IBM Support

Zscaler integration with MaaS360

How To


Summary

This document explains the benefits, setup, and configuration that is needed to integrate the Zscaler ZIA solution with the MaaS360 Threat Management service. To enable this feature, customers must have an active subscription to Zscaler solutions.

Objective

Zscaler integration benefits: 
The Zscaler ZIA integration with MaaS360 provides the following benefits to users:
  • Enhanced phishing detection
    MaaS360 has partnered with Zscaler to enhance phishing detection and enforcement capabilities on mobile devices. MaaS360 can warn users ahead of time that they have received malicious links in an SMS text or in an email message. With Zscaler, users can block malicious links at the time of access. Phishing detection and enforcement also applies to all apps that are installed on a device.
  • Unified dashboard that displays threat events that occur on a device
    MaaS360 administrators can view threat detections that occur across both Zscaler and MaaS360 in a common dashboard. All phishing events are labeled with the "Malicious URLs Accessed" risk name. Administrators can access each risk incident to view the devices and users that are affected by the phishing event.
    Zscaler events dashboard
  • Aggregated device risk score
    When a risk score is computed for a device, the risk score now includes the new "Malicious URLs Accessed" risk type. The device risk score is not only based on events that are generated from MaaS360, but also includes threat detections from Zscaler. By correlating data from multiple systems, this computed risk score is a more accurate representation of device security posture. This value is a significant indicator to identify risky devices and apply stricter policies.
  • UEM device context for all threat events that originate from mobile devices
    Most XDR platforms are limited to what actions can be taken on mobile devices since they lack the information that is needed to uniquely identify the device. Due to privacy restrictions, most OS vendors prevent applications from accessing device information that is needed to accurately identify a device.
    By enabling the Zscaler integration with MaaS360, all Zscaler threat events include additional information that is needed to uniquely identify a device. These events also provide additional information that accurately represents device security posture such as device risk score and user risk score. Administrators can use this information to automate or manually take actions that improve the security posture of the device.
Zscaler integration workflow:
Zscaler workflow
 

Steps

Enabling the Zscaler integration in MaaS360
 
  • Enabling the service from the MaaS360 PortalThreat Management Services > Endpoint Security Service 
  • Enabling the MaaS360 customer property: Contact IBM MaaS360 support to enable the Enable Zscaler Integration customer property.
  • IBM MaaS360 Support must also add an access role for an administrator to configure the Zscaler integration.
  • MaaS360 administrator role changes: You must create a new role for administrators to add and manage threat connectors that integrate with Zscaler. The following screen captures depict how to create the role: 
 Admin role
Admin role
Admin role
Admin role

Adding and configuring the MaaS360 threat connectors
You must create a MaaS360 threat connector to receive logs from the Zscaler cloud. The MaaS360 threat connector uploads events that are received from the Zscaler NSS service to a threat relay.  The threat relay processes the events before the event is sent to the MaaS360 Portal.
To add a threat connector:
  1. Go to Setup > Threat Connectors.

    Threat connector menu
  2. Click Add Threat Connector.
    1. ​​​​​Enter a unique name and description for the threat connector.
    2. Select Zscaler as the threat vendor. 
    3. Click Validate Details, and then click Next.

      Threat connector menu
  3. Configure settings for the threat connector:
    1. Select the threat relay that processes threat information. Use the relay that is closest to the location where the MaaS360 threat connector is installed. 
    2. Select the installation mode for the threat connector:
      • Standalone: Stand-alone mode allows installation of the connector only.  (Note: You need the IP address of the host name to configure NSS feeds in the Zscaler portal).
      • HA: High availability mode allows multiple installations of a connector. For this mode, you must set up a load balancer and configure the load balancer to split traffic between multiple connector nodes.
    3. Save the settings. 
  4. Download the connector identity certificate and save the certificate password. The connector is displayed in the connector list view. The administrator can edit or modify connectors by selecting the connector and clicking the edit action.

    Edit Connector action

Distributing the Zscaler app 

Zscaler uses the Zscaler client connector app to protect user traffic on mobile devices. You can distribute Zscaler connector apps to iOS and Android platforms through MaaS360 application management.

