Documentation
Zscaler Connectors
Developer Center
Zscaler Legacy
Secure Private Access (ZPA) Help
- Getting Started
- Reference Architecture
- Protecting Private Applications with ZPA AppProtection
- Universal ZTNA with Zscaler Private Access Private Service Edge
- Zero Trust Access to Private Apps in AWS with Zscaler Private Access
- Zero Trust Access to Private Apps in Microsoft Azure with Zscaler Private Access
- Zero Trust User-to-App Segmentation with ZPA
- Dashboard & Diagnostics
- Applications and Users Monitoring
- Viewing the Applications Dashboard
- About the Users Dashboard
- About the Health Dashboard
- Viewing the Source IP Anchoring Dashboard
- Accessing User Activity Diagnostics
- Accessing User Status Diagnostics
- Understanding ZPA Session Status Codes
- Viewing the Extranet Dashboard
- About Usage Insights
- Viewing Quarterly Business Review Reports
- App Connector Monitoring
- Private Service Edge Monitoring
- AppProtection and Browser Protection Monitoring
- Analyzing Risk with MITRE ATT&CK for AppProtection
- Viewing the API Protection Dashboard
- Viewing the Active Directory Protection Dashboard
- Viewing the Protocol Discovery Dashboard
- Accessing API Protection Diagnostics
- Accessing Protocol Discovery Diagnostics
- Viewing the AppProtection Dashboard
- Viewing the Browser Protection Dashboard
- Accessing AppProtection Diagnostics
- Accessing AD Protection Diagnostics
- Accessing Clientless Access Diagnostics
- Accessing Application Protocol Diagnostics
- Privileged Remote Access Monitoring
- Administration
- About Integrations
- Configuring the Company Profile
- About Audit Logs
- Configuring Remote Assistance
- Understanding Zscaler Client Connector Support for Multiple Tenants
- Updating Partner Information
- About Client Sessions
- About ZDX Web Probe Rate Limiting
- Adding an Executive Insights App User
- About the User Portal Acceptable Use Policy
- Understanding IPv4 and IPv6 Support
- Admins and Roles
- Backup & Restore
- Delegated Tenant Administration
- Disaster Recovery Administration
- Understanding Disaster Recovery
- Configuring Disaster Recovery
- About Disaster Recovery Settings
- About Disaster Recovery Application Segments
- About Disaster Recovery App Connector Groups
- About Disaster Recovery Private Service Edge Groups
- Understanding and Installing the Zscaler DNS Record Generator
- Creating DNS TXT Records
- Managing Disaster Recovery Configuration and Binary Snapshots
- Peer-to-Peer Connectivity
- Authentication
- IdP Configuration
- IdP Configuration Guides
- SAML Attributes
- Identity Management
- About SCIM
- About SCIM Users
- About SCIM Groups
- About SCIM Sync Logs
- About SCIM APIs
- SCIM API Examples
- Enabling SCIM for Identity Management
- Deleting Users in SCIM
- SCIM Configuration Guides
- User Risk Scores
- Settings
- Machine Authentication
- Emergency Access Authentication
- Application Management
- Application Segments
- About Applications
- Configuring Defined Application Segments
- Editing Defined Application Segments
- About AI-Powered Recommendations for Application Segments
- Configuring AI-Powered Recommendations
- Merging AI-Powered Recommendations
- Sharing Defined Application Segments
- Configuring AI-Powered Recommendations Settings
- Validating a Client Hostname
- Adding DNS Search Domains
- Setting Application Segment Configuration Warnings
- About AppProtection Applications
- About Privileged Remote Access Applications
- About Application Discovery
- About Application Access
- Understanding Double Encryption
- Understanding Health Reporting
- Defining a Dynamically Discovered Application
- Configuring Bypass Settings
- Disabling Access to Applications
- Understanding Source IP Anchoring Direct
- Using Application Segment Multimatch
- About Application Segment Import
- Using Application Segment Import
- Merging Imported Application Segments
- Segment Groups
- Servers & Server Groups
- Enterprise Application Configurations
- Bypassing Unified Communications Traffic
- Configuring Access to Distributed File Servers
- Enabling Domain Join for Remote Users on Windows Devices
- Supporting Citrix XenApp and XenDesktop Applications
- Supporting FTP Applications
- Supporting Microsoft GPO Network Traffic
- Supporting Microsoft SCCM
- Supporting Reauthentication into ZPA via Microsoft IWA with Kerberos
