

Zscaler service edge status: stay informed with real-time updates, common troubleshooting steps, and practical tips to keep your secure access flowing smoothly. In this guide, you’ll find a clear, human-friendly breakdown of how to interpret status indicators, what to do during outages, and how to monitor the health of your Zscaler service edge deployments. Below is a quick starter overview, followed by deeper dives, checklists, and a FAQ section to cover all the bases.
Introduction: Quick Facts About Zscaler Service Edge Status
- Current status indicators help you quickly assess whether the service is healthy, degraded, or down.
- Outages can affect user authentication, policy enforcement, secure web gateway, and cloud firewall functions.
- Proactive monitoring and alerting save you time by catching issues before users complain.
- Typical recovery steps involve checking the Zscaler Admin Portal, service dashboards, and incident response playbooks.
Quick start guide
- Check the official status page for real-time updates.
- Confirm your regional service edge is online and reachable.
- Verify if the issue is global or region-specific by looking for patterns across locations.
- Review recent changes or deployments that could have impacted the edge.
Useful URLs and Resources un clickable text
- Zscaler Status Page – https://status.zscaler.com
- Zscaler Admin Portal – https://admin.zscaler.net
- Zscaler Help Center – https://help.zscaler.com
- Zscaler Community Forums – https://community.zscaler.com
- IEEE Cloud Computing Trends – https://ieeexplore.ieee.org/document/xxxxxxx
- Gartner 2024 Secure Access Trends – https://www.gartner.com/document/xxxxxxx
- Company Internal Incident Playbooks – internal docs
- ITIL Incident Management Guide – https://www.axelos.com/best-practice-solutions/itil/itil-4-guidance
Table of Contents
- What is Zscaler Service Edge?
- How Zscaler Service Edge Status is Monitored
- Common Status Indicators and What They Mean
- Typical Outage Scenarios and How to Respond
- Step-by-Step Troubleshooting for Edge Issues
- Proactive Monitoring and Best Practices
- Security, Compliance, and Data Residency Considerations
- Performance Metrics and SLAs
- Real-World Use Cases
- Myths and Misconceptions About Zscaler Service Edge
What is Zscaler Service Edge?
- Zscaler Service Edge refers to the distributed set of cloud-based gateways that enforce security policies for users regardless of location.
- It handles secure web gateway, cloud firewall, CASB, ZIA/ZPA functions, and traffic inspection.
- The edge is designed to scale with user demand and provide low latency access to apps both on-prem and in the cloud.
How Zscaler Service Edge Status is Monitored
- Global health dashboards track regional and per-edge health.
- Monitoring usually covers latency, packet loss, error rates, and authentication success.
- Synthetic tests, real user traffic telemetry, and endpoint health checks inform status.
- Incident response tooling helps teams triage, communicate, and recover quickly.
Common Status Indicators and What They Mean
- Operational/Green: All systems are healthy; traffic flows normally.
- Degraded/Yellow: Some services or regions show higher latency or intermittent failures; user experience may vary.
- Partial Outage/Red: A subset of edges or services is down; related apps or users are impacted.
- Major Outage/Black: Widespread failure across the service edge; broad impact on authentication, policy enforcement, or traffic inspection.
- Maintenance/Blue: Planned maintenance or updates; brief service interruption expected.
Typical Outage Scenarios and How to Respond
- Regional outage: Confirm if only a single region is affected; check service dashboards and incident notes.
- Authentication failure: Verify identity provider integration, SAML/OIDC configurations, and clock skew between services.
- Policy enforcement disruption: Check policy updates, rule prioritization, and firewall signatures.
- Traffic inspection delays: Inspect TLS inspections, certificate status, and cipher suite support.
- Slow user experience: Measure network latency, DNS resolution, and edge load metrics.
Step-by-Step Troubleshooting for Edge Issues
- Step 1: Validate the status page and incident alerts for any announced outages.
- Step 2: Check regional health in the admin console and dashboards.
- Step 3: Review recent changes policy updates, client deployments, certificate rotations.
- Step 4: Confirm endpoint health user devices, VPN or browser agents, agent versions.
- Step 5: Test traffic paths with diagnostics tools Traceroute, ping, or Zscaler diagnostic commands.
- Step 6: Validate DNS resolution and CDN edge reachability.
- Step 7: Reproduce the issue with a controlled test account or a small user group.
