Zscaler IBM QRadar Deployment Guide FINAL
Zscaler IBM QRadar Deployment Guide FINAL
DEPLOYMENT GUIDE
Contents
Terms and Acronyms 3
Trademark Notice 4
ZPA Logs 31
User Status Logs 33
App Connector Logs 34
Audit Logs 35
User Activity Logs 36
Appendix A: Requesting Zscaler Support 37
Acronym Definition
CA Central Authority (Zscaler)
CSV Comma-Separated Values
DLP Data Loss Prevention
DNS Domain Name Service
DPD Dead Peer Detection (RFC 3706)
EDR Endpoint Detection and Response
GRE Generic Routing Encapsulation (RFC2890)
ICMP Internet Control Message Protocol
IdP Identity Provider
IKE Internet Key Exchange (RFC2409)
IPS Intrusion Prevention System
IPSec Internet Protocol Security (RFC2411)
MDR Managed Detection and Response
PFS Perfect Forward Secrecy
PSK Pre-Shared Key
RPM Remote Patient Monitoring
SaaS Software as a Service
SIEM Security Information and Event Management
SOAR Security Orchestration, Automation, and Response
SSL Secure Socket Layer (RFC6101)
TLS Transport Layer Security
VDI Virtual Desktop Infrastructure
XDR Extended Detection and Response
XFF X-Forwarded-For (RFC7239)
ZCP Zscaler Cloud Protection (Zscaler)
ZDX Zscaler Digital Experience (Zscaler)
ZIA Zscaler Internet Access (Zscaler)
ZPA Zscaler Private Access (Zscaler)
Trademark Notice
© 2024 Zscaler, Inc. All rights reserved. Zscaler™ and other trademarks listed at zscaler.com/legal/trademarks are either
(i) registered trademarks or service marks or (ii) trademarks or service marks of Zscaler, Inc. in the United States and/or
other countries. Any other trademarks are the properties of their respective owners.
Zscaler Overview
Zscaler (NASDAQ: ZS) enables the world’s leading organizations to securely transform their networks and applications for
a mobile and cloud-first world. Its flagship Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) services create
fast, secure connections between users and applications, regardless of device, location, or network. Zscaler delivers its
services 100% in the cloud and offers the simplicity, enhanced security, and improved user experience that traditional
appliances or hybrid solutions can’t match. Used in more than 185 countries, Zscaler operates a massive, global cloud
security platform that protects thousands of enterprises and government agencies from cyberattacks and data loss. To
learn more, see Zscaler’s website or follow Zscaler on Twitter @zscaler.
IBM Overview
IBM (NYSE: IBM) looks to be a part of every aspect of an enterprise’s IT needs. The company primarily sells software,
IT services, consulting, and hardware. IBM operates in 175 countries and employs approximately 350,000 people. The
company has a robust roster of 80,000 business partners to service 5,200 clients—which includes 95% of all Fortune
500. While IBM is a B2B company, IBM’s outward impact is substantial. For example, IBM manages 90% of all credit card
transactions globally and is responsible for 50% of all wireless connections in the world. To learn more, refer to the IBM
QRadar website.
Audience
This guide is for network administrators, endpoint and IT administrators, and security analysts responsible for deploying,
monitoring, and managing enterprise security systems. For additional product and company resources, see:
• Zscaler Resources
• IBM QRadar Resources
• Appendix A: Requesting Zscaler Support
Software Versions
This document was authored using the latest version of Zscaler software.
If you are using this guide to implement a solution at a government agency, some of the content might be
exclamation-triangle different for your deployment. Efforts are made throughout the guide to note where government agencies might
need different parameters or input. If you have questions, please contact your Zscaler Account team.
ZIA Overview
ZIA is a secure internet and web gateway delivered as a service from the cloud. Think of ZIA as a secure internet on-
ramp—just make Zscaler your next hop to the internet via one of the following methods:
• Setting up a tunnel (GRE or IPSec) to the closest Zscaler data center (for offices).
• Forwarding traffic via our lightweight Zscaler Client Connector or PAC file (for mobile employees).
No matter where users connect—a coffee shop in Milan, a hotel in Hong Kong, or a VDI instance in South Korea—they get
identical protection. ZIA sits between your users and the internet and inspects every transaction inline across multiple
security techniques (even within SSL).