- Supporting RDP Applications
- Supporting SAP Applications
- Browser Access
- About Browser Access
- Defining a Browser Access Application within an Existing Application Segment
- Defining a Browser Access Application with Multiple Ports on the Same Domain
- Defining a Browser Access Application with Different External vs. Internal Domains
- Using Wildcard Certificates for Browser Access Applications
- Locating Browser Access Error Codes
- Notification Management
- Policies
- Access Policy
- Timeout Policy
- Client Forwarding Policy
- Isolation Policy
- AppProtection for Private Application Traffic Policy (formerly Inspection)
- Privileged Remote Access Policy
- Editing Privileged Credentials Policies
- Configuring Privileged Credentials Policies
- Configuring Portals Policies
- About Portals Policy
- About Privileged Credentials Policy
- About Privileged Policy
- About Consoles Policy
- Configuring Privileged Capabilities Policies
- Editing Privileged Capabilities Policies
- Redirection Policy
- Segment Group Policy
- Data and Threat Protection for Private Application Traffic
- Data Loss Prevention
- About Data Loss Prevention
- Configuring DLP Policy Rules with Content Inspection
- Configuring DLP Policy Rules without Content Inspection
- Configuring DLP Policy Rules with Evaluate All Rules Mode Enabled
- Configuring DLP Advanced Settings
- Monitoring or Blocking Outbound Content by Data Size
- DLP Policy Configuration Example: Match Only
- Step-by-Step Configuration Guide for Webex Teams Real-Time DLP
- Accessing the DSPM Admin Portal using SSO
- DLP Dictionaries & Engines
- About DLP Dictionaries
- Understanding Predefined DLP Dictionaries
- Editing Predefined DLP Dictionaries
- Cloning Predefined DLP Dictionaries
- Adding Custom DLP Dictionaries
- Defining Patterns for Custom DLP Dictionaries
- Defining Phrases for Custom DLP Dictionaries
- Defining Microsoft Information Protection Labels for Custom DLP Dictionaries
- About DLP Engines
- Understanding DLP Engines
- Editing Predefined DLP Engines
- Adding Custom DLP Engines
- Cloning DLP Engines
- DLP Incident Receiver
- About Zscaler Incident Receiver
- Adding a Zscaler Incident Receiver
- Configuring the Zscaler Incident Receiver for On-Premises VMs
- Configuring the Zscaler Incident Receiver for Amazon Web Services EC2 VMs
- Configuring the Zscaler Incident Receiver for Azure VMs
- About ICAP Receivers for DLP
- About ICAP Communication Between Zscaler and DLP Servers
- Enabling Secure ICAP
- Enabling Unencrypted ICAP
- Adding an ICAP Receiver for DLP
- Configuring the ICAP Server with the Mutual Transport Layer Security (MTLS) CA Certificate
- DLP Index Tool
- DLP Exact Data Match
- DLP Indexed Document Match
- Labels and Tags
- Notification Templates
- File Type Control
- Firewall
- Understanding Firewall Capabilities
- Configuring Firewall Policies
- Enabling the Firewall for Locations
- Firewall HTTP Tunnel Connectivity
- Configuring Custom Ports
- ZIA & Application Layer Gateway Enabled Applications
- Firewall Control
- DNS Control
- FTP Control
- IPS Control
- Firewall Policy Resources
- About Network Services
- Configuring Network Services
- About Network Service Groups
- Configuring Network Service Groups
- About Network Applications
- About Network Application Groups
- Configuring Network Application Groups
- About Application Service Groups
- About Source IP Groups
- Configuring Source IP Groups
- About Destination IP Groups
- Configuring Destination IP Groups
- About DNS Application Groups
- Configuring DNS Application Groups
- About IP Pool
- About Threat Categories
- Adding Threat Categories
- About EDNS Client Subnet (ECS) Injection
- Adding EDNS Client Subnet (ECS) Prefixes
- About DNS Gateways
- Adding DNS Gateways
- Sandbox
- SSL Inspection
- About Secure Sockets Layer (SSL)
- About SSL Inspection
- Supported Cipher Suites in SSL Inspection
- Safeguarding SSL Keys and Data Collected during SSL Inspection
- Adding Custom Certificate to an Application-Specific Trust Store
- About SSL Inspection Policy
- Configuring SSL Inspection Policy
- About Intermediate CA Certificates
- Choosing the CA Certificate for SSL Inspection
- Signing a CSR Using the Active Directory Certificate Services
- Configuring Software Protection Intermediate CA Certificate
