icon-unified.svg
Experience Center

Setting up Secure Access

You can get started protecting your users quickly with Zscaler. Once you're set up, you'll be able to adjust your configuration as needed in the Admin Portal.

Before you begin, you must be logged in to an existing Zscaler account. To learn more, see Signing in to the Admin Portal.

Click the Test Security button to check the status of your current security configuration to understand your current vulnerabilities using Zscaler's Internet Threat Exposure Analysis. You can return to this test after you have completed the onboarding process to see how you are protected.

To make your setup go as smoothly as possible, review the steps before beginning and make sure you have immediate access to all the information you will need, such as login information for your IdP.

  • Click Initiate Setup to start adding users to be protected by Zscaler. You can repeat this process as many times as you need to from the Admin Portal.

    To get started adding users, select one of the following:

    During onboarding, you can assign users to one of two roles:

    • End User: a regular user who does not require any administrator access. These users are assigned to the ZIdentity Dynamic Group Registered Domains group.
    • Full Admin: an administrator with full access to add, edit, import, and delete users within the Admin Portal. These users are assigned to the ZIdentity Global Administrators group. This type of user is commonly called a super admin.

    To learn more about ZIdentity groups, see About User Groups. If you want to change user roles before you complete onboarding, see Editing Newly Onboarded Users.

    Close
  • After you've added users to your setup, you'll send those users a link to install Zscaler Client Connector, an application that will ensure that all user traffic is protected with the security settings you decide. You can change these settings later if you need to.

    Users must have administrator permissions on their devices that allow them to install applications.

    To set up traffic forwarding:

    1. Click Secure Setup to specify the users you want to protect.
    2. On the Clients page, click the boxes for the applicable platforms for your users. Click Next to continue.
    3. On the Traffic Forwarding page, select whether your users currently connect to your organization via a VPN:
      • If you're not using a VPN, select No and click Next.
      • If you are using a VPN, select Yes and enter the IP addresses and hostnames for the VPN. Zscaler will ignore traffic to those addresses so that the VPN can continue to work. Click Next to continue.
    4. On the Select Users for Zscaler Client Connector Distribution page, select the users who you want to receive an email containing a link to download Zscaler Client Connector. You can check the box next to the Name heading to select all users. Click Next to continue.
    5. On the Distribute Zscaler Client Connector Application page:
      • By default, users will receive automatic software updates to Zscaler Client Connector. Disable the toggle if you do not want users to receive automatic updates.
      • Review the email that will be sent to the users you selected with links to install Zscaler Client Connector.
      • Click Finish to send the email with installation links to your users.
    Close
  • The final step in securing your internet is defining the security policies for your organization.

    Click Set Up Policies to start configuring the following types of security policies:

    • URL filtering: block, isolate, or allow internet destinations by URL category.
    • SSL inspection: configure what types of secure internet traffic (SSL) is inspected for added security.
    • Cyber threat protection: review additional protection policies for cyber threats, such as botnets, phishing, and malware.
    • Data protection: review data protection policies that ensure sensitive data is not inadvertently leaked via email, social media, file sharing, or other means.
    • Privacy: configure how you protect your users' personally identifiable information (PII).

    You can also configure the following settings:

    When you have finished defining your initial policy configuration, click Activate & Launch to enable the policies you have selected and launch the Admin Portal.

    Close
  • When you complete the steps above, your organization's initial security configuration and access to the internet is complete and the Networking dashboard in the Admin Portal is displayed by default.

    From the Admin Portal, you have full access to all Zscaler capabilities, such as fine-tuning security policies, viewing analytics, extending security to other SaaS and private applications and more. To learn more, see Navigating within the Admin Portal.

    Close
Related Articles
Upgrading to Zscaler Experience CenterSetting up Secure Access