- Step 8: If needed, engage Zscaler support with precise incident details and timestamps.
- Step 9: Communicate clearly with stakeholders and affected users about status and ETA.
- Step 10: After remediation, verify full service restoration and monitor for recurrence.
Proactive Monitoring and Best Practices
- Establish a baseline: Know your normal latency, error rates, and throughput by region.
- Implement alerting: Create thresholds for latency, packet loss, and login failures; set on-call rotations.
- Use synthetic monitoring: Regularly test critical paths even when users aren’t active.
- Regularly review policy changes: Maintain a changelog and test in a staging environment.
- Maintain clock synchronization: Ensure NTP/IEEE time accuracy across services to prevent authentication issues.
- Inventory edge locations: Know which service edges serve your users and monitor hot spots.
- Security hygiene: Verify certificate validity, TLS versions, and handshake times.
- Incident playbooks: Keep documented procedures with clear escalation paths and runbooks.
- Training and drills: Run quarterly incident response drills with IT and security teams.
Security, Compliance, and Data Residency Considerations
- Data residency: Ensure data stays within approved regions if required by policy or regulation.
- Access controls: Enforce strict IAM roles and least privilege in the admin portal.
- Audit logs: Enable comprehensive logging for compliance and forensics.
- Encryption and key management: Use strong encryption for data at rest and in transit.
- Third-party integrations: Review integrations for risk and ensure they don’t override critical policies.
Performance Metrics and SLAs
- Global latency targets for Zscaler service edge should be within a few milliseconds to tens of milliseconds depending on region.
- Availability typically targets 99.9% or higher for core services, with maintenance windows excluded.
- MTTR Mean Time to Restore should be measured by incident severity and regional impact.
- User impact: Track percentage of users experiencing degraded service during incidents.
- Security posture: Monitor policy enforcement accuracy and incident detection rates.
Real-World Use Cases
- Remote work enablement: Keeping employees connected securely with consistent policy enforcement.
- SaaS access: Fast, secure access to cloud apps with minimal user friction.
- Branch offices: Consistent security across multiple locations with centralized management.
- Education or large campus networks: Scalable edge deployments that handle bursts of traffic during peak hours.
- Compliance-heavy industries: Strict policy enforcement and detailed auditing for regulated data.
Myths and Misconceptions About Zscaler Service Edge
- Myth: The edge is always perfect and never fails.
Reality: Like any complex system, issues can occur; proactive monitoring reduces impact. - Myth: Edge outages only affect IT teams, not end users.
Reality: End users may experience login problems, blocked content, or slow access. - Myth: Rebooting edges solves everything.
Reality: Root causes may require policy adjustments, certificate updates, or provider-side fixes. - Myth: All regions are equally impacted during an outage.
Reality: Some regions may be unaffected; others can be affected based on data center health. - Myth: You don’t need a playbook for edge incidents.
Reality: A well-practiced playbook dramatically reduces MTTR and confusion.
FAQ Section
- What are Zscaler service edge status indicators?
Status indicators show whether services are healthy, degraded, or down across regions and edges. - How can I check the Zscaler service edge status?
Use the Zscaler Status Page, Admin Portal dashboards, and incident communications from the Service Desk. - What should I do during a regional outage?
Confirm scope, switch to backup paths if available, follow incident playbooks, and communicate with users. - How do I distinguish between a local issue and a global outage?
Compare regional health, check for shared symptoms across locations, and review service announcements. - What tools help monitor Zscaler edge health?
Admin Portal dashboards, synthetic monitoring tools, and network diagnostic commands ping, traceroute. - Are there common causes of edge degradation?
Policy updates, certificate problems, DNS issues, or provider-side incidents. - How can I reduce MTTR during an edge incident?
Maintain clear escalation paths, have tested runbooks, and perform targeted reboots or configurations when advised. - What role do certificates play in edge health?
Expired or misconfigured certificates can block TLS inspection and user access. - Can Zscaler service edge outages affect VPN users?
Yes, depending on how your organization routes traffic and whether VPN is integrated with Zscaler. - How often should I review edge health and incidents?
Regularly. Quarterly reviews plus after-action reports from any incident help improve resilience.