For detailed instructions on how to deploy connector apps through MaaS360 MDM, see the following sites:


Setting up the Zscaler NSS VM
Zscaler NSS VM downloads
Follow the instructions at https://help.zscaler.com/zia/nss-deployment-guide-vmware-vsphere to download the Zscaler NSS VM.

Setting up the Zscaler Nanolog streaming service

The Nanolog Streaming Service (NSS) streams security information or other access events detected by Zscaler for further analysis in a customer's SIEM or any other correlation of events. MaaS360 uses the SIEM integration capabilities exposed by Zscaler to consume threat events and the correlation of these events. MaaS360 only supports integration with NSS VM based deployment. MaaS360 can integrate with an existing NSS VM setup or a new VM setup.

Setting up a new NSS VM

Follow the instructions on the Zscaler help page at https://help.zscaler.com/zia/documentation-knowledgebase/analytics/nss/nss-deployment/nss-vm-deployment to set up a new NSS VM.

For an existing NSS VM setup, you must create additional NSS feeds to process security information. After you set up NSS, you must configure the Zscaler threat feeds. For more information about configuring Zscaler threat feeds, see the Configuring the Zscaler threat feed section.


Setting up the MaaS360 threat connector
Prerequisites
  • CPU: 4 core CPUs
  • Docker: Install Docker on a Linux VM. If you are using a Windows or macOS machine, you must have a Docker desktop license to run the software. 
    • Any machine installed with the Docker runtime engine. Follow these instructions to set up Docker on multiple platforms:
  • Storage: 50 GB of space to save threat information on the disk. This storage must be created as a volume and passed as a parameter to execute the container.
  • Network: Allow the following hosts for threat connector integration:
    • Allow traffic for *.maas360.com. MaaS360 threat connector uses port 443 for any outbound communication with MaaS360 services.
    • The MaaS360 threat connector listens on port 9000 for all threat feeds. Make sure that the NSS VM can access the machine that the threat connector is installed on and can access port 9000.
Downloads
  1. Download the Docker image for the MaaS360 threat connector from the MaaS360 Portal at Setup > Threat Connectors. Save the image on the machine or VM where the connector is running.
  2. Download the identity certificate that runs the connector from either the add connector workflow or by clicking an action and using the download certificate workflow.
  3. Copy the downloaded certificates to a folder on the machine. In the following example instructions, the folder is named Connector folder where the Docker image is expected to run from.
  4. Copy the password from the download certificate page for later use.
Installation 
  1. Open a terminal and change to the directory where the image and certificates folder are located.
  2. Use the following command to load the MaaS360 threat connector image:
    $ docker load < maas360-threat-connector.tar.gz
  3. Use the following command to verify that the image loaded successfully (the command lists the image; make sure that maas360-threat-connector is part of the listed image):
    $ docker images
  4. Use the following command to start running the image:
    $ docker run -d --name connector -p 9000:9000 \
    -v $(path_to_connector_folder):/home/config \
    -e CERT_PASSWORD=$(cert_password_from_maas360_portal) \maas360-threat-connector:1.0.0
  5. Record the IP address and the hostname of the host that the maas360-threat-connector is running on.
     