You get full protection from web and internet threats. The Zscaler cloud platform supports Cloud Firewall, IPS,
Sandboxing, DLP, and Browser Isolation, allowing you to start with the services you need now and activate others as your
needs grow.
ZPA Overview
ZPA is a cloud service that provides secure remote access to internal applications running on a cloud or data center using
a Zero Trust framework. With ZPA, applications are never exposed to the internet, making them completely invisible
to unauthorized users. The service enables the applications to connect to users via inside-out connectivity rather than
extending the network to them.
ZPA provides a simple, secure, and effective way to access internal applications. Access is based on policies created by
the IT administrator within the ZPA Admin Portal and hosted within the Zscaler cloud. On each user device, software
called Zscaler Client Connector is installed. Zscaler Client Connector ensures the user’s device posture and extends a
secure microtunnel out to the Zscaler cloud when a user attempts to access an internal application.
Zscaler Resources
The following table contains links to Zscaler resources based on general topic areas.
Name Definition
ZIA Help Portal Help articles for ZIA.
ZPA Help Portal Help articles for ZPA.
Zscaler Tools Troubleshooting, security and analytics, and browser extensions that help
Zscaler determine your security needs.
Zscaler Training and Certification Training designed to help you maximize Zscaler products.
Submit a Zscaler Support Ticket Zscaler Support portal for submitting requests and issues.
The following table contains links to Zscaler resources for government agencies.
Name Definition
ZIA Help Portal Help articles for ZIA.
ZPA Help Portal Help articles for ZPA.
Zscaler Tools Troubleshooting, security and analytics, and browser extensions that help
Zscaler determine your security needs.
Zscaler Training and Certification Training designed to help you maximize Zscaler products.
Submit a Zscaler Support Ticket Zscaler Support portal for submitting requests and issues.
Name Definition
IBM Community Forum IBM community forum web pages.
IBM Support IBM Support portal for submitting requests and issues.
IBM QRadar Documentation Online documentation for IBM QRadar Security Intelligence Platform.
IBM QRadar Developer Guide Online developer's guide for IBM QRadar Application Framework Guide.
Introduction
This guide provides examples for integrating Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) with IBM
QRadar. It’s intended for setting up your production network, or for proof of concept (PoC) topologies and demos, if
evaluating interoperability and integration.
Zscaler’s Nanolog Streaming Service (NSS) (government agencies, see Nanolog Streaming Service (NSS)) uses a virtual
machine (VM) to stream traffic logs from ZIA to QRadar, a SIEM system, enabling real-time alerting, correlation with the
logs of your other devices, and long-term local log archival.
If you subscribe to Cloud NSS, you can enable direct cloud-to-cloud log streaming. Instead of deploying an on-premises
NSS VM, you can configure an HTTPS API feed to stream traffic logs from ZIA into an HTTPS API-based log collector on
your cloud-based QRadar system. To learn more about the geo-availability and qualifications for Cloud NSS, contact
Zscaler Support.
Refer to the following procedures for configuring on-premises or Cloud NSS and QRadar.
To send ZPA Events to IBM QRadar, you must configure the Zscaler Log Streaming Service. IBM supports user status, app
connector status, and audit log types for ZPA devices.
NSS
Clipboard-list To complete the following steps, you must have QRadar version 7.3.3 or later installed. To download and install
the required software, refer to IBM Support Fix Central.
1. In QRadar, install the RPM files. NSS deployment requires two RPM files from QRadar: DSM (Device Support Module)
Common and Zscaler NSS DSM. If you previously enabled automatic updates for your QRadar deployment, you are
not required to manually install the files. To manually install the RPM files:
a. Download the updated RPM files for your version of QRadar from IBM Support Fix Central:
i. (Optional) Under Find Product, configure the filters to narrow your search, then click Continue.
ii. In the search bar, enter zscalernss to find the respective RPM files for download.
2. In QRadar, add Zscaler NSS as a Log Source. If the log source is not automatically discovered, you can manually add
Zscaler NSS as a log source using the QRadar Log Source Management app.