Additional Resources and Reading
- Zscaler official documentation: help.zscaler.com
- Zscaler Knowledge Base: knowledge.zscaler.com
- Community threads: community.zscaler.com
- Industry best practices for cloud-delivered security: nist.gov or itil.org
- General best practices for incident management: itilfoundation.org
Note: This post is designed to be practical for IT admins, network engineers, security professionals, and decision-makers. If you need a version tailored to your org’s size, latency targets, or specific edge deployments e.g., data center vs. regional cloud, tell me your setup and I’ll customize the guide further.
Zscaler service edge status: real-time uptime insights, outage handling, monitoring, and best practices for enterprise VPN security
Zscaler service edge status is up and running. This guide gives you a practical, no-nonsense rundown of what the service edge status means for your organization, how to check it in real time, what to do during outages, and how to keep your VPN and security posture solid when things shift. If you’re managing remote workers or a distributed team, you’ll find actionable steps, quick-check lists, and clear explanations to keep everyone productive and protected. And if you’re looking for extra privacy while you work, check out NordVPN’s current deal here: 
Introduction: what you’ll learn in this guide
- A straightforward overview of Zscaler service edge status and why it matters for your network
- How to check status in real time and what the indicators mean
- Common outage scenarios, typical causes, and practical quick fixes
- How Zscaler integrates with VPNs, remote access, and client software
- Performance metrics, reliability expectations, and how to interpret them
- Proactive monitoring, alerting strategies, and best practices to minimize disruption
- Real-world tips for IT teams to communicate status and keep users informed
- A practical troubleshooting flow you can apply without headaches
Useful URLs and Resources text only, not clickable
Zscaler Status Page – status.zscaler.com
Zscaler Admin Portal – admin.zscaler.net
Zscaler Client Connector documentation – help.zscaler.com
Zscaler Support – support.zscaler.com
NordVPN official site – nordvpn.com
IT health monitoring best practices – ithelpdesk.example.org
VPN reliability statistics – vpn-reliability.stats
SIEM integration guides – siem-guides.example.org
Network performance metrics definitions – netperf.org
Zero trust security framework overview – zerotrust.org
Body
What is Zscaler service edge status and why it matters
Zscaler’s service edge is the global network of data centers and edge nodes that deliver security, access, and policy enforcement as users connect to the cloud and SaaS apps. When we talk about “Zscaler service edge status,” we’re looking at the health of those edge services: are they reachable, are security policies applying correctly, is traffic being routed as intended, and are authentication and access controls functioning without hiccups?
For most enterprises, the status impacts user experience directly. If a regional edge goes offline or experiences latency spikes, you’ll see login delays, web filtering gaps, or broken application access. In short, the status tells you whether the backbone behind your VPN and identity-based access is healthy, and it helps you plan mitigations before users notice problems.
From a security and governance angle, having a clear picture of service edge health helps you confirm that policy enforcement continues to operate as designed. When status is green, you can trust the edge to enforce SSL inspection, URL filtering, data loss prevention DLP, and access controls consistently across locations.
Real-world takeaway: keep a quick pulse on the status page, subscribe to alerts, and integrate edge health checks into your incident response playbooks so you can respond quickly if the edge’s health deteriorates.
How to check real-time status and what to look for
Checking Zscaler status is straightforward, but a few best practices help you interpret what you see and act fast: What is a vpn browser extension 2026
- Start with the official status page: status.zscaler.com. It’s the single source of truth for incidents, maintenance windows, and service health across regions.
- Look for global vs. regional indicators: a global outage will show as a platform-wide incident, while regional issues may affect only certain data centers or geographies.
- Check incident severity levels: Sev 1 critical, Sev 2 high impact, Sev 3 moderate, Sev 4 low. The higher the severity, the faster you’ll want to escalate.
- Review affected services: Zscaler often segments status by platform components ZIA, ZPA, ZSCaler Client Connector, DNS, and authentication. If only one component is impacted, you can tailor your workaround accordingly.
- Subscribe to alerts: enable status updates via the page or via the preferred notification method so you’re immediately alerted when new information is published.
Practical steps you can take now:
- Open status.zscaler.com and scan the current incidents and maintenance windows.
- Note the region and service layer affected edge group, ZIA, ZPA, etc..
- If you’re seeing degraded performance, check the regional incident details and compare with your own geographically proximate users.
- Check for maintenance windows that align with your maintenance calendar. sometimes planned work is the root cause.
