icon-zscaler-deployments-operations.svg
Zscaler Deployments & Operations

IPS Control Deployment and Operations Guide

This guide describes the benefits of using Intrusion Prevention System (IPS) Control and the steps necessary for configuring Zscaler Internet Access (ZIA) to add IPS Control to your security posture.

IPS Control uses signature-based detection to control and protect your traffic from intrusion over all ports and protocols. The Zscaler service uses custom signatures built and updated by Zscaler's security research team and signatures from industry-leading vendors. Using these signatures, the Zscaler service monitors your traffic in real time. When the IPS finds a pattern match in your traffic, it enforces your policies inline.

To learn more, see About IPS Control.

Value of Deploying IPS Control

Using IPS Control provides the following benefits:

  • Increases company security posture.
  • Protects against threats from both web traffic and non-web traffic such as HTTP, HTTPS, FTP, DNS, TCP, UDP, and IP-based ports and protocols.
  • Centralizes granular policy enforcement.

Deployment Phase

The deployment phase includes initially setting up and integrating Zscaler solutions into an existing network infrastructure. During the deployment phase, you configure IPS Control to meet the needs of your infrastructure. The following sections discuss steps to deploy IPS Control.

Prerequisites

One of the following Zscaler subscriptions is required:

  • ZIA Transformation Edition and later.
  • Advanced Firewall subscription.

Deployment Steps

The following steps explain how to deploy IPS Control:

  1. Review Zscaler’s recommended IPS Control policy.
  2. Configure the IPS Control policy for your locations.
  3. Enable Firewall Control for your locations. To learn more, see About Firewall.
  4. Enable IPS Control for your locations.

Considerations

Review the following considerations:

Operations Phase

This section describes common practices used to operate Zscaler solutions when integrated with your environment. You can monitor and tune IPS Control during the operations phase to meet your infrastructure needs.

Common Troubleshooting Items

The following list describes common issues related to IPS Control operation:

  • IPS Control blocks a commonly used website and labels it as phishing/botnet callback/malware/etc.: This might be a false positive detection. Submit a ticket with Zscaler Support so that the Security Research team can investigate and analyze this behavior.
  • I can see in the logs that my SSH tunnel traffic is blocked by IPS Control, and I have configured an IPS Control rule to allow the traffic, but the traffic is still showing as blocked: SSH tunneling is blocked, or allowed, for your entire tenant. It can’t be granularly allowed for specific users or groups.

Deployment and Operations Checklist

Zscaler recommends downloading the IPS Control Deployment and Operations Checklist to help plan and implement IPS Control in ZIA: Download PDF

Additional Information

For more SaaS Security information and troubleshooting instructions, see the Zscaler Support Portal and the Zscaler Zenith Community.

Related Articles
Advanced Sandbox Deployment and Operations GuideAuthentication Deployment and Operations GuideBandwidth Control Deployment and Operations GuideCloud App Control Deployment and Operations GuideIsolation Deployment and Operations GuideDisaster Recovery Deployment and Operations GuideDLP Deployment and Operations GuideDNS Control Deployment and Operations GuideFirewall Deployment and Operations GuideIPS Control Deployment and Operations GuideLocal Breakouts Deployment and Operations GuideSaaS Security Deployment and Operations GuideSIEM and ZIA Integration Deployment and Operations GuideSSL Inspection Deployment and Operations GuideURL Filtering Deployment and Operations GuideThreat Protection Deployment and Operations GuideZIA Policy Leading Practices GuideZIA SSL Inspection Leading Practices Guide