
ITDR
Zscaler Identity Threat Detection & Response
Mitigate the risk of identity-based attacks with continuous visibility, risk monitoring, and threat detection
Protect users with continuous visibility into identity misconfigurations and risky permissions. Detect and stop identity-based attacks such as credential theft, multifactor authentication bypass, and privilege escalation.
Identity is the new attack surface
With the rapid adoption of zero trust, attackers are targeting users and identities as the point of entry and using this access to escalate privileges and move laterally.
Zscaler ITDR™ strengthens your zero trust posture by mitigating the risks of user compromise and privilege exploitation






What’s Inside
Set up in 5 mins, and get your first assessment in 30 mins

Set up an assessment from a domain-joined machine running Zscaler Client Connector
Turn on detectors for identity attacks on all endpoints
Remediate misconfigurations found in the identity assessment
Continue monitoring for new misconfigurations in real time
Comprehensive protection for identity, an increasingly exploitable attack vector

- Unified risk scoring for identity posture quantification and tracking
- A real-time view of top identity issues and the riskiest users/hosts
- MITRE ATT&CK mapping for visibility into security blindspots


- Identification of new vulnerabilities and misconfigurations as they emerge
- Real-time alerting for new risks introduced to your identity store
- Ready-made guidance, commands, and scripts for remediation


- Detection for attacks targeting your identity store
- Prevention of Kerberoast, DCSync, and LDAP enumeration attacks
- Built-in containment using zero trust access policy


Experience the power of the Zscaler Zero Trust Exchange
Cyberthreat Protection
Holistic approach to securing users, workloads, and devices
Data Protection
Full TLS/SSL inspection at scale for complete data protection across the SSE platform
Zero Trust Connectivity
Connect to apps, not networks, to prevent lateral movement with ZTNA
Digital Experience Management
Identify and resolve performance issues

Securely connects authorized users, devices, and workloads using business policies

Take the next step
Contact us today and receive a complimentary identity assessment report.
The Assessment report will include
1. Visibility into misconfigurations and vulnerabilities in your Active Directory that attackers exploit to escalate privileges and move laterally.
2. Remediation guidance, videos, commands, and scripts that your team can use to fix those misconfigurations and mitigate risk.
