Which Zscaler forwarding mechanism creates a loopback address on the machine to forward the traffic towards Zscaler cloud?
Can URL Filtering make use of Cloud Browser Isolation?
What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?
What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?
Client Connector forwarding profile determines how we want to forward the traffic to the Zscaler Cloud. Assuming we have configured tunnels (GRE or IPSEC) from locations, what is the recommended combination for on-trusted and off-trusted options?
What is the recommended minimum number of App connectors needed to ensure resiliency?
What mechanism identifies the ZIA Service Edge node that the Zscaler Client Connector should connect to?
Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?