What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?
What ports and protocols are forwarded to the Zero Trust Exchange when Zscaler Client Connector is using Tunnel 2.0?
What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?
The security exceptions allow list for Advanced Threat Protection apply to which of the following Policies?