One moment for our next question. Traditional network security based on firewalls and VPNs cannot handle the complexity of safeguarding enterprises in what has become a work-from-anywhere world. Aggregate Logs: Individual sessions are grouped together based on { user, rule, network service, network application } and recorded periodically. Microsoft Sentinel provides the following out-of-the-box parsers: To use ASIM Process Event parsers, deploy the parsers from the Microsoft Sentinel GitHub repository. Thanks for taking my questions, guys, and congrats on the strong results. This is useful if you are using this character as your delimiter and would like to ensure it does not cause erroneous delimitation. And that's what we are beginning to see. [Operator instructions] As a reminder, today's program is being recorded. And then, of course, the execution, high-touch engagement is helping to get through finish line, international. It's pretty much across the board. Choose the rules from the list. You know, we do -- I mean, customer advisory board meetings, Jay, we do one like, on average, like one a week I believe. Microsoft Sentinel provides the following . A Fortune 100 logistics company made a four-year multimillion-dollar ACV purchase of ZPA and ZDX for 100,000 users. SIEM Rate Limit (Events per Second): Leave as unrestricted, unless you need to throttle the output stream due to licensing or other constraints. Your question, please. To ingest logs from the Zscaler Cloud into Splunk, an NSS server needs to be deployed. We are not a firewall company that's trying to pivot to zero trust. Choose one or more of the listed methods or choose Any. And our next question comes from the line of Matt Hedberg from RBC. To use ASIM File Activity parsers, deploy the parsers from the Microsoft Sentinel GitHub repository. We actually had some customers interested and a large customer who actually started with ZPA and ZDX at the same time. One moment for our next question. You can specify numbers or ranges. For item lists, you can view up to 500 items on a page; filter the list by searching for a word, phrase, or number contained in an item. So, Jay, is there any validity behind kind of what they're building? And that's where you figure out what all is going on. If this is enabled, the login field in Feed Format Output automatically changes to ologin field which outputs the obfuscated login name. Departments that are deleted after they are selected appear with a strikethrough line. As a reminder, these numbers are all non-GAAP. But if you got good product offerings that are highly differentiated and there's a need for it because customers do want to save money and better cybersecurity, that's really what's positioning us well. Our goal is to make sure we keep on hiring at the right pace in broad go-to-market team, as well as some of the takeoff teams that help us push forward some of the newer products. In closing, we believe that we are still in the early stages of a significant market opportunity to disrupt 30 years of traditional network security and capture a large share of our $72 billion addressable market. I think it's better execution on our sales organization. Our guidance reflects approximately 400 basis points of operating margin improvement compared to last year. And looking at the numbers, it looks like real clean results. Add an NSS server. Once ingested, the Zscaler events are mostly treated the same as Zeek events. Search Configure SpanVA for proxy logs from ZScaler NSS. I would like to remind investors that a number of our emerging products, including ZDX and Zscaler for Workloads, will initially have lower gross margins than our core products. View a sample Firewall log. Our engagement in cloud marketplaces have gotten much better because we are leveraging the annual commit that's already spent -- annual spend that's already committed to the hyperscalers. You can remove all items from the list (Remove All) or only items from a specific page (Remove Page). You know, that basically was related to duration. Strong verticals were federal, financial services, healthcare, and transportation. Block/ICMP: Packets that were dropped because they matched a firewall rule and sent the client an ICMP error message of Type 3 (Destination Unreachable) and code 9 or 10 (network/host administratively prohibited). They are realizing value from it. Number of Sessions: For aggregated logs, you can filter by the number of sessions. Given our large opportunity and our success in the market, it is not surprising to see a number of vendors claiming that they have the same capabilities as we do. Hey, guys. This does conclude the question-and-answer session. One moment for our next question. Collected using the Azure Monitor Agent based Security Events connector to the SecurityEvent table. We will continue