- If you need more detail, jump into the Zscaler Admin Portal to pull correlated events and configuration states for your tenants.
Decoding status indicators: what green, yellow, and red mean
- Green Operational: All edge nodes are healthy, and security policy enforcement is stable. Traffic routes normally, and remote workers view standard latency.
- Yellow Degradation/Partial Outage: Some regions or services show degraded performance or intermittent failures. There may be elevated latency, sporadic access issues, or partial policy enforcement gaps. Communicate with users about potential delays and prepare escalation paths.
- Red Outage/Service Disruption: Major incident affecting multiple regions or critical services. Expect widespread access problems and visible impact on logging, policy enforcement, and authentication. This is when your incident response playbooks kick in.
Maintenance windows are typically planned and announced in advance. During those windows, you might see temporary service degradation, but the core platform remains available. The key is to align your internal teams so you’re not blindsided by a scheduled outage.
Common outage scenarios and practical remedies
Outages can manifest in several ways. Here are common scenarios and pragmatic steps to mitigate them:
- Regional edge outage: If only one geo region is affected, steer remote users to a different region’s edge if possible, or instruct them to use local fallback connectivity e.g., direct VPN to avoid edge bottlenecks temporarily. Keep users informed about the region in question.
- DNS resolution issues: Sometimes edge outages appear as DNS failures. Verify internal DNS settings, clear caches, and test with alternative resolvers. If you use split-hunnel routing, confirm DNS fallback behavior remains correct during incidents.
- Client Connector issues: If the Zscaler Client Connector is failing to establish a session, verify that the app is up to date, check for policy updates, and review any recent changes to authentication providers IdP. In some cases, re-provisioning the client or re-signing certificates fixes the issue.
- Authentication provider hiccups: If SAML/OIDC or SSO providers have hiccups, there can be a cascade effect on access. Have a documented fallback method e.g., temporary VPN-based access and ensure multi-factor authentication remains enforceable.
- Policy misconfigurations after changes: Recently pushed policy updates can temporarily block legitimate traffic. Use your admin logs to verify recent policy changes, roll back if needed, and apply changes in smaller batches with clear change control.
Practical tips:
- Maintain a rate-limited communication plan to users during incidents—avoid information overload.
- Ensure your help desk has a quick-reference guide for the most common edge-related user issues e.g., login failures, blocked sites, or slow performance.
- Use synthetic monitoring for edge health in addition to the status page so you can detect service impact earlier than real users might report.
Zscaler service edge status and VPNs: how they fit together
Zscaler integrates with VPNs and remote work in a few key ways, and understanding this integration helps you plan for continuity during edge incidents: Vpn proxy veepn for edge 2026
- Client Connector formerly SSL VPN client: This client helps route traffic to Zscaler’s edge securely. If the edge is reachable, the client maintains policy enforcement and access control. If edge health declines, you’ll see slow connections or login failures that can disrupt remote work.
- ZPA and ZIA components: ZPA Zero Trust Private Access provides secure access to internal apps without a full VPN tunnel, while ZIA Zero Trust Internet Access handles web traffic. Both rely on healthy edge nodes to function correctly. When edge status degrades, you may see access to apps or cloud services delayed or blocked.
- Failover and regional redundancy: Zscaler’s architecture is designed for cross-region failover. In many cases, users can fail over to an alternate edge region without major disruption. This is why regional outages don’t always translate into a complete service outage for every user.
- Client performance and security posture: If you’re using Client Connector with enforced security policies SSL inspection, DLP, URL filtering, an edge outage can temporarily loosen enforcement if traffic can’t be routed to the edge. That’s why communication with end users during incidents is crucial, so they know what to expect and how to proceed.
Quick setup tips for VPN and edge alignment:
- Document which regions your users primarily connect from and ensure they have appropriate edge coverage in those regions.
- Test failover scenarios during non-peak hours so you know how long it takes to re-route traffic to an alternate edge.
- Keep a small, tested fallback path for critical apps e.g., direct VPN tunnel to a trusted internal gateway in case edge health is compromised for an extended period.
Performance and reliability: what to expect and how to measure it
Reliability on the Zscaler edge is typically high, with most organizations experiencing smooth operation under normal conditions. When outages do occur, the impact depends on region, service ZIA, ZPA, DNS, authentication, and whether customers have implemented redundancy and failover strategies. Here are the key points to track:
- Latency and jitter: Edge health directly influences how quickly traffic reaches policies and how fast responses appear to end users. Measure from remote sites and major hubs to get a realistic view of user experience.
