EZ – In Depth Manoj Apte VP Product Management July 2010 Introducing EZ EZ Agent Enforced EZ agent covers corner cases (< 10% users) by enforcing proxy settings at all times Agent also aids with “captive portals” that require authentication prior to establishing internet access Settings are disabled while network connection has not been established and reinforced upon connection 2 Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL “Thick” Client Inefficiencies Traditional vendors use a “thick” client for authentication and policy enforcement – increased IT burden Road Warrior Client may conflict with VPN drivers and AV clients Deployment is difficult because of the large file size Zscaler service does not require a client Traffic redirection via proxy settings Authentication via patented cookies technology In a small fraction of use cases such as road warriors without centralized provisioning these settings can not be enforced Potential data leakage risks due to malicious employees Compromise of remote corporate assets by malware, adware and spyware 3 Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL EZ Benefits Password prompt if user tries to disable or uninstall the application Plug-in is lightweight (< 4MB) and easy to deploy compared to “thick” clients Can be centrally provisioned and maintained via GPO or Web download Tamper proof but provision to disable and uninstall for privileged users with a password 4 Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL EZ : Packaging EZ_JUL15.ZIP Contains all files for EZ Agent EZAgentUserGuide.pdf Complete description of EZ and installation guide 5 Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL Installing EZ with no customization 1. Unzip contents of the Zip file into some directory 2. Run Setup.BAT. 6 Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL EZ Components Service Tray Configuration File Settings 7 • Windows Service that monitors tray process and restarts it if it is killed. • Ensures Tamper Resistance • Enforces Proxy Settings • Bypass Proxy for Captive Portal • Password based temporary disable for enforcement • Uninstall Password • Temporary Disable Password • Timeout for forcing proxy even if Service is not accessible • Polling interval to retry Service in a captive portal Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL Details of what Tray Sets and monitors Note: Proxy and PAC File settings are monitored for ALL types of Internet connections (LAN Settings is standard, but there may be modem internet connections as well) PAC File Checkbox for PAC file enforcement URL for PAC File Proxy Checkbox for Set Proxy Proxy address for each type of protocol Proxy Exception List Hide Tray Icon Tray process is running in background, but tray icon is hidden. Test Connection Host Gateway Connectivity Test can be pointed to a private sub-cloud Polling Interval in Seconds Retry connection to Service every X Seconds after Proxy is disabled Force Proxy Timeout in Seconds If Service is unavailable, force proxy settings regardless of Service availability after polling for X Seconds (Tamper Resistance Feature) Applications to kill Example: Opera browser can be disallowed by configuring opera.exe in the kill list. A warning is given to the user from the tray icon 8 Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL Sample Configuration file ConfigVersion DebugLevel =1.2.619 =0 DisablePassword UninstallPassword =ZSCALER =ZSCALER PollingIntervalInSeconds ForceProxyTimeOutInSeconds WatchdogLimitInSeconds =30 =0 =300 # Setting for IE redirect limit. Helps with IE 8 MaxHTTPRedirects =20 9 UseProxyServer HTTPProxy HTTPProxyPort HTTPSProxy HTTPSProxyPort FTPProxy FTPProxyPort SOCKSProxy SOCKSProxyPort =0 =gateway.zscaler.net =80 =gateway.zscaler.net =80 =gateway.zscaler.net =80 =gateway.zscaler.net =80 ProxyBypassIE ProxyBypassMozilla =10.*;192.*;*.zscaler.org =10.*,192.*,*.zscaler.org UsePacFile PACFileURL =1 =http://pac.zscaler.net/zscaler.net/proxy.pac HideTrayIcon =0 Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL Steps for GPO based install and uninstall Unzip package into some directory. It contains: Setup.bat, config.txt, config.dat, encrypt_cfg.exe and zInstaller.exe Create custom config.txt and encrypt it : encrypt_cfg.exe e config.txt config.dat GPO based deployment: Deploy Setup.BAT, zInstaller.exe, config.dat in some directory Run SETUP.BAT GPO based uninstall Run Uinst000.exe in the directory where EZ was installed with Uninst000.exe /PASS=<uninstall pass> /VERYSILENT NOTE: All command line parameters are case sensitive 10 Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL Other things… Loading a new configuration file: Method 1 (with admin priviledge): Copy new configuration file in ProgramData\RTServicemon (requires admin priviledge) Right click on EZ agent and “Test Connection” Method 2 (without admin priviledge): Right click on EZ Agent “Load new configuration file” Point to the new configuration file Debugging Set debug level to 10 and ask user to reload new configuration 11 Copyright (c) 2010 - 2011 Zscaler CONFIDENTIAL
© Copyright 2025 Paperzz