- Configuring Cloud HSM Protection Intermediate CA Certificate
- Deployment Scenarios for SSL Inspection
- Certificate Pinning and SSL Inspection
- Best Practices for Testing and Rolling Out SSL Inspection
- Zscaler Client Connector
- Getting Started
- Reference Architecture
- Administration
- Zscaler Client Connector Notifications
- API Key Management
- Zscaler Client Connector Store Settings
- Zscaler Client Connector Support Settings
- App Supportability
- About App Supportability
- Configuring User Access to Logging Controls for Zscaler Client Connector
- Configuring User Access to Support Options for Zscaler Client Connector
- Configuring User Access to the Restart and Repair Options for Zscaler Client Connector
- Configuring Automatic Username Population for IdP Authentication
- Configuring Automatic ZPA Reauthentication
- Registering Devices with ZPA IdP Username
- Network Performance
- App Fail Open
- User Privacy
- About User Privacy
- Configuring Zscaler Client Connector to Collect Device Owner Information
- Configuring Zscaler Client Connector to Collect Hostnames
- Enabling Packet Capture for Zscaler Client Connector
- Configuring Automatic Crash Reporting for Zscaler Client Connector
- Configuring Zscaler Client Connector to Collect ZDX Location Information
- Allow Users to Override Z-Tunnel 2.0 or ZPA Protocol Settings
- Allowing Non-Administrator Users Access to Zscaler Client Connector Log Files
- Restricting Remote Packet Capture
- Endpoint Integration
- Advanced Configuration
- Zscaler Client Connector Profile Management
- About Zscaler Client Connector App Profiles
- Configuring Zscaler Client Connector App Profiles
- Searching for a Zscaler Client Connector Profile
- Zscaler Client Connector Profile Rule Example
- Viewing the Policy Token for a Zscaler Client Connector Profile
- Anti-Tampering for Zscaler Client Connector
- Configuring a Default Global Log Mode
- Configuring a Cellular Quota with Zscaler Client Connector for Android
- Syncing Directory Groups between the ZIA Admin Portal and Zscaler Client Connector Portal
- Best Practices for Adding Bypasses for Z-Tunnel 2.0
- About Application Bypass
- Adding IP-Based Applications to Bypass Traffic
- Adding Process-Based Applications to Bypass Traffic
- Zscaler Endpoint Data Loss Prevention (DLP) Integration with Zscaler Client Connector
- About Business Continuity
- Device Posture Profiles
- Forwarding Traffic Management
- About Forwarding Profiles
- Configuring Forwarding Profiles for Zscaler Client Connector
- Using the Windows Filter Driver for Zscaler Client Connector
- Searching for a Forwarding Profile
- About Trusted Networks
- Configuring Trusted Networks for Zscaler Client Connector
- Searching for a Trusted Network
- About Z-Tunnel 1.0 & Z-Tunnel 2.0
- Configuring Dedicated Proxy Ports
- Managing Devices
- Platform and Authentication Management
- About Platform Settings
- Enabling Browser-Based Authentication
- Using WebView2 Authentication
- Enabling Resizing of the Zscaler Client Connector Authentication Window
- About Zscaler Client Connector IdP
- Using Zscaler Client Connector Portal as an Identity Provider
- Creating a Device Token
- Customizing the Zscaler Client Connector User Agent
- Configuring Passwords for Access in Unattended Mode
- Zscaler Client Connector and Imprivata Integration
- ZPA Partner Login
- Zscaler Service Entitlement
- About Zscaler Service Entitlement
- Enabling ZPA for a Group of Users
- Configuring ZPA Machine Tunnel for All
- Enabling ZDX for All Users
- Enabling ZDX for a Group of Users
- Enabling Deception for a Group of Users
- About Device Groups
- Creating Device Groups
- Searching for Device Groups
- Enabling ZPA for Device Groups
- Enabling Zscaler Deception for Device Groups
- Enabling ZDX for Device Groups
- Enabling ZIA for Device Groups
- Downloading & Deployment
- Understanding Zscaler Client Connector App Downloads
- Configuring Zscaler Client Connector for Microsoft 365 Cloud PCs
- Customizing Zscaler Client Connector with Install Options for MSI
- Customizing Zscaler Client Connector with Install Options for EXE
- Customizing Zscaler Client Connector with Install Options for macOS
- Customizing Zscaler Client Connector with Install Options for Linux
- Customizing Zscaler Client Connector with Install Options for Android