Clipboard-list For QRadar versions 7.3.3 through 7.5.0, you can also add a log source in QRadar by using the Log Sources icon. To
learn more, refer to the procedure in the IBM documentation.
c. In the IBM QRadar Log Source Management window, select Log Sources.
e. Select Single Log Source. The Add a Single Log Source wizard appears.
f. In the Add a Single Log Source wizard, select a Log Source type:
i. In the search bar, enter zscaler Nss.
ii. Select Zscaler Nss from the drop-down menu.
iii. Click Step 2: Select Protocol Type.
g. Select Syslog as the protocol type, then click Step 3: Configure Log Source Parameters.
h. Configure the Log Source parameters, then click Step 4: Configure Protocol Parameters. The following fields
are required (scroll down to see all the parameters):
• Name: Enter a name.
• Groups: Select a group.
• Language: Select a language.
• Target Event Collector: Select a QRadar appliance to collect events from Zscaler.
• Disconnected Log Collector: Select a disconnected log collector if available on your QRadar deployment.
• Credibility: Assign a value from 1 to 10. The default value is 5.
Clipboard-list To learn more about Syslog log source parameters for Zscaler NSS, refer to the IBM documentation.
c. In the Custom Event Properties window, click Add. The Custom Event Property Definition window appears.
d. In the Custom Event Property Definition window, configure the following fields:
• Property Type Selection: Select Extraction Based.
• Property Definition: Select New Property and enter a name for the field (e.g., Referrer URL).
• Property Expression Definition:
• Log Source Type: Select Zscaler Nss from the drop-down menu.
• Regex: Enter referer=([^\t]+)
e. Click Save.
f. Go to the Admin tab and click Deploy Changes.
5. In the ZIA Admin Portal, add an NSS Feed. To learn more, see Adding NSS Feeds (government agencies, see Adding
NSS Feeds) and select the type of feed (e.g., Web Logs) to configure. The following fields require specific inputs:
• SIEM IP Address: Enter the IP address of your QRadar SIEM.
• SIEM TCP Port: Enter 514.
Clipboard-list Typically, Syslog uses UDP and destination port 514, but the NSS only supports TCP. In the event the SIEM system
becomes unavailable, the NSS is able to detect this if it loses the TCP connection. If the connection to the
SIEM goes down, the NSS queues logs in memory until the SIEM becomes available. To learn more, see Syslog
Overview (government agencies, see Syslog Overview).
• Feed Output Format: See the following feed output formats by log type.
• For NSS Feeds for Web Logs (government agencies, see NSS Feeds for Web Logs), replace the pre-
populated text with the following:
%s{mon} %02d{dd} %02d{hh}:%02d{mm}:%02d{ss} zscaler-nss:LEEF:1.0|Zscaler|NS-
S|4.1|%s{reason}|cat=%s{action}\tdevTime=%s{mon} %02d{dd} %d{yy} %02d{h-
h}:%02d{mm}:%02d{ss} %s{tz}\tdevTimeFormat=MMM dd yyyy HH:mm:ssz\tsrc=%s{cip}\
tdst=%s{sip}\tsrcPostNAT=%s{cintip}\trealm=%s{location}\tusrName=%s{login}\ts-
rcBytes=%d{reqsize}\tdstBytes=%d{respsize}\trole=%s{dept}\tpolicy=%s{reason}\
trecordid=%d{recordid}\tbwthrottle=%s{bwthrottle}\tuseragent=%s{ua}\trefer-
er=%s{ereferer}\thostname=%s{ehost}\tappproto=%s{proto}\turlcategory=%s{urlcat}\
turlsupercategory=%s{urlsupercat}\turlclass=%s{urlclass}\tappclass=%s{appclass}\
tappname=%s{appname}\tmalwaretype=%s{malwarecat}\tmalwareclass=%s{malware-
class}\tthreatname=%s{threatname}\triskscore=%d{riskscore}\tdlpdict=%s{dlp-
dict}\tdlpeng=%s{dlpeng}\tfileclass=%s{fileclass}\tfiletype=%s{filetype}\
treqmethod=%s{reqmethod}\trespcode=%s{respcode}\tmd5=%s{bamd5}\turl=%s{eurl}
Figure 16. NSS feed for web logs configured for IBM QRadar SIEM
