Zscaler Ez Agent Guide
Zscaler Ez Agent Guide
Copyright
This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc.
Copying, reproducing, integrating, translating, modifying, enhancing, recording by any
information storage or retrieval system or any other use of this document, in whole or in part, by
anyone other than the authorized employees, customers, users or partners (licensees) of Zscaler,
Inc. without the prior written permission from Zscaler, Inc. is prohibited.
Copyright© 2015 Zscaler
Trademark Statements
Zscaler and NanoLog are trademarks or registered trademarks of Zscaler, Inc.
All other trademarked names used herein are the properties of their respective owners, and are
used for identification purposes only.
Use eZ Agent to set and enforce proxy settings in your users’ browsers, so their web traffic is
always directed to the Zscaler service, regardless of their location. This guide provides an
overview of eZ Agent version 2.1. It describes how to install eZ Agent on your organization’s
computers and define its configuration settings from the Zscaler service portal.
You can centrally define and manage eZ Agent configuration settings—such as the browser proxy
settings, logging level and the passwords for disabling and uninstalling eZ Agent—from the admin
portal, and then use the Group Policy Object (GPO) feature of Active Directory (AD) to install eZ
Agent on all devices in your organization.
eZ Agent is installed as a Microsoft Windows service that runs in the System Tray. It prevents
tampering by automatically checking the browser’s proxy settings every few seconds, and
resetting them if the user changes or disables them. The service itself is password-protected, so
only the network administrator can temporarily disable or uninstall the agent. This ensures that
your corporate policy is enforced, regardless of a user’s location. Additionally, eZ Agent
recognizes when users connect to “hot spots,” such as airports or coffee shops, where they are
required to authenticate or pay before they can access the Internet, and enforces its proxy
settings only after a predefined time period.
Supported Browsers
Internet Explorer (6.0 and higher)
Firefox (3.0 and higher)
Chrome (1.0+)
Safari (Windows only)
After you make changes to the file, the service automatically downloads the updated file after
the configured time period and distributes it to all the agents.
To delete an admin-defined eZ Agent configuration file, point to the file and click the Edit
icon. Then click Delete at the bottom on the dialog.
If you inadvertently delete a configuration file that is in use, you can create a new file with the
same name and use it again.
Uninstall.bat: Use this file to uninstall eZ Agent on a local computer. See Uninstalling eZ
Agent on a Computer.
config.dat: This file contains the eZ Agent configuration settings. When you first download
the eZ Agent zip file, this file contains the default configuration settings. You can define a new
configuration file and download it to replace the default configuration file. See Defining and
Managing eZ Agent Configuration Files.
If you are re-installing eZ Agent and selected different settings, click Reset.
The disk requirements for the binaries and configuration file appear when you select them.
To check whether you have enough space in your disk drives, click Disk Usage to view the
available and required disk space.
Redeploy eZ Agent
You can easily redeploy eZ Agent when you need to upgrade to the latest version. To redeploy the
assigned eZ Agent package, navigate to the Properties window and do the following:
1. Click Group Policy.
2. Select the GPO used for the eZ Agent deployment, and then click Edit.
3. Click Software Settings.
4. Click the eZ Agent software installation item that contains the eZ Agent installation package.
5. When the Group Policy window appears, do the following:
a. Right-click eZ Agent.
b. Click All Tasks > Redeploy application. A warning message appears stating that the
package will be reinstalled on all devices on which it was previously installed.
c. Click Yes in the warning message.
d. Click Close to exit the window.
6. Click OK.
7. Close the Active Directory Users and Computers window.
Remove eZ Agent
To remove eZ Agent, navigate to the Properties window and do the following:
1. Click Group Policy.
2. Select the GPO used for the eZ Agent package deployment and click Edit.
3. Click Software Settings.
4. Click the eZ Agent software installation item that contains the eZ Agent installation package.
The Group Policy window appears.
Users can right-click the icon to view its available options, as shown in the following figure.
Select Load new configuration file to upload a new eZ Agent configuration file. Users must
enter the disable password that was specified in the configuration file, and download it to the
desired location. eZ Agent displays a message indicating that a new file was loaded.
Select Export Logs to File to download logs to a file for debugging purposes. Click this option
and navigate to where you want to store the log files. After the export, eZ Agent displays a
message confirming the export.
To view the eZ Agent log, double-click the eZ Agent icon. A log window appears.
There are many eZ Agent configuration files in the security service. Which configuration
file will eZ Agent fetch?
eZ Agent will fetch the configuration file you used during the installation. If you want to use
another configuration file, download it from the security service and upload it manually by right-
clicking the systray icon.
I deleted some configuration files from the security service and created some new files,
but the changes are not reflected.
eZ Agent tries to fetch the changes from a configuration file that has the name same as the one it
is using. So, if you deleted the configuration file that eZ Agent is using, it will continue to use the
existing configuration. You can avoid this situation by making your changes in the existing
configuration files, or creating a new configuration file with the same name. Alternatively, you can
download the configuration file from the security service, and let the user upload it manually by
right-clicking the systray icon.
Note: Zscaler recommends that you always delete configuration files that are no longer in use.