Tracecat

Zscaler MCP server

Drive ZIA, ZPA, ZDX, and Zscaler Identity from your AI agents with a single OneAPI credential.

Network
stdio
Official docs

About

Connect Tracecat to Zscaler to drive the full SASE stack for SOC analysts and network engineers running risky user investigations and Zero Trust response. You can pivot from a user's device health in ZDX to the application segment they were trying to reach in ZPA with one OneAPI credential. From there, audit ZIA URL category blocks, review ZPA segments, and triage EASM exposures with write tools gated behind explicit approval before they execute against your production tenant.

Setup

  1. 1

    Sign in with OAuth

    You'll authorize Tracecat to access Zscaler on your behalf. No API keys to manage.

  2. 2

    Select the Zscaler tile in the Tracecat MCP catalog

    Open the MCP catalog in your workspace, select the Zscaler tile, and complete the OAuth flow.

  3. 3

    Enable Zscaler in your agent

    In your ai.agent action or Agents tools tab, select Zscaler from the MCP integrations dropdown.

Tools

zia_list_rule_labelsList labels attached to ZIA firewall and URL filtering rules.
zpa_list_application_segmentsList ZPA application segments with their connector groups and segment groups.
zpa_create_application_segmentCreate a new ZPA application segment to publish an internal app.
zpa_delete_application_segmentRemove a ZPA application segment as part of decommissioning.
zia_create_rule_labelCreate a ZIA rule label for tagging firewall and URL filtering rules.
zdx_list_devicesList devices monitored by Zscaler Digital Experience with health scores.
zidentity_list_usersList users provisioned in ZIdentity with their group and role assignments.
easm_list_assetsList external attack surface assets discovered by Zscaler EASM.

Deploy the Zscaler MCP server in minutes

Connect your security agents to 50+ hosted MCP servers.

Self-host free