two instances. Zscaler does not support Service Edge standalones in production environments with live user traffic. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 77 / Zscaler Internet Access Platform Services Document Virtual Service Edge Overview A private deployment of Virtual Service Edge is designed for locations that need the full feature set of a ZIA Public Service Edge in a virtual form factor that is horizontally scalable and requires minimal deployment logistics. Virtual Service Edge uses virtual machines (VMs) to function as full-featured ZIA Public Service Edges dedicated to an organization’s traffic. A Virtual Service Edge performs the same service as the ZIA Public Service Edges in the Zscaler cloud, including support for features such as Firewall, Sandbox, and Data Loss Prevention (DLP). Description • Virtual Service Edge is part of the Zscaler cloud and communicates with it for user authentication and policy updates, and for logging and reporting. Logs are transmitted to and stored on the Zscaler cloud as a central repository for integrated analytics. Customers can view and monitor internet traffic activity on the ZIA Admin Portal dashboard and make full use of the real-time logging and interactive reporting capabilities of the service. • An organization can send its internet traffic to a Virtual Service Edge through a GRE tunnel, PAC file, or L2 redirect. • Admins define policies only once through the ZIA Admin Portal. After users are signed in and authenticated to the Zscaler service, the service will always apply their policies, whether they connect to a private deployment of Virtual Service Edge or to a ZIA Public Service Edge anywhere in the world. • Virtual Service Edge is easy to deploy and require minimal administration. Customers have full access to Private Virtual Service Edge for monitoring and configuration. Zscaler does not require access to the Virtual Service Edges. • Virtual Service Edge is horizontally scalable so customers can easily add more as their traffic increases. • Virtual Service Edges are deployed in a cluster, which features built-in load balancers to ensure availability and redundancy. The load balancers are specifically designed to ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 78 / Zscaler Internet Access Platform Services Document distribute user traffic evenly across them. Zscaler does not recommend using external load balancers. • Virtual Service Edge can be deployed in standalone mode for testing purposes only. Zscaler does not support standalone Virtual Service Edges in production environments with live user traffic. • Zscaler offers one Virtual Service Edge SKU targeted for throughput of up to 600Mbps. • An SSL acceleration card (sold separately) is recommended for deployments with a throughput requirement of more than 100Mbps. • When a new Virtual Service Edge software update is available, Virtual Service Edges in a cluster will automatically stagger their updates to ensure high availability. No administrative interaction is required. • If a Virtual Service Edge has intermittent connectivity to the Zscaler cloud, the weblogs are queued and sent when possible instead of being dropped. The weblogs and their delays are shown in transaction drilldowns in the ZIA Admin Portal. The Nanolog Streaming Service (NSS) also has fields to distinguish between weblog generation time and weblog transmission time. • Customers can use SNMP to monitor a Virtual Service Edge. Traps can be raised in case of an adverse event that impacts traffic processing. SNMP is configured locally on the Virtual Service Edge. Customer Responsibilities • The customer must forward its internet traffic to Zscaler. • The customer must ensure that all requirements to deploy Virtual Service Edges, and run a Virtual Service Edge cluster as a virtual machine, are met. • The customer can deploy Virtual Service Edge behind the firewall or in the DMZ. • The customer must download and install the virtual appliance. • A Virtual Service Edge cluster requires outbound connections to Zscaler. The customer must ensure that their outbound firewall is configured to allow the necessary connections, as described in: https://ips.<zscaler-cloud- name>/zia_edge. For example, customers on the zscalertwo cloud should go to https://ips.zscalertwo.net/zia_edge. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 79 / Zscaler Internet Access Platform Services Document • The customer must deploy Virtual Service Edges in clusters for production environments and have a Virtual Service Edge subscription for each instance in a cluster. A Virtual Service Edge cluster must contain at least two instances. Zscaler does not support Virtual Service Edge standalones in production environments with live user traffic. • The customer must adhere to the Hypervisor and virtual machine (VM) specifications, as well as internet bandwidth requirements. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 80 / Zscaler Internet Access Platform Services Document Private Nanolog Streaming Service (NSS) Appliance for Web Logs Overview Zscaler’s private NSS is a Zscaler managed appliance the customer can use to stream web traffic logs in real time from the Zscaler Nanolog to the customer’s on-premises security information and event management (SIEM) system. NSS helps the customer comply with regulatory mandates on local log archival, correlate logs from multiple devices, and conduct historical web log analysis. Description • When an organization deploys NSS, NSS opens a secure tunnel to the Nanolog in the Zscaler cloud. The Nanolog then streams copies of the logs to NSS in a highly compressed format to reduce bandwidth footprint; the original logs are retained on the Nanolog. • When NSS receives the logs from the Nanolog, it unscrambles them, applies the configured filters to exclude unwanted logs, converts the filtered logs to the configured output format so they can be parsed by the customer’s SIEM, and then streams the logs to the SIEM over a raw TCP connection. • For full site redundancy, each organization can subscribe to up to two NSS systems for web logs in an active-active configuration. Each NSS supports up to eight parallel SIEM connections called feeds. Each feed can have a different list of fields, a different format, and different filters. • NSS requires minimal administration. After the customer deploys it, NSS automatically polls Zscaler for updates and installs them. • For monitoring purposes, the customer can configure a separate alert feed. Zscaler will send the alerts in an RFC-compliant syslog format to the specified IP address and port. • The customer can open a Behavioral Analysis report based on the MD5 parameter retrieved from the logs in the SIEM. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 81 / Zscaler Internet Access Platform Services Document Customer Responsibilities • The customer must use a SIEM that is interoperable and supported by Zscaler. • The customer must ensure that all the requirements to run the NSS appliance are met. • Ensure that all firewall requirements are met as detailed in https://ips.<zscaler-cloudname>/addresses/nss.html. For example, customers on the zscalerone cloud should go to https://ips.zscalerone.net/addresses/nss.html. NSS requires only outbound connections to the Zscaler cloud. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 82 / Zscaler Internet Access Platform Services Document Intelligent Routing (Guest Wi-Fi) Overview Powered by DNS, the Intelligent Routing platform can be used on any device and can be deployed within the enterprise environment or on Guest Wi-Fi. The Intelligent Routing platform filters DNS responses and employs the same inline proxy for inspection and malware protection as the full proxy solution. However, the service only inspects as required based on threat detection using Zscaler’s own heuristics. Description • With Intelligent Routing, the customer can create security policies for locations using four key features: o URL filtering by domain category: The customer can select from six filtering options. Each option corresponds to a predefined group of URL categories that the customer can block. ▪ All: All sites are blocked. ▪ Strict: Legal liability sites, including gambling, drugs, profanity, violence, etc., are blocked. ▪ Moderate: Sites with adult material such as nudity, pornography, etc., are blocked. o ▪ Minimal: Sites with pornography are blocked. ▪ None: No sites are blocked. ▪ Custom: The customer can manually select which URL categories to block. Threat Security: This feature is equivalent to the advanced threat protection of the Zscaler service, providing basic protection against spyware and malware (including botnets, malicious active content, unauthorized communication, and XSS) as well as standard Behavioral Analysis (for all Windows executable files and Dynamic Link Libraries (DLL) of traffic from URLs in suspicious URL categories). o SafeSearch: This feature is a browser function that helps the customer block inappropriate or explicit images from search engine results (Google, Yahoo!, Bing, etc.). Enabling Safe Search in Zscaler forces all end users’ web browsers to use Safe Search, and users cannot bypass the restriction. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 83 / Zscaler Internet Access Platform Services Document o SSL Interception: Enabling SSL Inspection allows Zscaler to decrypt HTTPS traffic and protect against dangerous content hidden in incoming or outgoing HTTPS traffic. However, because SSL interception requires that a root certificate be first installed in the end user’s browser, enabling SSL interception is not recommended for Guest WiFi and other deployments where the protected devices are unmanaged and/or installing a certificate is not desirable. If you do not enable SSL inspection, you can block URL categories that attempt to use SSL. • With Intelligent Routing configured, when an end user requests a website, a DNS query is sent to one of Zscaler’s DNS anycast servers. Zscaler checks the configured policy for the location to see which action is required (Block, Inspect, or Direct): o If the customer’s policy prohibits the site, the action is Block. The DNS response redirects the client to a block page configured with standard or custom text. o If the site is unknown or is known to contain malware, the action is Inspect. The platform sends the traffic to the Zscaler cloud for full inspection and returns only safe content. o If the site is allowed by policy, the action is Direct. The client proceeds directly to the site. • The Intelligent Routing dashboard presents information about the organization from a global view. You can drill down into individual locations for more granular data, such as the number of transactions allowed or blocked, traffic trend, top locations, top categories, top domains, and top threats. Customer Responsibilities • The customer must configure their firewall and ensure that all DNS queries are sent to Zscaler’s anycast DNS servers only. • The customer must ensure proper settings are configured in the Zscaler Intelligent Routing Admin Portal. Otherwise, default settings will apply. • If SSL inspection is enabled: o The customer must ensure that Zscaler’s root certificate is configured in the end user’s browser. