https://catalogartifact.azureedge.net/publicartifacts/zscaler1579058425289.zia_zpa_security_copilot-f183ea1b-e0d0-4d5e-8699-68a856351639/50bee280-986c-406a-86af-1c9ed9ae48c7_listing.large.logo.png
ZIA ZPA Log Correlation Agent
بواسطة Zscaler
Just a moment, logging you in...
Streamline log correlation and enhance security analysis with ZIA ZPA Log Correlation Agent.
The ZIA ZPA Correlation Agent is a security investigation agent that integrates with Microsoft Sentinel to correlate Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) log data ingested into Sentinel's Log Analytics workspace. When a ZIA security alert is triggered for a user, the agent automatically cross-references both ZIA and ZPA telemetry to build a complete picture of user activity, identify anomalous behavior, and recommend policy remediation — all scoped to the last 24 hours.
Agent Tasks:
- Query the Sentinel table for ZIA events tied to the specified user, surfacing security events, device actions, destination details, and activity context
- Query the Sentinel table for the same user, preprocessing raw Message fields (stripping leading dashes and parsing JSON) to extract private application access events
- Correlate activity across both log sources using overlapping fields (user identity, IP addresses, timestamps, session IDs) to identify related or suspicious patterns
- Surface key insights including total logins, applications accessed, unusual destinations, failed connections, authentication anomalies, and privilege escalation indicators
- Evaluate whether existing ZIA or ZPA policies require adjustment based on findings
Inputs:
- : Zscaler username or User Principal Name (UPN) to investigate
- Microsoft Sentinel Log Analytics workspace with ingested (ZIA events) and (ZPA events) tables, scoped to the last 24 hours
Outputs:
- Correlated investigation summary detailing user activity across ZIA and ZPA, including anomalous behaviors, security event highlights, and discrepancies between the two log sources
- Key findings covering failed connections, suspicious destinations, access patterns, and authentication issues
- Policy adjustment recommendations specifying whether ZIA or ZPA policy configurations should be updated to address identified gaps or risks
لمحة سريعة
https://catalogartifact.azureedge.net/publicartifacts/zscaler1579058425289.zia_zpa_security_copilot-f183ea1b-e0d0-4d5e-8699-68a856351639/d2421e61-9fe8-4118-9643-eaec7dc4577b_screenshot.png
https://catalogartifact.azureedge.net/publicartifacts/zscaler1579058425289.zia_zpa_security_copilot-f183ea1b-e0d0-4d5e-8699-68a856351639/2b849afe-fee0-44f9-ab7a-6c8ac8dd213d_screen1.png
https://catalogartifact.azureedge.net/publicartifacts/zscaler1579058425289.zia_zpa_security_copilot-f183ea1b-e0d0-4d5e-8699-68a856351639/cb7675d9-688c-4baa-b23b-b305f649f9f1_screen2.png
https://catalogartifact.azureedge.net/publicartifacts/zscaler1579058425289.zia_zpa_security_copilot-f183ea1b-e0d0-4d5e-8699-68a856351639/c54d62c0-35d8-47a8-9033-11027f493abd_screen3.png
https://catalogartifact.azureedge.net/publicartifacts/zscaler1579058425289.zia_zpa_security_copilot-f183ea1b-e0d0-4d5e-8699-68a856351639/5c30006e-8412-41eb-b185-46128e9cfd12_zscalerziazpacorrelationagent.png
التطبيقات الأخرى من Zscaler
Zscaler Cloud Connector ApplicationZscalerZscaler Secure Internet and Private Access for cloud workloads
+1
Applicable to:
Azure Applications
NaN out of 5
Zscaler Cloud ConnectorZscalerZscaler Secure Internet and Private Access for cloud workloads
+1
Applicable to:
Virtual Machines
NaN out of 5
Zscaler Internet AccessZscalerZscaler Internet Access is a 100-percent cloud-delivered security stack as a service.
+1
Applicable to:
SaaS
NaN out of 5
Preview - Zscaler Cloud Connector ApplicationZscalerPreview - Zscaler Secure Internet and Private Access for cloud workloads
+1
Applicable to:
Azure Applications
NaN out of 5
Zscaler Internet Access Virtual Service EdgeZscalerZscaler Internet Access Virtual Service Edge - ZIA VZEN is the Virtual appliance for with Zscaler ZIA customers policy enforcement functionality
+1
Applicable to:
Virtual Machines
NaN out of 5