3 BYPASSES that you can deploy on Z-Tunnel 2.0 Following are the best practices for IP-based bypasses: - VPN Gateway Bypasses - Destination Exclusions and......
Analyzing Web Requests The steps taken to analyze the Web Requests captured by HAR file varies depending on the troubleshooting Performance Issue or Page Rendering......
This article will describe the use of conditional access and how traffic are being routed and expected to be coming from. In order to enforce......
Microsoft published guidelines for work-from-anywhere (WFA) users and a strategy to split the most performance-sensitive Microsoft 365 applications, which need optimized connectivity from VPN tunnels.......
Zscaler Support might ask you to provide HTTP headers when troubleshooting certain issues. The HTTP headers identify the specific URL the browser accessed when you......
Zscaler Support may ask you to provide HTTP headers when troubleshooting certain issues. The HTTP headers identify the specific URL the browser accessed when you......
There is no universal tool or method to check if the application does Certificate Pinning. The Certificate Pinning is used by the application to prevent......
In your custom URL category, you can add only URLs or keywords, there is no option to add IP Subnets inside the URL category. But......
To determine which is the nearest Zscaler DCs for the specific IP or machine. Here are some commands that you can use to achieve that:......
This setting inside the app profile must be enabled if client encountered an issue with outlook and intune. Some servers are using loopback addresses, when......
This setting inside the app profile must be enabled if client encountered an issue with outlook and intune. Some servers are using loopback addresses, when......
To enable developers to effectively access GitHub, while still having controls to restrict/control access to upload data, Zscaler proposes that the agency leverage the Zscaler......