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 84 / Zscaler Internet Access Platform Services Document o To exempt specific URL categories from SSL inspection (for example, URLs in the Finance or Health category), the customer must request the exemption via support. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 85 / Zscaler Internet Access Platform Services Document Zscaler Test Tenants Overview The customer can subscribe to one or more Zscaler test tenants. A test tenant enables access to 50 users and mirrors the customer’s licensing from their production tenant. This allows the customer to try new features in a safe environment that does not interfere with their production environment. Description Zscaler operates the world’s largest Security-as-a-Service cloud multi-tenant platform. The Zscaler Test Tenant feature enables customers to take advantage of the flexibility of our platform and build a test environment with virtually no impact to their production environment. Customers will have access to a test tenant that mirrors any licenses included in their production tenant, but they are limited to 50 users. Customer Responsibilities • The customer must ensure the test tenant was provisioned on a Zscaler cloud. The test tenant will be provisioned on the same cloud as the customer’s production tenant, unless otherwise requested. • The customer must use a supported method (e.g., GRE, IPSec, PAC files, proxy chaining, etc.) to forward test traffic to the test tenants and ensure their traffic is forwarded to Zscaler. • For GRE and IPSec tunnels and proxy chaining, the customer must use hardware that is interoperable and supported by Zscaler. The customer must ensure that hardware is installed and operated according to applicable third-party vendor specifications and recommendations, and ensure that hardware has the capacity required for forwarding traffic to Zscaler. • The customer can only use the test tenant for testing purposes and not for any production traffic. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 86 / Zscaler Internet Access Platform Services Document Cloud Browser Isolation Overview Cloud Browser Isolation provides an organization the capability to isolate users from potentially harmful content on the internet. This is done by loading the accessed web page on a remote browser in any one of the many Zscaler data centers across the globe and streaming the rendered content as a stream of pixels to the user’s native browser. Isolating web pages on an ephemeral remote browser ensures that the HTML files, CSS files, JavaScript, and any other active content served by the accessed web page never reaches the end user’s machine or the corporate network, thus ensuring an air-gap between the end user and the web page. Description • Cloud Browser Isolation allows customers to create isolation profiles on the Admin Portal (https://admin.isolation.zscaler.com). • As part of the isolation profile the customer can define attributes of the ephemeral remote browser and the security controls associated with it. o Allows the customer to define if the isolated browser should store the user’s cookies, inserted by destination web pages accessed via the isolated browser across isolation sessions. o Allows the customer to define what Zscaler isolation regions the isolation profile should be available for. o Allow customers to define if the user using the isolated browser should be allowed to upload files to the isolated browser from their native browser/machine. o Allow customers to define if the user using the isolated browser should be allowed to download files from the isolated browser to their native browser/machine. o Allow customers to define if the user using the isolated browser should be allowed to copy clipboard content from the isolated browser to their native browser/machine. o Allow customers to define if the user using the isolated browser should be allowed to copy clipboard content from the native browser/machine to their isolated browser. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 87 / Zscaler Internet Access Platform Services Document o Allow customers to configure the PAC file which needs to be deployed on the isolation browser. • Once the isolation profile is created an associated isolation profile URL is generated. • Customer can create “Block and Redirect” rules, using ZIA’s URL filtering policies, to redirect specific categories to the isolation profile URL. Customer Responsibilities • The customer must ensure that traffic is directed to the ZIA service. • The customer must purchase the appropriate Cloud Browser Isolation SKU based on the volume of monthly traffic that needs to be isolated in comparison with the overall ZIA traffic, based on their best estimates. Traffic can reasonably grow over time without additional charges during the term of the contract as defined in the End User Subscription Agreement (EUSA). If the growth amount is exceeded, then the customer must purchase additional gigabytes of monthly traffic. • Authentication must be enabled for the locations from which the user’s traffic needs to be isolated. • SSL Inspection is required to isolate traffic destined to SSL destinations. ©2020 Zscaler, Inc. All rights reserved. / ZSCALER CONFIDENTIAL INFORMATION 88