Zscaler Internet Access

Zscaler Internet Access

List view
Quick Start
User Guide
Policies & GuardRails
Witness Anywhere: Remote Device Security
Witness Attack
Administrator Guide
 

Zscaler Internet Access Configuration

notion image

Quick Summary

The Zscaler configurations required to integrate WitnessAI are:
  1. Admin Role
  1. Admin Account in ZIA or ZIdentity
  1. Cloud Service API Key
  1. Proxy Setup

Create admin role

Create an Admin Role under Administration Administrator Role Add Administrator Role
  1. Name → WitnessAI-API-Role
  1. Policy & ComponentsURL categories → Custom
      • Custom URL Category Management → Full
      • Override Existing Categories → None
      • Zscaler Defined URL Category Management → None
      • Set all other scope as “None” or “View Only”, then Save
notion image

Create admin account

Create a new admin account under Administration Administrator Management Administrators Add Administrator and attach the above created admin role.
  1. Login ID → svc_witnessai_zia
  1. Role → WitnessAI-API-Role
  1. Password → Set password, then Save
notion image
💡
Note: If SAML authentication is enabled for admin logins, the 'Password-Based Login' option must be enabled to override this setting and allow the use of a password.
notion image

Configure service account for ZIdentity Managed Admins

This step applies to Zscaler tenants that have been migrated to ZIdentity (Zscaler’s centralized identity service). Admin accounts migrated to ZIdentity will no longer be managed through the Admin Portal.

1. Create admin account

Go to ZIdentity Portal DirectoryUsersAdd Users
  1. Login ID → svc_witnessai_zia@company.com
  1. Status → Enabled
notion image
Go to Add Users Security Settings
c. Password Option → Set By Administrator
d. Password → Enter the password
e. Confirm Password → Repeat password
notion image
 

2. Add User Group

Go to ZIdentity Portal DirectoryUser GroupsAdd User Group
f. Name → WitnessAI-API-Group
g. Assign Users → WitnessAI-API-admin
notion image
 

3. Attach the admin role to the group

Go to ZIdentity Portal AdministrationEntitlements Administrative
  1. Select → Zscaler internet Access
    1. notion image
  1. Click → Assign Groups, then select WitnessAI-API-Group and attach role: WitnessAI-API-Role, then Next
    1. notion image
  1. Verify the group and role mapping, then Assign
notion image

Create Cloud Service API Key

  1. Go to Administration → Cloud Service API Security → Cloud Service API Key.
  1. Check if an API key already exists.
      • If no key exists, click Add API Key to generate one.
💡
Note: Only one API key can be created per account.
If a key already exists, the Add API Key button will be greyed out.
 
notion image

Once the above configuration is completed, please handover below details to the WitnessAI account team.
  1. Administrator Login ID
  1. Administrator Password
  1. API Key
  1. Base URL: zsapi.<cloudname>.net/api/v1

Proxy Setup

Install WitnessAI Provided Root Certificate

  1. Click Administration → Root Certificates.
notion image
 
2. Click Add Root Certificate.
notion image
  1. Name: Enter [WitnessRootCA].
  1. Type: Enter [Proxy Chaining].
  1. Content: Click [Choose File] and pick the WitnessAI-provided Root Certificate.
  1. Once uploaded, click Save.
      • Note: WitnessAI can support a customer provided Root Certificate. However, it is recommended that administrators create a unique Root Certificate specific for the WitnessAI platform and provide it to your WitnessAI account team.
notion image
 
3. Select Administration → Proxies & Gateways.
notion image
 
  1. Select Add Proxy.
    1. notion image
       
    2. Update the Proxy Name to [WitnessAI_NetworkConnector].
    3. For Proxy’s Root Certificate, select the Root Certificate created in Step 2.
    4. FQDN → connect.[tenantID].[region].witness.ai
    5. Port → 4128
    6. Enable the Insert-X-Authenticated-User switch.
    7. Enable the Base64 Encoding for X-Authenticated-User value switch.
    8. notion image
 
  1. Go to Proxy Gateways
    1. Click on + Add Gateway for Proxies
    2. Gateway Name: Enter [WitnessConnect].
    3. Fail Close: Click to [Disable].
    4. Primary Proxy: Enter [WitnessAI_NetworkConnector].
notion image
 
Witness AI pushes 2 custom URL categories to the Zscaler portal:
  1. WitnessFwdUrls: For use in the SSL Inspection Policy and Forwarding Control Policy.
  1. WitnessURLList: Intended for use as an NSS feed filter for Shadow Discovery.

SSL Inspection Configuration

1. Navigate to Policy → SSL Inspection and click on Add SSL Inspection Rule.
notion image
 
2. Input the following information
  • Rule Order: Place it above the Generic inspection/bypass rules.
  • Rule Name: [WitnessAI-Inspection Rule].
  • Rule Status: [Enabled].
  • URL Categories: [WitnessFwdUrls].
notion image
 
  • Action: Inspect
  • Enable HTTP/2: Yes
  • Select: Save
notion image
 

Network Connector Integration

1. Select: Policy Forwarding Control.
notion image
 
2. Select Add Forwarding Rule.
  • Rule Order: – Make this as high as possible.
  • Rule Name: Enter [WitnessForwarding].
  • Rule Status: Choose [Enabled].
  • Forwarding Method: Choose [Proxy Chaining]
  • General: [Define which user population will be inspected for AI].
  • Forward to Proxy Gateway: Choose [WitnessAI_NetworkConnector].
notion image
 
  • Destination URL CategoryWitnessFwdUrls.
  • Select: Save.
notion image
 

NSS Integration

1. Select Administration → Nanolog Streaming Service
notion image
 
2. Add NSS Server
  • Name: WitnessAI-NSS
  • Type: Choose [NSS for Web]
  • Status: Enabled
  • Select: Save
notion image
 
3. Download SSL Certificate and provide to Account team
notion image
 
A customer-managed NSS would result in plain text log transmission over the internet, creating security risks. To prevent this, WitnessAI hosts the NSS server on the customer’s behalf and enrolls it into the customer cloud using the exported certificate.
WitnessAI logger is designed to parse Zscaler web logs in CSV format. To enable this, NSS feeds that meet the WitnessURLList criteria should be configured to forward web logs to the logger service at logger.[tenant-id].[region].witness.ai, using TCP port 5514.
 
4. Add NSS Feed
  • Name: WitnessAI-NSS Feed
  • NSS server: Choose [WitnessAI-NSS ]
  • Status: Enabled
  • SIEM Destination Type: FQDN
  • SIEM FQDN: Will be provided by account team
  • SIEM TCP PORT: 5514
  • Log type: Web Log
  • Feed Output Type: CSV
  • Feed Output Format: As below
"%s{time}","%s{login}","%s{proto}","%s{eurl}","%s{action}","%s{appname}","%s{app_status}","%s{appclass}","%d{reqsize}","%d{respsize}","%s{urlclass}","%s{urlsupercat}","%s{urlcat}","%s{malwarecat}","%s{threatname}","%d{riskscore}","%s{threatseverity}","%s{dlpeng}","%s{dlpdict}","%s{location}","%s{dept}","%s{cip}","%s{sip}","%s{reqmethod}","%s{respcode}","%s{ua}","%s{ereferer}","%s{ruletype}","%s{rulelabel}","%s{contenttype}","%s{unscannabletype}","%s{deviceowner}","%s{devicehostname}","%s{keyprotectiontype}"
notion image
 
  • Click To Where tab Web Log Filters URL Categories: Select [WitnessURLList ]
  • Select: Save
notion image