to balance growth and profitability. tablinks = document.getElementsByClassName("tablinks"); Number two, the amount of traffic one has to handle to really deliver the service. Our new business grew significantly across various industry verticals, and we had approximately half of our revenue come from outside the U.S. We have a strong and loyal base of customers, with growth retention rates in the high 90s. Get in touch 1-408-533-0288 Chat with us. I wanted to see if you just had any views on that, and more importantly, whether you've seen that maybe make its way into customer conversations at all. It was really duration. The NSS VM connects to both the Nanolog cluster and the Zscaler control plane, grabs the logs, decodes them, and forwards them to your SIEM over a TCP connection. Zscaler offers two cloud firewall services: A standard Cloud Firewall that's included with every Zscaler Internet Access subscription and an advanced Cloud Firewall upgrade that is included in the transformation bundle, or can be purchased as a separate upgrade. Choose the rules from the list. I mean, net retention rate is something we don't guide to or look at. Number one, you -- as you said, they're voting us by spending on Zscaler, right? The Motley Fool has a disclosure policy. Search. In fact, over half of our ZPA customers have purchased ZPA services for all employees, hence delivering zero trust, whether they work in the office or at home. Andy Nowinski -- Wells Fargo Securities -- Analyst. Thanks for taking the question. ET. This deal started with Data Protection and quickly expanded to include web proxy, firewall, and Sandbox and to implement direct-to-cloud architecture across their 6,500 locations. Our Zero Trust Exchange is built on a unique architecture that securely connects users, devices, and applications using business policies, regardless of their location. So, thank you. Shrenik Kothari -- Robert W. Baird and Company -- Analyst. Oh, excellent. So, do I kind of try to focus too much on some of the comparative campaigns that are kind of trying to spread lies on? You know, when we did the -- we reduced our workforce at the end of Q2, one of the things we talked about is we're still going to prioritize basically quota-carrying heads and R&D. I know you mentioned lower close rates, but is there anything else, timing, renewals, or anything else we should think about? But, you know, really, what we did in Q2 was to better position ourselves to make the proper hires going forward, and that's what we're doing. Our focus is still top-line growth. Our unique architecture with our patented single scan, multiaction technology enables us to deliver comprehensive security at high performance and scale. Your question, please. In a large SSE win, a Global 30 healthcare insurance company purchased ZPA and ZDX for 450,000 users and ZIA for 430,000 users. 1-866-902-7811 Zscaler's patented Nanolog Streaming Service delivers Web and Firewall logs from all users in all locations.In real time. Now, we had to do RAMP deals more frequently, which is kind of to meet their timing of the budgets and the like. They built their products using something known as service function chaining in order to reduce their time to market. Your question, please. Zscaler has AI experts and data scientists and the most valuable anonymized private data to customize and effectively train LLM models for the security domain. Zscaler NSS Syslog sample message for Firewall logs feeds supported by Zscaler NSS. We've done well there. Your logs are stored in Zscaler's Nanolog clusters in a highly compressed and encoded format. // Get all elements with class="tabcontent" and hide them Thank you for your interest in Zscaler. The most intelligent information that generative AI can use comes from the URL, which could be hundreds of bytes long. airplane mode) and reconnect it again, the wechat will . Market-beating stocks from our award-winning analyst team. It is required to create a new data source to determine what the TCP Port is. And then they say we -- if you really contrast, I've only seen a couple of cases where they say, yeah, we got a competitive solution. Over the past few quarters, I observed that analysts and investors often equate ZPA with VPN replacement. If you select one of these options, a confirmation window will appear. Sample 1: The following table provides a sample event message for Firewall logs feeds when you use the Syslog protocol for the Zscaler NSS DSM. Your question, please. A firewall company will be a great firewall company. Choose Disable to display the user names. For each feed, you can configure multiple types of filters. So, regarding the Magic Quadrant, you know, I believe that customers are the real judge, and I'll give you three points why I believe they view Zscaler as a real leader. If I came and