- MTTR and MTTD: Mean Time to Detect MTTD and Mean Time to Repair MTTR are industry-standard metrics. In well-managed environments, MTTD should be minutes to detect incidents, and MTTR should be hours for a typical edge disruption—assuming a well-coordinated incident response and accessible backups.
- Availability by region: Some outages are regional. Track uptime per data center or region to identify patterns and plan regional redundancy accordingly.
- User impact metrics: Track login success rates, application access, and browsing performance during incidents. This helps you quantify the real-world effect of an edge issue.
- Access control accuracy: After an incident, verify that security policies are being applied as intended and that there’s no drift in allowed vs. blocked traffic.
Industry context: the zero-trust security space is growing rapidly, and many organizations are expanding edge footprints to improve performance and privacy for distributed workforces. The trend toward more edge coverage means proactive monitoring and quick incident response are more critical than ever. If you’re building a robust monitoring strategy, pair edge health signals with application-layer performance metrics to get a complete picture of user experience.
Security considerations during edge status changes
During edge status changes, you want to avoid inadvertently weakening your security posture or creating blind spots:
- Policy consistency during outages: If the edge falls back to a degraded state, ensure that local policies don’t become overly permissive or too restrictive. Maintain strict control over what traffic is allowed and logged, even in degraded mode.
- Authentication resilience: If IdP services or SSO connections are affected, you’ll need a documented fallback for authentication so users can still access critical apps through alternate methods. Two-factor authentication should remain enforceable wherever possible.
- Data exposure risk: Edge outages can cause delays in SSL inspection and data loss prevention. Plan for gradual degradation rather than sudden exposure. ensure awareness of what protections are still active during degraded states.
- Incident communication: Communicate clearly with users about what’s happening, what’s affected, and what to expect. Clear messaging reduces help desk load and user frustration.
Monitoring and alerting: how to keep an eye on Zscaler service edge health
Effective monitoring combines the official status page with internal telemetry and third-party tools: Vpn add on edge free: a comprehensive guide to free Edge VPN extensions, setup, safety tips, and comparisons 2026
- Official status page alerts: Set up notification channels for Sev 1 and Sev 2 incidents. Keep an eye on regional incidents if you have international offices.
- Admin portal dashboards: Use the Zscaler Admin Portal to correlate edge health with your tenant configuration, policy sets, and user activity. This helps you pinpoint whether an outage is generic or tenant-specific.
- Synthetic monitoring: Implement synthetic checks from multiple locations to test login, policy application, and app access. This gives you a proactive view of user experience during normal and degraded states.
- SIEM and log correlation: Feed edge-related events into your SIEM to identify anomalies, failed authentications, or policy mismatches. Create alerts around spikes in blocked traffic or unusual DNS responses.
- Change management integration: Tie edge health monitoring to your change control process. If you’ve pushed a policy update that might affect edge behavior, you’ll want to detect any correlated performance issues quickly.
Practical monitoring tips:
- Create an edge health dashboard with regional status, service components ZIA, ZPA, DNS, authentication, and user impact metrics.
- Define clear escalation paths for Sev 1 incidents, including who to call and what data to collect tenant ID, region, time, suspected cause.
- Schedule regular drills to test incident response, communications, and recovery steps.
Proactive troubleshooting flow you can apply fast
- Confirm status: Check status.zscaler.com for the latest incident or maintenance notice and identify affected regions and services.
- Reproduce in a controlled way: Have a small number of users or test accounts verify the behavior to avoid wide-scale changes during an incident.
- Check related components: Look at ZIA, ZPA, DNS, authentication, and Client Connector states in the Admin Portal.
- Review recent changes: If you recently updated policies, certificates, IdP configurations, or routing rules, assess whether those changes align with the observed symptoms.
- Apply a targeted workaround: If a regional edge is down, switch to an alternate region or implement a temporary direct path for critical users.
- Restore and validate: After changes, verify that traffic is back on policy-compliant paths, that authentication works, and user experience is restored.
- Communicate: Notify users with a concise status update, provide expected timelines, and share workarounds.
- Document and learn: Capture what happened, what helped, and how you’ll prevent a recurrence.