Configuring the Zscaler threat feed
Configure the following NSS feeds to receive information from the NSS server:
Threat feed:
  1. Log in to the Zscaler admin portal and go to the Administration > Nanolog streaming service > NSS Feed section.
  2. Click Add NSS Feed and enter the following information:
    1. Enter the feed name, preferably with the maas360_ prefix to easily identify the feed.
    2. Select NSS for Web in the NSS Type field.
    3. Select an NSS server from the drop-down list. You can use a new NSS server setup for MaaS360 integration or an existing NSS server setup in the customer premises.
    4. Select the SIEM destination type: 
      • If you select IP address, enter the IP address of the host that the maas360-threat-connector is running on and then enter 9000 as the SIEM TCP port. 
      • If you select FQDN:
        • For stand-alone mode, enter the hostname of the machine that the maas360-threat-connector is executed on.
        • For HA mode, enter the load balancer IP address that the maas360-threat-connector is executed on.
    5. For SIEM Rate, select Unlimited.
    6. For Log Type, select Web Log.
    7. For Feed Output Type, select QRadar LEEF.
    8. Enter the following string in the Feed Output Format:
      threat_feed_string.txt
    9. Enter the feed time zone in GMT.
    10. In the Web Log Filters section, go to Security and select All threats in the Advanced Threats section. Use the default settings for the other sections. 
    11. Save the settings.
Threat feed
Threat feed
Device feed:
  1. Log in to the Zscaler admin portal and go to the Administration > Nanolog streaming service > NSS Feeds section.
  2. Click Add NSS Feed and enter the following information:
    1. Enter the feed name, preferably with the maas360_ prefix to easily identify the feed.
    2. Select NSS for Web in the NSS Type field.
    3. Select an NSS server from the drop-down list. You can use a new NSS server setup for MaaS360 integration or an existing NSS server setup in the customer premises.
    4. Select the SIEM destination type: 
      • If you select IP address, enter the IP address of host that the maas360-threat-connector is running on and then enter 9000 as the SIEM TCP port. 
      • If you select FQDN:
        • For stand-alone mode, enter the hostname of the machine that the maas360-threat-connector is executed on.
        • For HA mode, enter the load balancer IP address that the maas360-threat-connector is executed on.
    5. For SIEM Rate, select Unlimited.
    6. For Log Type, select Web Log.
    7. For Feed Output Type, select QRadar LEEF.
    8. Enter the following string in the Feed Output Format:
      device_feed_string.txt
    9. Enter the feed time zone in GMT.
    10. In the Web Log Filters section, go to Security and select All threats in the Advanced Threats section. Use the default settings for the other sections. 
    11. Save the settings.
Device feed
Device feed

Viewing the MaaS360 threat connector details
You can view a list of the active threat connectors by logging in to the MaaS360 Portal and selecting Setup > Threat Connectors.
Connector list
The connector list view displays the following information:
  • Connector Name: The name of the connector that is selected from the add connector workflow.
  • Threat Relay:  The threat relay that was selected from the add connector workflow.
  • Threat Vendor:  The connector vendor information that threat intelligence is pulled from. (Currently supports Zscaler only)
  • Created On:  The date and time that the connector was created in the MaaS360 Portal.
  • Last Modified: The last date and time the connector settings were edited. 
  • Status: The exact state of the connector in its lifecycle:
    • Pending Installation: The administrator added the connector.
    • Online: The administrator installed the connector on a VM and the connector registered with the MaaS360 Portal. 
    • Offline: The connector is unable to reach MaaS360 after the connector was installed. 
    • Inactive: The administrator disabled the connector. The connector still pings MaaS360 to check its status, but the connector cannot process threat information.

Viewing the MaaS360 threat connector actions
Click the three dots next to a threat connector to view a list of actions that are supported for that connector. (Actions that are not supported by the connector are unavailable.)
Connector actions
Download Certificate action
Use this action to download the certificate associated with the threat connector. You must copy the certificate password with the downloaded certificate. You must use this password to start the docker container.
 
Download certificate action
Refresh Certificate action
Use this action to update the connector's certificate in case the original certificate was lost or expired. 
 
Refresh certificate action
Disable Connector action
Use this action to stop connectors from processing threat information. Administrators can re-enable connectors to resume processing threat information. When a connector is uninstalled, administrators can remove the docker image from the docker engine and disable the connector.
Disable connector action
Edit Connector action
Use this action to edit settings that are already configured for a connector. 
Edit Connector action

Document Location

Worldwide

[{"Type":"MASTER","Line of Business":{"code":"LOB24","label":"Security Software"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSYSXX","label":"IBM MaaS360"},"ARM Category":[{"code":"a8m0z0000000712AAA","label":"INTEGRATIONS"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Versions"}]

Document Information

Modified date:
07 October 2022

UID

ibm16562691