told you that in one year I'm going to build the best firewall, well, it'll be hard for me to say that because I can't say -- make statements like that, OK? You can specify individual ports and a range of ports. So, it is not unnatural for us to see the competition trying to come and say, maybe I can get into this space. Ensure that the SIEM is configured to accept the feed from the NSS. Configure Zscaler NSS for web logs Direct link to this section Refer to Adding NSS Servers to set up an Add NSS Server for Web and/or Firewall. } Architecture, you know, related to, you know, in-line cloud, you know, multitenant architecture not only for users but workloads and IoT, OT, and B2B, you know, that's a vision basically, you know, Zscaler. And as we said before, if we do so, our current customers are spending -- their spend with us could go to 5x or 6x kind of stuff. Your question, please. So, we have a very strong presence in a number of states at statewide level. Zscaler NSS To stream Zscaler logs to MCAS, you will need to have deployed and configured Zscaler's Nanolog Streaming Service (NSS) in the ZIA admin portal - this allows you to stream logs from their logging clusters (called Nanolog) towards a SIEM or product of your choice (in this case, MCAS). document.getElementById(cityName).style.display = "block"; Click Save in the lower-right corner of the page to save the Correlate events to user using rule table. reported by Microsoft Defender to IoT Endpoint. Invest better with The Motley Fool. Client Destination IP Addresses: Use this filter to limit the logs to specific client destination IP addresses. Log in to the ZIA Admin Portal using your admin account. So, I do believe that in spite of all that noise and thought that comes from out there, our engagement, our differentiation, the way we are executing in the market, the way we are innovating, and now the new area of AI-ML where we have a unique advantage of better data, better private logs, with structured and unstructured data, we will do better than any of the vendors out there. Documentation to setup ZScaler has the following directions: "SIEM IP Address and SIEM TCP Port: Enter the IP address and port of the SpanVA to which the logs a . We are No. Talk to you next quarter. Client Source Ports: Use this filter to limit the logs to specific client source ports. A large number of filters or complex filters, such as string search, might impact the performance of the NSS. To configure Windows Defender Firewall with Advanced Security to log dropped packets or successful connections, use the Windows Defender Firewall with Advanced Security node in the Group Policy Management MMC snap-in. Thank you. Awesome. You know, one of the things I mentioned, Sterling, is that, you know, not lost on us is that this is a huge market opportunity. Having said that, to give you more clarity related to fiscal '24, you know, the current Street consensus is about 15.5% operating profitability. Blocked transactions have detailed logs and produce a log for every blocked session. Our NPS score sits north of 80. For aggregated sessions, this is the server destination IP address of the last session in the aggregate. Calculated by average return of all stock recommendations since inception of the Stock Advisor service in February of 2002. No longer annual numbers are good enough. I appreciate the commentary regarding the year-over-year mix of RAMP deals in F3Q. They generally sit at the domain-level stuff. You can remove all items from the list (Remove All) or only items from a specific page (Remove Page). These are not firewall logs that cannot often see SSL traffic. For each feed, you can configure multiple types of filters. The Motley Fool has positions in and recommends Zscaler. // Show the current tab, and add an "active" class to the button that opened the tab This will allow you to stream logs from Zscaler's logging clusters (called Nanolog) towards a SIEM or product of your choice (in this case, Sentinel). And that's helping us as well because customers are looking at vendors who will be around and who will be the leaders in this area. Operating margin of 15.3% increased approximately 600 basis points year over year. Network Services: Use this filter to limit the logs to specific network services associated with the session or aggregated sessions. for (i = 0; i < tablinks.length; i++) { Zscaler also supports forwarding this log to your on-premises or cloud SIEM in near-real time using NSS, enabling real-time alerting, correlation with the logs of your firewall and other devices, and long-term local log archival. But overall, a bigger bundle to eliminate a bunch of point products is the trend we are seeing. [CDATA[*/*/function openCity(evt, cityName) { Microsoft Sentinel provides the following out-of-the-box parsers: More info about Internet