Documentation
Zscaler Connectors
Developer Center
Zscaler Legacy
ITDR Help
- Getting Started
- Administration
- Authentication
- SAML Configuration
- OpenID Configuration
- Authentication Settings
- Investigate
- Orchestrate
- Orchestration Rules
- Enrichment Integrations
- Containment Integrations
- About Containment Integration
- Containment Configuration Guide for CrowdStrike
- Containment Configuration Guide for Identity Threat Protection with Okta AI
- Containment Configuration Guide for Zscaler Internet Access (ZIA)
- Containment Configuration Guide for Zscaler Private Access (ZPA)
- Viewing the Blocked Identities
- API Token Management
- SIEM Integrations
- About Service Connectors
- About SIEM Integrations
- Configuring a Service Connector
- SIEM Configuration Guide for ArcSight Enterprise Security Manager
- SIEM Configuration Guide for IBM QRadar
- SIEM Configuration Guide for Microsoft Sentinel
- SIEM Configuration Guide for Netmonastery DNIF
- SIEM Configuration Guide for Splunk Enterprise and Cloud Platform
- SIEM Configuration Guide for Syslog
- SIEM Configuration Guide for Sumo Logic
- Editing or Deleting a Service Connector
- Editing or Deleting a SIEM Integration
- Dashboard
- Risk Summary
- Active Directory
- About the Identity Posture Dashboard
- Viewing the Active Directory Posture Scan Report
- Downloading the Active Directory Posture Scan Report
- Downloading the Zscaler ITDR Active Directory Executive Summary Report
- Downloading the Active Directory Delta Report
- Viewing the Active Directory Detailed Findings and Recommendations Details
- Viewing the Top Vulnerable Active Directory Users and Computers
- Viewing Affected Active Directory User Account Details
- Viewing Affected Active Directory Computer Details
- Viewing the Active Directory Issue Details Grouped By Severity
- Viewing the Active Directory Issue Details Grouped By Risk Type
- Viewing the Active Directory Risk Reduction Roadmap
- Viewing the Active Directory Issue Details Grouped by MITRE ATT&CK
- Downloading and Running a Remediation Script
- Including Active Directory Decoy Users and Computers in the Scan Results
- Deleting an Active Directory Scan Report
- Entra ID
- About the Entra ID Dashboard
- Viewing the Entra ID Vulnerability Report
- Downloading the Entra ID Vulnerability Report
- Downloading the Zscaler ITDR Microsoft Entra ID Executive Summary Report
- Downloading the Entra ID Delta Report
- Viewing the Entra ID Detailed Findings and Recommendations Details
- Viewing the Top Vulnerable Entra ID Identities
- Viewing Affected Entra ID Identity Details
- Viewing the Entra ID Issue Details Grouped by Severity
- Viewing Entra ID Issue Details Grouped by Risk Type
- Viewing the Entra ID Risk Reduction Roadmap
- Viewing the Entra ID Issue Details Grouped by MITRE ATT&CK Techniques
- Running Remediation Actions for Microsoft Entra ID Issues
- Viewing Entra ID Remediation History
- Deleting an Entra ID Scan Report
- Endpoint Credential Exposure
- About the Endpoint Credential Exposure Dashboard
- Downloading Endpoint Credential Exposure Scan Data
- Downloading the Endpoint Credential Exposure Executive Summary Report
- Viewing Exposed Endpoint Credential Details by Scan Type
- Cleaning Up Exposed Endpoint Credentials
- Viewing the Exposed Endpoint Credential Risk Reduction Roadmap
- Viewing the Exposed Endpoint Credential Detailed Findings and Recommendations Details
- Viewing Exposed Endpoint Credential Issues Grouped by MITRE ATT&CK Techniques
- Viewing Privilege Escalation Attack Paths for Exposed Endpoint Credentials
- Viewing Identities with Exposed Endpoint Credentials
- Active Directory Change Detection
- About the Active Directory Change Detection Dashboard
- Enabling Change Detection
- Viewing Change Detection Issue and Remediation Details
- About the Active Directory Custom Change Detection Dashboard
- Viewing the History of Active Directory Properties Change Details
- Deleting an Active Directory Property Change Details
- Entra ID Change Detection
- AD Threat Detection
- Password Analysis
- Scan Configuration
- Active Directory Posture Scan
- Endpoint Credential Exposure Scan
- Entra ID Posture Scan
- Threat Detection Policies
- Change Detection Policies
- Active Directory Custom Change Detection Policies
- Entra ID Custom Change Detection Policies
- Third-Party Integrations
- Safelists
- Active Directory Safelists
- Active Directory Issue Safelist
- Active Directory Object Safelist
- AD Change Detection Issue Safelist
- AD Change Detection Object Safelist
- Entra ID Safelists
- Entra ID Issue Safelist
- Entra ID Object Safelist
- Entra ID Change Detection Issue Safelist
- Entra ID Change Detection Object Safelist
- Notifications
- About Notifications
- Configuring an Active Directory Posture Notification
- Configuring an Active Directory Change Detection Notification
- Configuring an Endpoint Credential Scan Notification
- Configuring an Entra ID Posture Notification
- Configuring an Entra ID Change Detection Notification
- Editing or Deleting a Notification
- Settings
- Endpoint Settings
- Agents
- Agent Configuration
- Agent Update Groups
- Safe Processes
- Server Agents Settings
- Domains
- Agents
- Agent Update Groups
- Agent Configuration
- Audit Logs
- Advanced Settings
- Release Notes