• For NSS Feeds for Firewall Logs (government agencies, see NSS Feeds for Firewall Logs), replace the pre-
populated text with the following:
%s{mon} %02d{dd} %02d{hh}:%02d{mm}:%02d{ss} zscaler-nss: LEEF:1.0|Zscaler|NSS-
FW|6.0|%s{action}|usrName=%s{login}\trole=%s{dept}\trealm=%s{location}\ts-
rc=%s{csip}\tdst=%s{cdip}\tsrcPort=%d{csport}\tdstPort=%d{cdport}\tdst-
PreNATPort=%d{cdport}\tsrcPreNATPort=%d{csport}\tdstPostNATPort=%d{sdport}\
tsrcPostNATPort=%d{ssport}\tsrcPreNAT=%s{csip}\tdstPreNAT=%s{cdip}\tsrcPost-
NAT=%s{ssip}\tdstPostNAT=%s{sdip}\ttsip=%s{tsip}\ttsport=%d{tsport}\tttype=%s{t-
type}\tcat=nss-fw\tdnat=%s{dnat}\tstateful=%s{stateful}\taggregate=%s{aggre-
gate}\tnwsvc=%s{nwsvc}\tnwapp=%s{nwapp}\tproto=%s{ipproto}\tipcat=%s{ipcat}\
tdestcountry=%s{destcountry}\tavgduration=%ld{avgduration}\trulelabel=%s{rule-
label}\tdstBytes=%ld{inbytes}\tsrcBytes=%ld{outbytes}\tduration=%d{duration}\
tdurationms=%d{durationms}\tnumsessions=%d{numsessions}
Figure 17. NSS feed for firewall logs configured for IBM QRadar SIEM
• For NSS Feeds for DNS Logs (government agencies, see NSS Feeds for DNS Logs), replace the pre-populated
text with the following:
%s{mon} %02d{dd} %02d{hh}:%02d{mm}:%02d{ss} zscaler-nss:LEEF:1.0|Zs-
caler|NSS-FW|6.0|%s{reqaction}|usrName=%s{login}\trole=%s{dept}\trealm=%s{loca-
tion}\treqaction=%s{reqaction}\tresaction=%s{resaction}\tcat=nss-dns\treqrule-
label=%s{reqrulelabel}\tresrulelabel=%s{resrulelabel}\tdnsReqtype=%s{reqtype}\
tdnsReq=%s{req}\tdnsResp=%s{res}\tdstPort=%d{sport}\tdurationms=%d{durationms}\
tsrc=%s{cip}\tdst=%s{sip}\tcategory=%s{domcat}\tdeviceowner=%s{deviceowner}\
tdevicehostname=%s{devicehostname}
Figure 18. NSS feed for DNS logs configured for IBM QRadar SIEM
Cloud NSS
To configure Cloud NSS and QRadar:
1. In QRadar, install the RPM Files. Cloud NSS deployment requires two RPM files from QRadar: HTTP Receiver Protocol
and Zscaler NSS DSM (Device Support Module). If you previously enabled automatic updates for your QRadar
deployment, you are not required to manually install the files. To manually install the RPM files:
a. Download the updated RPM files for your version of QRadar from IBM Support Fix Central:
i. (Optional) Under Find Product, configure the filters to narrow your search, then click Continue.
ii. In the search bar, enter zscalernss to find the respective RPM files for download.
Figure 21. Admin page in QRadar Console with Deploy Changes button
2. In QRadar, add Zscaler NSS as a Log Source. If the log source is not automatically discovered, you can manually add
Zscaler NSS as a log source using the QRadar Log Source Management app.
Clipboard-list For QRadar 7.3.3 to 7.5.0, you can also add a log source in QRadar by using the Log Sources icon. To learn more,
refer to the IBM documentation.
c. In the IBM QRadar Log Source Management window, select Log Sources.
e. Select Single Log Source. The Add a Single Log Source wizard appears.
f. In the Add a Single Log Source wizard, select a Log Source type:
i. In the search bar, enter zscaler Nss.
ii. Select Zscaler Nss from the drop-down menu.
iii. Click Step 2: Select Protocol Type.
g. Select HTTP Receiver as the protocol type, then click Step 3: Configure Log Source Parameters.
h. Configure the Log Source parameters, then click Step 4: Configure Protocol Parameters. The following fields
are required (scroll down to see all parameters):
• Name: Enter a name.
• Groups: Select a group.
• Language: Select a language.
• Target Event Collector: Select the appliance to collect events from Zscaler.
Clipboard-list For QRadar on Cloud, the appliance is your Data Gateway. To learn more, refer to the IBM documentation.
• Disconnected Log Collector: Select a disconnected log collector if available on your QRadar deployment.