Explorer and Microsoft Edge, Deep Dive Webinar on Microsoft Sentinel Normalizing Parsers and Normalized Content, Advanced Security Information Model (ASIM) overview, Advanced Security Information Model (ASIM) schemas, Advanced Security Information Model (ASIM) content, Exchange Administrative events collected using the Office 365 connector (in the, Windows Event 1102 collected using the Log Analytics agent Security Events connector or the Azure monitor agent Security Events and WEF connectors (using the. The Docker Container must be run from a system that is separate from the NSS log server. I invite you to join us. We are currently managing the emerging products for time to market and growth, not optimizing them for gross margins. Event name Low-level category And someone who does CDN and DNS should be a good CDN and DNS company. As we think about fiscal 4Q and fiscal '24, it sounds like you're broadly being pretty conservative around close rates. And our next question comes from the line of Andrew Nowinski from Wells Fargo. So, very happy to see the performance of both. John DiFucci -- Guggenheim Partners -- Analyst. In addition, in select instances, we enabled new strategic customers to ramp into larger subscription commitments. You know, it's all the things I mentioned and your comments. If you select one of these two options, a confirmation window will appear. You can remove all items from the list (Remove All) or only items from a specific page (Remove Page). In my conversation with hundreds of IT executives, cybersecurity remains their No. To take our customer-centric innovation to the next level, we welcomed Syam Nair as our new CTO, who will lead our R&D teams. Click Disabled to activate it at a later time. A cabinet-level agency purchased ZIA and ZPA for 110,000 users to cover all of its sub-agencies. We're seeing deals getting larger as customers are trying to consolidate more and accelerate their security transformation around our Zero Trust Exchange. We are entering Q4 with a record pipeline, and our customer engagements remain strong. Click Add Condition > Add New Correlation Rule to add a correlation rule. Server IP Categories: URL category that corresponds to the server IP address. This is not a metric we try to optimize quarter to quarter, which could lead to variability on a quarterly basis. Income taxes of $6 million. book Article ID: 266573 . admin.zscaler.com admin.zscalerone.net admin.zscalertwo.net admin.zscalerthree.net admin.zscalerbeta.net admin.zscloud.net Zscaler Private Access. One moment for our next question. Thank you. Basic Firewall with no Z-LOGFEED I think you see: Unified policy (5 tuple by location) Single console (dashboard) One set of logs (blocked sessions) Basic Firewall with Z-LOGFEED Sessions are aggregated by the following variables { user, rule, network service,network application, IP category}. Outbound Bytes: Use this filter to limit the logs based on the number of bytes received by the server. DNAT Policy Action: Use this filter to limit the logs to traffic on which the service performed destination NAT and redirected traffic to specific IP addresses and optionally, ports. For aggregated sessions, this indicates the average session duration. Feed Output Format: These are the fields that will be displayed in the output. Yeah. First off, just wanted to congratulate you all on the great results in what's been a tough environment. We also partner with many tech leaders to deliver easy, jointly integrated solutions for customers, which increases our business value and creates go-to-market leverage for us. Again, congrats on the very strong results. It's an architectural change. Zscaler named a Leader in the 2023 Gartner Magic Quadrant for Security Service Edge. If the internal IP address is not available, the value will be the same as the client IP address. You can try to pivot, but that competency you build and create over years and years is very hard. In an exciting upsell win, a fast-growing global bank in APJ upgraded to Zscaler for Users bundle for 150,000 users after deploying ZIA last year. Improve connectivity and availability by securely directing trac using local internet breakout without backhauling via VPNs and without duplicating the security appliance stack at each location. Zscaler, as a standalone cloud proxy, monitors your organization's traffic enabling you to set policies for blocking transactions. We are providing increased guidance for the full year, which we believe balances our business optimism and macroeconomic uncertainties. First of all, AI is being kind of used in some of the current products to do better threat protection, better data protection, and the like. We are ensuring that customers are realizing the value more and more. You know, our mix this year, we're expecting 40-60, you know, new versus upsell.