- Customizing Zscaler Client Connector with Install Options for iOS
- Dual Tunnel Feature Configuration with Jamf Pro for iOS
- Dual Tunnel Feature Configuration with Microsoft Intune for iOS
- Blocking LAN Access
- Best Practices for Zscaler Client Connector Deployment
- Best Practices for Updating Latest Versions of Zscaler Client Connector Application
- Uninstalling Zscaler Client Connector
- Reverting Zscaler Client Connector to the Previous Version
- Upgrading Zscaler Client Connector
- Monitoring Usage
- Understanding the Zscaler Client Connector Dashboard
- About Enrolled Devices
- Viewing Device Fingerprint for an Enrolled Device
- Device States for Enrolled Devices
- Accessing One-Time Passwords for Enrolled Devices
- About Machine Tunnels
- About Zscaler Client Connector Integration with Deception
- About Partner Devices
- Viewing Device Fingerprint Information for a Partner Device
- Interacting with Zscaler Client Connector Remotely
- Interoperability
- Implementing Zscaler Client Connector in No-Default Route Environments
- Domain Validation in Zscaler Client Connector for ZPA Applications
- Best Practices for Zscaler Client Connector and VPN Client Interoperability
- Zscaler Client Connector and Charles Proxy Interoperability
- Zscaler Client Connector Processes to Allowlist
- Allowing Traffic to the ID Federation URL by Bypassing Zscaler Client Connector
- Enrolling Zscaler Client Connector Users When Using a Proxy
- Using Fiddler with Zscaler Client Connector
- Best Practices for Using PAC Files with Zscaler Client Connector
- Zscaler Client Connector API
- API Developer & Reference Guide
- Reference Guide
- Troubleshooting
- AppArmor Causes Auto-Upgrade to Zscaler Client Connector version 3.7.1 for Linux to Fail
- Zscaler Client Connector Errors
- Zscaler Client Connector: Windows Registry Keys
- Zscaler Client Connector: Connection Status Errors
- Zscaler Client Connector: ZPA Authentication Errors
- Captive Portal Sign-In Fails for Chromebook Users
- Zscaler Client Connector Displays Blank Page
- Firewall Posture Check Failure on macOS Sequoia
- Microsoft Outlook and Microsoft Teams Not Accessible
- Login Failure in Zscaler Client Connector for Android on ChromeOS version 1.12
- Browser-Based Authentication Fails When Using Certain Browsers to Launch Zscaler Client Connector for Linux and Windows
- DNS Request Failure in Zscaler Client Connector version 4.1.0.89
- DNS Resolution Failure in Zscaler Client Connector for Android on ChromeOS version 1.12
- Upgrading to Zscaler Client Connector 3.7 for Windows
- Missing Zscaler Client Connector GNOME Tray icon for Linux
- Upgrading to Windows 10, Version 2004
- Supporting M1 Processors
- Upgrading to macOS Big Sur
- Upgrading to macOS Catalina
- Upgrading to Android 10
- Using Zscaler Client Connector with Cisco AnyConnect on macOS Catalina
- Resolving Update Issues to Zscaler Client Connector 1.4.3
- Login Failures with Zscaler Client Connector Using Active Directory
- Downgrading Zscaler Client Connector to an Earlier Version
- Resolving Zscaler Client Connector Linux 1.2 DNS Configuration Issues for VPNs
- Resolving Auto-Update Issues for Zscaler Client Connector Linux 1.2
- Upgrading to Zscaler Client Connector version 1.9 for Android
- End User Guide
- Using Zscaler Client Connector
- Locating Where Zscaler Client Connector is Installed on Your Device
- Enrolling in the Zscaler Service on Zscaler Client Connector
- Viewing Information About Zscaler Client Connector
- Viewing Information About Private Access on Zscaler Client Connector
- Viewing Information About Internet Security on Zscaler Client Connector
- Viewing Information About Digital Experience on Zscaler Client Connector
- Viewing Information About Zscaler Endpoint DLP on Zscaler Client Connector
- Viewing Notifications on Zscaler Client Connector
- Zscaler Client Connector: Pop-Up Notifications
- Self Service Notifications in Zscaler Client Connector
- Reporting an Issue with Zscaler Client Connector
- Using Zscaler Diagnostics
- Troubleshooting Zscaler Client Connector
- Adding a Partner Tenant to Zscaler Client Connector
- Deprovisioning Your Device from Zscaler Client Connector
- Release Notes
- Zscaler Client Connector Portal Release Notes
- Zscaler Client Connector Release Notes (per OS)
