All Categories Zscaler Client Connector Zscaler Client Connector Processes to Allowlist

Zscaler Client Connector Processes to Allowlist

To add a Windows firewall port exception:

  1. On the client operating system, go to Start > Run and type firewall.cpl. The Windows Firewall window opens.

  2. Click on the “Advanced Settings” link on the left pane. The Windows Firewall with Advanced security window opens.

  3. Click on the “Inbound Rules” option.

  4. On the  left pane, click on “New rule”.

  5. Under “Rule Type” select the option “Port” and click next.

  6. Select “TCP”and “specific local ports” options.

  7. Key in the port number, the default port is TCP port 135.

  8. Click Next.

  9. Select the option “Allow the connection”.

  10. Click Next, do not change any option here and click Next again.

  11. Specify a name for this rule.

  12. Click Finish.

To add a program exception:

  1. On the client operating system, go to Start > Run and type firewall.cpl.

  2. Click on the “Advanced Settings” link on the left pane.
    Windows Firewall with Advanced security window opens up.

  3. Click on the “Inbound Rules” option.

  4. On the  left pane, click on “New rule”.

  5. Under “Rule Type” select the option “Program” and click next.

  6. Select the option “This Program path”.

  7. Browse to the Veritas System Recovery service location [Default location for System Recovery: C:\Program Files\Veritas\Veritas System Recovery\Agent\Vprosvc.exe” location.

  8. Select the option “Allow the connection”.

  9. Click Next, do not change any option here and click Next again.

  10. Specify a name for this rule.

  11. Click  Finish.
     

Bypasses for Firewall

If you have a GPO-managed or AV-managed host firewall, you can configure firewall rules on your endpoint protection product for ZSATunnel.exe processes for all ports, protocols, network interfaces, and network addresses (e.g., 0.0.0.0/0).

Zscaler Client Connector also uses carrier-grade NAT range 100.64.0.0/16 as part of internal health checking and for the ZPA service.

You can bypass the processes listed under the following platforms in your firewall rules:

  • ZSATunnel.exe: Inbound

  • ZSATunnel.exe: Outbound

  • ZSATray.exe: Outbound

  • ZSATrayManager.exe: Outbound

  • ZSAUpdater: Outbound

  • ZSAService.exe: Outbound

  • Zscalerappupdater.exe: Outbound