• Credibility: Assign a value from 1 to 10. The default value is 5.
i. Configure the protocol parameters (scroll down to see all parameters), then click Step 5: Test Protocol
Parameters:
• Log Source Identifier: Enter the IP address of the Zscaler host that sends the logs to QRadar.
• Incoming Payload Encoding. Select an encoding type. UTF-8 is selected by default.
j. Click Finish.
Clipboard-list To learn more about HTTP Receiver log source parameters for Zscaler NSS, refer to the IBM documentation.
k. (Optional) Click Start Test. To fix any errors, click Configure Protocol Parameters.
l. When you complete testing, click Finish.
5. In the ZIA Admin Portal, add a Cloud NSS Feed. To add a Cloud NSS Feed, see Adding Cloud NSS Feeds
(government agencies, see Adding Cloud NSS Feeds) and select the type of feed (e.g., Web Log) to configure. The
following fields require specific inputs:
• SIEM Type: Select Other.
• API URL: Enter the URL of the configured HTTP Receiver (e.g., https://your-qradar-data-collector.
com:12469).
• HTTP Headers: QRadar does not require a specific key and value, but to save your configuration in the ZIA Admin
Portal, enter placeholder text. For example:
• Key 1: Enter header1.
• Value 1: Enter IBMQR.
• Feed Output Type: Select Custom.
• Feed Escape Character: Enter ,\”
• Feed Output Format: See the following output formats by log type.
• For NSS Feeds for Web Logs (government agencies, see NSS Feeds for Web Logs), replace the pre-
populated text with the following:
%s{mon} %02d{dd} %02d{hh}:%02d{mm}:%02d{ss} zscaler-nss:
LEEF:1.0|Zscaler|NSS|4.1|%s{reason}|cat=%s{action}\tdevTime=%s{mon} %02d{dd}
%d{yy} %02d{hh}:%02d{mm}:%02d{ss} %s{tz}\tdevTimeFormat=MMM dd yyyy HH:mm:ss
z\tsrc=%s{cip}\tdst=%s{sip}\tsrcPostNAT=%s{cintip}\trealm=%s{location}\tusr-
Name=%s{login}\tsrcBytes=%d{reqsize}\tdstBytes=%d{respsize}\trole=%s{dept}\
tpolicy=%s{reason}\trecordid=%d{recordid}\tbwthrottle=%s{bwthrottle}\tuser-
agent=%s{ua}\treferer=%s{ereferer}\thostname=%s{ehost}\tappproto=%s{proto}\turl-
category=%s{urlcat}\turlsupercategory=%s{urlsupercat}\turlclass=%s{urlclass}\
tappclass=%s{appclass}\tappname=%s{appname}\tmalwaretype=%s{malwarecat}\tmalware-
class=%s{malwareclass}\tthreatname=%s{threatname}\triskscore=%d{riskscore}\tdlp-
dict=%s{dlpdict}\tdlpeng=%s{dlpeng}\tfileclass=%s{fileclass}\tfiletype=%s{filetype}\
treqmethod=%s{reqmethod}\trespcode=%s{respcode}\tbamd5=%s{bamd5}\turl=%s{eurl}
Figure 31. Cloud NSS feed for web logs configured for IBM QRadar SIEM
• For NSS Feeds for Firewall Logs (government agencies, see NSS Feeds for Firewall Logs), replace the pre-
populated text with the following:
%s{mon} %02d{dd} %02d{hh}:%02d{mm}:%02d{ss} zscaler-nss: LEEF:1.0|Zscaler|NSS-
FW|6.0|%s{action}|usrName=%s{login}\trole=%s{dept}\trealm=%s{location}\ts-
rc=%s{csip}\tdst=%s{cdip}\tsrcPort=%d{csport}\tdstPort=%d{cdport}\tdst-
PreNATPort=%d{cdport}\tsrcPreNATPort=%d{csport}\tdstPostNATPort=%d{sdport}\
tsrcPostNATPort=%d{ssport}\tsrcPreNAT=%s{csip}\tdstPreNAT=%s{cdip}\tsrcPost-
NAT=%s{ssip}\tdstPostNAT=%s{sdip}\ttsip=%s{tsip}\ttsport=%d{tsport}\tttype=%s{t-
type}\tcat=nss-fw\tdnat=%s{dnat}\tstateful=%s{stateful}\taggregate=%s{aggre-
gate}\tnwsvc=%s{nwsvc}\tnwapp=%s{nwapp}\tproto=%s{ipproto}\tipcat=%s{ipcat}\
tdestcountry=%s{destcountry}\tavgduration=%ld{avgduration}\trulelabel=%s{rule-
label}\tdstBytes=%ld{inbytes}\tsrcBytes=%ld{outbytes}\tduration=%d{duration}\