- Zscaler Client Connector - ZDX Module Release Notes (per OS)
- App Connector Management
- App Connectors
- App Connector Groups
- App Connector Provisioning Keys
- App Connector Deployment Guides for Supported Platforms
- ZPA App Connector Software by Platform
- App Connector Deployment Prerequisites
- App Connector Deployment Guide for Amazon Web Services
- App Connector Deployment Guide for Docker
- App Connector Deployment Guide for Google Cloud Platform
- App Connector Deployment Guide for Kubernetes
- App Connector Deployment Guide for Linux
- App Connector Deployment Guide for Microsoft Azure
- App Connector Deployment Guide for Nutanix AHV
- App Connector Deployment Guide for OpenShift
- App Connector Deployment Guide for VMware Platforms
- Red Hat Enterprise Linux 9 Migration for App Connectors
- Disabling Password Expiration for STIG-Hardened App Connector Images
- Networking Deployed App Connectors
- Configuring a Split DNS Zone for App Connectors
- CentOS 7 Configuration for Long-Term Zscaler Support
- App Connector Managing & Troubleshooting
- App Connector Software Updates
- Private Service Edge Management
- Private Service Edge
- Private Service Edge Groups
- Private Service Edge Provisioning Keys
- Private Service Edge Deployment Guides for Supported Platforms
- ZPA Private Service Edge Software by Platform
- ZPA Private Service Edge Deployment Prerequisites
- Private Service Edge Deployment Guide for Amazon Web Services
- Private Service Edge Deployment Guide for Docker
- Private Service Edge Deployment Guide for Google Cloud Platform
- Private Service Edge Deployment Guide for Linux
- Private Service Edge Deployment Guide for Microsoft Azure
- Private Service Edge Deployment Guide for VMware Platforms
- Red Hat Enterprise Linux 9 Migration for Private Service Edges
- Disabling Password Expiration for STIG-Hardened ZPA Private Service Edge Images
- Networking Deployed ZPA Private Service Edges
- Private Service Edge Managing & Troubleshooting
- Private Service Edge Software Updates
- Branch Connector Management
- Cloud Connector Management
- Certificate Management
- Enrollment Certificates
- Certificates
- AppProtection for Private Application Traffic (formerly Inspection)
- About Active Directory Controls
- About API Protection Controls
- About AppProtection Controls
- About ThreatLabZ Controls
- WebSocket Controls
- Custom Controls
- AppProtection for Private Application Traffic Profiles (formerly Inspection)
- Browser Protection Profiles
- Cloud Browser Isolation
- Getting Started
- Policy Management
- Profiles
- ZIA Profiles
- ZPA Profiles
- Profile Certificates
- About Root Certificates for Isolation in ZIA
- Adding Root Certificates for Isolation in ZIA
- Editing a Root Certificate for Isolation in ZIA
- Deleting a Root Certificate for Isolation in ZIA
- About Root Certificates for Isolation in ZPA
- Adding Root Certificates for Isolation in ZPA
- Editing a Root Certificate for Isolation in ZPA
- Deleting a Root Certificate for Isolation in ZPA
- Profile Notifications
- Adding a Banner Theme for the Isolation End User Notification in ZIA
- Editing a Banner Theme for the Isolation End User Notification in ZIA
- Deleting a Banner Theme for the Isolation End User Notification in ZIA
- Adding a Banner Theme for the Isolation End User Notification in ZPA
- Editing a Banner Theme for the Isolation End User Notification in ZPA
- Deleting a Banner Theme for the Isolation End User Notification in ZPA
- End User Isolation Experience
- Using Persistent State for Isolation
- Accessing Multiple Sessions In Isolation
- Accessing Network Diagnostics in Isolation
- User Experience Modes in Isolation
- Read-Only Mode In Isolation
- Understanding Turbo Mode for Isolation
- Using Debug Mode for Isolation
- Using the Isolation Bar in Native Browser Experience
- Using the Right-Click Menu in Isolation
- Using Search in Isolation
- Understanding Language Translate for Isolation
- Transferring and Viewing Files in Isolation
- Local Browser Rendering for Isolation
- Bookmarking Web Pages in Isolation
- Mobile User Experience in Isolation
- API Key Management
- ZPA API
- API Developer & Reference Guide
- Getting Started
- Configuring the Postman REST API Client
- Understanding Rate Limiting
- API Response Codes and Error Messages
- Reference Guide
