icon-unified.svg
Experience Center

Adding Process-Based Applications to Bypass Traffic

You can add process-based applications in the Admin Portal to bypass traffic. Add information such as paths, executable signatures, and certificate attributes to help identify process-based applications that can frequently change. You can then select these applications in App Profiles to bypass traffic for both Zscaler Tunnel (Z-Tunnel) 1.0 and Z-Tunnel 2.0 when using the Filtering Platform (WFP).

You must enable Install WFP Driver in App Profiles to use Process-Based Application Bypass.

To add a process-based application to bypass traffic:

  1. In the Admin Portal, go to Infrastructure > Common Resources > Application > Process Based.

    Process-Based Application Bypass

  2. Click the Process-Based tab.
  3. Click Add Application.

    Add Application Windows Process Based Applications

  4. In the Add Application window, complete the following fields:
    1. Name: Enter the name of the process-based application.
    2. Path: Enter the executable file names for the application. Press Enter or click the Add icon after each entry. You can add multiple items at the same time by separating each item with a comma and then pressing Enter or clicking the Add icon when finished.

You can use environment variables or wildcards as follows:

  • Use a single asterisk (*) to match any full single path component such as file or folder name. You can’t use a wildcard for partial components.
  • Use two asterisks (**) to match any number of consecutive path components.
  1. Matching Criteria: Select one or more options from the drop-down menu and then complete the fields that display.

You can only select Certificate Signer or Certificate Subject for each application you add.

  • SHA 2 Signature
    • Application Name: Enter a unique name of the executable signature that distinguishes it from other signatures.
    • Application Signature: Enter the hash of the executable file.
  • Certificate Signer
    • Certificate Name: Enter a unique name of the code signing certificate to distinguish it from other signatures.
    • Certificate Thumbprint: Enter the Certificate Thumbprint. For Zscaler Client Connector for Windows, use Windows Explorer to locate the certificate thumbprint.
      1. Navigate to the Program Files folder where Zscaler is installed.
      2. Double-click Zscaler > ZSATunnel.
      3. Right-click the ZSATunnel file and select Properties.
      4. Click the Digital Signatures tab.
      5. Select the signature from the Signature list window and click Details.
      6. Click View Certificate.
      7. Click the Details tab.
      8. Scroll down and select Thumbprint.
      9. Copy and paste the thumbprint into the Certificate Thumbprint field.
  • Certificate Subject
    • Certificate Name: Enter a unique name of the certificate subject to distinguish it from other certificate subjects.
    • Certificate Subject: Enter a name that matches the subject of the certificate.
  1. Click Save.
Related Articles
About Zscaler Client Connector App ProfilesConfiguring Zscaler Client Connector App ProfilesSearching for a Zscaler Client Connector App ProfileCopying a Zscaler Client Connector App ProfileZscaler Client Connector Profile Rule ExampleViewing the Policy Token for a Zscaler Client Connector App ProfileAnti-Tampering for Zscaler Client ConnectorConfiguring a Default Global Log ModeConfiguring a Cellular Quota with Zscaler Client Connector for AndroidSyncing Directory Groups between Internet & SaaS and Zscaler Client ConnectorBest Practices for Adding Bypasses for Z-Tunnel 2.0About Application BypassAdding IP-Based Applications to Bypass TrafficAdding Process-Based Applications to Bypass TrafficZscaler Endpoint Data Loss Prevention (DLP) Integration with Zscaler Client Connector