Deployment considerations and best practices for teams
- Layer multiple protections: Combine Zscaler edge coverage with a strong identity strategy, secure VPN alternatives, and robust endpoint protection. A multi-layer approach reduces the risk of single-point failures.
- Plan for regional redundancy: If your workforce is globally distributed, ensure you have edge coverage in multiple regions and tested failover procedures.
- Practice is better than theory: Regular tabletop exercises and live drills help teams stay sharp and reduce reaction times during real incidents.
- Keep users informed: A well-timed and accurate user communications plan reduces help desk volume and improves user trust during outages.
- Documentation is your friend: Maintain playbooks that cover common edge issues, escalation paths, and rollback steps.
Real-world tips for IT teams: communicating status and keeping users informed
- Be transparent about impact: Tell users what is affected login, app access, DNS, etc. and what isn’t some regions may still function normally.
- Set expectations for recovery: Provide rough timelines when possible, and update them as you learn more.
- Offer practical workarounds: If the edge is degraded, propose temporary routes or direct access to critical services so business can keep moving.
- Maintain a single source of truth: Use your status page, internal dashboards, and help-desk scripts to avoid conflicting information.
- Post-incident reviews: After the incident, share a brief retrospective that outlines root cause, containment steps, and preventive measures.
FAQ: Frequently Asked Questions
What is Zscaler service edge status?
Zscaler service edge status refers to the health and availability of Zscaler’s edge network that delivers ZIA, ZPA, and related services. It indicates whether edge nodes are operational, degraded, or experiencing outages and how that affects user access, security enforcement, and policy application.
How can I check Zscaler service edge status in real time?
Start with status.zscaler.com to see current incidents and maintenance windows. Then cross-check the Zscaler Admin Portal for tenant-specific health and any correlated events. Consider setting up alerts and using synthetic monitoring to verify user experience from multiple locations.
What do green, yellow, and red statuses mean on the Zscaler status page?
Green means operational with no known issues. Yellow indicates degradation or partial outages affecting some regions or services. Red signals a major outage with widespread impact that requires escalation and incident response. Vpn add on microsoft edge 2026
How long do Zscaler edge outages typically last?
Outage durations vary by severity and region. Minor degradations can resolve in minutes, while regional or platform-wide outages may last hours. Proactive monitoring and rapid incident response usually shorten recovery time.
How does Zscaler impact VPN users during an edge outage?
During an edge outage, VPN users may experience login delays, slower access to apps, or gaps in policy enforcement. Workarounds often involve failover to alternate edge regions or temporary direct access paths, while security rules remain essential.
What should I do if I notice degraded performance for remote workers?
- Check status.zscaler.com for any incidents. 2 Verify your region and service components ZIA, ZPA, DNS. 3 Review recent policy changes or IdP configuration. 4 Implement a controlled fallback or alternate edge if available. 5 Communicate with users about expected delays and planned resolution.
Can I set up alerts for Zscaler edge status in my organization?
Yes. Configure alerts via the Zscaler Status Page, Admin Portal, and your preferred monitoring tools SIEM, alerting dashboards. Create Sev 1/Sev 2 alerts for fast escalation and clear ownership.
How do I differentiate between an edge outage and a local network issue?
Cross-check with status.zscaler.com to see if an incident is regional or global. Test from multiple locations and devices. If other sites or users aren’t affected, it’s more likely a local network issue. otherwise, it’s an edge-related incident.
What’s the role of the Zscaler Client Connector during edge health events?
Client Connector helps route traffic to the Zscaler edge and apply security policies. During edge issues, you may see failed sessions or delayed logins. Ensure the client is up to date and be prepared with fallback access methods. Vpn gratis para edge: a practical, up-to-date guide to free VPNs for Microsoft Edge in 2026
How can we improve our incident response around Zscaler edge health?
- Establish a centralized status communication channel
- Create a tenant-specific health dashboard
- Implement synthetic monitoring for proactive detection
- Define clear escalation paths and run regular drills
- Keep change management aligned with edge health awareness
Where can I find the official Zscaler status information and support?
Official status information is on status.zscaler.com, with more detailed, tenant-specific data in the Zscaler Admin Portal. For ongoing support, contact Zscaler Support via support.zscaler.com. You can also refer to help.zscaler.com for product-specific guidance and best practices.