App connectors are creating “micro tunnels” from a user’s endpoint to a defined application segment. An application segment can be anything from a SQL database to an Azure storage account to an SAP portal. It is best practice to define application segments with a subdomain and relative ports and protocols. For example an internal site intranet.acme.com on port 443 TCP is an app segment. Another app segment could be the Acme widget SQL database on port 1433 TCP. Services like UCaaS: Teams, Zoom, Five9, 8x8, etc. should be bypassed in ZPA and ZIA and allowed to “break out locally”, accessing the Internet directly from where the user is connecting.
By allowing access to *.acme.com and 10.0.0.0/8 you will catch a lot of your traffic destined to private applications. Other things you’ll see and need to call out like Azure storage accounts and Azure managed SQL instances. You can put app connectors (Linux VMs currently running a stripped down version of RHEL 9.4) in your commercial cloud tenant and on premise. You will also use app connectors for sending logs to your SIEM platform with something called log streaming service (LSS).
ZIA = Zscaler Internet Access, you can block categories of URLs (gambling, pornography, new domains, etc.) make some fancy Cloud App Control Policy rules, file type controls, inline DLP, malware blocking, geo restrictions, and some other good stuff. You can also use this to detect shadow IT and get a feel for what SaaS offerings that users at your organization use. You can find that one user who just uploaded 35GB of data to a file sharing site that is not authorized for use by your organization. You can find those ten users who have burned through 280GB last month on Netflix. You can do some pretty granular rules with Cloud App Control Policy rules and create rules for certain departments base on user attributes populated within your AD / Entra ID and passed over to Zscaler via SCIM. You can conduct SSL inspection on most Internet traffic very easily by installing ZCC on endpoints. Most customers will not conduct SSL inspection on the predefined URL categories of Health and Finance for user privacy reasons. There are also “one-click” Office 365 bypasses you can enable.
For guest WiFi (where you can’t install ZCC on their endpoints) you can setup a GRE tunnel and use DNS based security controls for some web content control, obviously no SSL inspection when deployed like this for guest WiFi.
ZIA provides Internet content filtering and malware protection, also can function as a host based firewall if you have the advanced cloud firewall and install ZCC on your endpoints and enable Tunnel 2.0. You will setup two VMs to forward logs to your SIEM, one for web traffic and one for firewall traffic. This is called analog streaming service, NSS. Remember if you’re using Tunnel 2.0 and connecting from on-premises, any existing network security appliances will not be able to do much (besides outright block traffic to Zscaler data centers), so you’ll need to ensure you have at least the minimums security controls you do now deployed through ZIA. Think firewall rules for hosts. I block things like external SMB connections, external RDP connections, and I block the QUIC protocol. If you don’t block QUIC, you’ll miss out on a lot of encrypted traffic, as Zscaler can inspect QUIC traffic since it doesn’t perform the traditional three way handshake when establishing a connection. QUIC traffic will fallback to HTTPS and you’ll then be able to gain insight into that traffic.
ZCC = Zscaler Client Connector, it is the endpoint agent which intercepts network traffic and forwards it appropriately.
ZPA = Zscaler Private Access, the solution for connecting users to private applications, either in your data center or hosted in a commercial cloud tenant.
Feel free to PM me, I’m decently knowledgeable on ZPA and ZIA and in setting up things called app profiles and forwarding profiles for ZCC.
Late night typing this on a phone; so there may be some errors in this post.
Source - I work for a company that deploys and manages Zscaler (ZIA/ZPA/ZDX) for lots of other companies, ranging from tens of thousands of users to several hundred users. I’ve worked with companies on designing, planing, implementing, and troubleshooting their roll-outs of Zscaler.