icon-fair-use-customer-data.svg
Logs & Fair Use

ZDX Logs

In order to provide the Zscaler Digital Experience (ZDX) service, Zscaler has the right to process, use, reproduce, store, modify, and display the information from logs as defined in this article. For ZDX, logs are defined as the telemetry metadata collected via ZDX probes and Microsoft 365 probes, as well as the metadata that correlates with logs of other Zscaler SaaS products, such as Zscaler Internet Access (ZIA) or Zscaler Private Access (ZPA). Zscaler retains the logs on a rolling period of at least two weeks or two days during your subscription term, depending on your subscription. When the subscription term ends or expires, the logs are deleted by Zscaler according to applicable retention cycles.

ZDX supports Diagnostics mode to enable remote live diagnostics and troubleshooting by an administrator. Diagnostics might result in the capture and storage of packet capture files, as well as additional telemetry about user devices, including software process level information of the devices (ZDX Deep Tracing data). Zscaler retains the ZDX Diagnostics reports on a rolling period of at least two weeks or two days during your subscription term, depending on your subscription. When the subscription term ends or expires, the ZDX Diagnostics reports and Diagnostics data are deleted by Zscaler according to applicable retention cycles.

For the ZDX Snapshot feature, ZDX Snapshots are retained by Zscaler for 90 days.

For the ZDX Copilot feature, ZDX Copilot prompts and responses are stored by Zscaler for 14 days as part of the session history. ZDX Copilot is not trained using any customer data.

Logs are stored in the United States, European Union, or Australia. If you subscribe to the ZDX Data Residency feature, the logs are stored in the geographic region selected by you.

Related Articles
DSPM LogsZCSPM LogsZDX LogsZIA LogsZPA LogsZPC LogsZIdentity LogsZscaler 3rd-Party App Governance LogsZscaler Asset Exposure Management (AEM) LogsZscaler Breach Predictor LogsZscaler Business Insights LogsZscaler Cellular (SIM and Cellular Edge) LogsZscaler Client Connector LogsZscaler Cloud & Branch Connector LogsZscaler Deception and Zscaler ITDR LogsZscaler External Attack Surface Management (EASM) LogsZscaler Risk360 LogsZscaler Threat Hunting LogsZscaler Traffic Capture LogsZscaler Unified Vulnerability Management (UVM) LogsZscaler Zero Trust Device Segmentation Logs