tdurationms=%d{durationms}\tnumsessions=%d{numsessions}
Figure 32. Cloud NSS feed for firewall logs configured for IBM QRadar SIEM
• For NSS Feeds for DNS Logs (government agencies, see NSS Feeds for DNS Logs), replace the pre-populated
text with the following:
%s{mon} %02d{dd} %02d{hh}:%02d{mm}:%02d{ss} zscaler-nss:LEEF:1.0|Zs-
caler|NSS-FW|6.0|%s{reqaction}|usrName=%s{login}\tdevTime=%s{mon} %02d{dd}
%d{yy} %02d{hh}:%02d{mm}:%02d{ss} %s{tz}\tdevTimeFormat=MMM dd yyyy HH:mm:ssz\
trole=%s{dept}\trealm=%s{location}\treqaction=%s{reqaction}\tresaction=%s{res-
action}\tcat=nss-dns\treqrulelabel=%s{reqrulelabel}\tresrulelabel=%s{resrulela-
bel}\tdnsReqtype=%s{reqtype}\tdnsReq=%s{req}\tdnsResp=%s{res}\tdstPort=%d{sport}\
tdurationms=%d{durationms}\tsrc=%s{cip}\tdst=%s{sip}\tcategory=%s{domcat}\tde-
viceowner=%s{deviceowner}\tdevicehostname=%s{devicehostname}\trecordid=%d{re-
cordid}\tdatacenter=%s{datacenter}\tdatacentercity=%s{datacentercity}\
tdatacentercountry=%s{datacentercountry}
Figure 33. Cloud NSS feed for DNS logs configured for IBM QRadar SIEM
Figure 34. Test Connectivity icon on the Cloud NSS Feeds page in the ZIA Admin Portal
b. If the test is successful, the following message is displayed: Test Connectivity Successful: OK-
Success (200). If you require further assistance after deployment, contact Zscaler Support.
ZPA Logs
Zscaler Private Access (ZPA) sends its logs securely to QRadar via the Log Streaming Service (LSS). LSS is deployed using
two components: a log receiver and a ZPA App Connector. LSS resides in ZPA and initiates a log stream through a ZPA
Public Service Edge. The App Connector resides in your company’s enterprise environment. It receives the log stream and
then forwards it to a log receiver.
For details in setting up the LSS log receiver, see About the Log Streaming Service (government agencies, see About the
Log Streaming Service).
QRadar parses ZPA’s Users Status, User Activity, App Connector Status, and Audit logs.
For details on the fields that these log types provides, see:
• About User Activity Log Fields (government agencies, see About User Activity Log Fields).
• About User Status Log Fields (government agencies, see About User Status Log Fields).
• About Audit Log Fields (government agencies, see About Audit Log Fields).
• About App Connector Status Log Fields (government agencies, see About App Connector Status Log Fields).
To send events to IBM QRadar, you must direct the log stream to the IP address of the IBM QRadar. You must format each
log type into a LEEF format.
Log in to the ZPA Admin Portal and go to Configuration & Control > Private Infrastructure > Log Receivers.
Audit Logs
1. Log Type: Audit Logs
2. Log Stream Content: Enter the following:
<166>%s{modifiedTime:iso8601} zpa-lss
LEEF:1.0|Zscaler|ZPA|4.1|%s{auditOperationType}|cat=ZPA_Audit_Log\tcreation-
Time=%s{creationTime:iso8601}\trequestId=%s{requestId}\tsessionId=%s{session-
Id}\tauditOldValue=%s{auditOldValue}\tauditNewValue=%s{auditNewValue}\tauditOpera-
tionType=%s{auditOperationType}\tobjectType=%s{objectType}\tobjectName=%s{objectName}\
tobjectId=%d{objectId}\taccountName=%d{customerId}\tusrName=%s{modifiedByUser}\n
Figure 41. Collecting details to open support case with Zscaler TAC
3. With your company ID information, you can open a support ticket. Go to Dashboard > Support > Submit a Ticket.