- Application Controller
- Segment Group Controller
- AppProtection Control Controller
- AppProtection Profile Controller
- App Connector Controller
- App Connector Group Controller
- Certificate Controller
- Customer Controller
- Customer Version Profile Controller
- Cloud Connector Group Controller
- Emergency Access Controller
- Enrollment Certificate Controller
- IdP Controller
- Isolation Profile Controller
- Log Streaming Service (LSS) Configuration Controller
- Machine Group Controller
- Microtenant Controller
- Policy Set Controller
- Posture Profile Controller
- Private Service Edge Controller
- Private Service Edge Group Controller
- Privileged Approval Controller
- Privileged Console Controller
- Privileged Credential Controller
- Privileged Portal Controller
- Provisioning Key Controller
- SAML Attribute Controller
- SCIM Attribute Header Controller
- SCIM Group Controller
- Server Controller
- Server Group Controller
- Trusted Network Controller
- Zscaler Path Cloud Controller
- Working with APIs
- Obtaining Alternative Cloud Domain Details Using API
- Configuring Application Segments Using API
- Configuring Segment Groups Using API
- Managing App Connectors Using API
- Configuring Auto Delete for Disconnected App Connectors Using API
- Configuring App Connector Groups Using API
- Configuring Browser Access Application Segments Using API
- Configuring Certificates Using API
- Obtaining Cloud Connector Group Details Using API
- Obtaining Customer Details Using API
- Configuring Emergency Access Users Using API
- Obtaining Enrollment Certificate Details Using API
- Obtaining IdP Configuration Details Using API
- Configuring AppProtection Controls Using API
- Configuring AppProtection Profiles Using API
- Obtaining Isolation Profile Details Using API
- Configuring Log Streaming Service Configurations Using API
- Configuring Access Policies Using API
- Configuring AppProtection Policies Using API
- Configuring Client Forwarding Policies Using API
- Configuring Isolation Policies Using API
- Configuring Privileged Policies Using API
- Configuring Redirection Policies Using API
- Configuring Timeout Policies Using API
- Obtaining Machine Group Details Using API
- Configuring Microtenants Using API
- Obtaining Posture Profile Details Using API
- Configuring Privileged Approvals Using API
- Configuring Privileged Credentials Using API
- Configuring Privileged Consoles Using API
- Configuring Privileged Portals Using API
- Configuring Provisioning Keys Using API
- Obtaining SAML Attribute Details Using API
- Obtaining SCIM Attribute Details Using API
- Obtaining SCIM Group Details Using API
- Configuring Servers Using API
- Configuring Server Groups Using API
- Managing ZPA Private Service Edges Using API
- Configuring ZPA Private Service Edge Groups Using API
- Obtaining Trusted Network Details Using API
- Obtaining Version Profile Details Using API
- Log Streaming Service
- About the Log Streaming Service
- Configuring a Log Receiver
- About User Activity Log Fields
- About User Status Log Fields
- About App Connector Metrics Log Fields
- About App Connector Status Log Fields
- About Private Service Edge Metrics Log Fields
- About Private Service Edge Status Log Fields
- About Audit Log Fields
- About Browser Access Log Fields
- About AppProtection Log Fields
- Understanding the Log Stream Content Format
- SIEM Integration for LSS
- User Portal
- Privileged Remote Access Management
- Understanding Privileged Remote Access
- Step-by-Step Configuration Guide for Privileged Remote Access
- Privileged Approvals
- Privileged Consoles
- Privileged Credentials
- Privileged Portals
- Requesting Approvals in the PRA Portal
- About My Approvals
- Uploading and Transferring Files for the PRA File Transfer System
- Reviewing Approvals in the PRA Portal
- About the Privileged Remote Access (PRA) File Transfer System
- About Privileged Portals
- Configuring Privileged Portals
- Editing Privileged Portals
- Accessing a Privileged Remote Access Portal
- Microsegmentation
- Getting Started
- Dashboard
- Analytics
- Resource Management
- Agent Management
- Agents
- Agent Groups
- Agent Provisioning Keys
- Release Notes
- ZPA Service Release Notes
- ZPA App Connector Release Notes
- ZPA Private Service Edge Release Notes
- ZPA Private Cloud Controller Release Notes