Your entire Zscaler stack.
One Slack command.
Incident response, policy management, threat intelligence - all through
/zmate. Confirmed before anything executes. Audited where it happened.
It's 11 PM. A credential is compromised.
How long does containment actually take?
- 1Open ZPA admin portal, navigate to Access Policy
- 2Create a DENY rule - form, SAML attributes, users
- 3Drag rule to rank 1 in the reorder UI
- 4Switch tabs to ZIA - create per-user URL block rule
- 5Navigate to App Segments - disable each one individually
- 6Activate ZIA. Verify everything actually applied.
- 1Type
/zmate lockdown user@corp.io - 2Read the confirmation - see exactly what executes before it runs
- 3Type
/zmate confirm- ZPA + ZIA + segments in one shot
No new data processor
Zmate passes commands to your Zscaler environment via the official MCP server and returns results to Slack. Your tenant data never leaves your own infrastructure - no third-party storage, no data egress.
Confirm before every write
Every write operation requires an explicit /zmate confirm. The confirmation message shows exactly what will execute - rule names, IDs, scope - before a single API call is made.
Audit trail at zero cost
Every command, confirmation, and result lives in your Slack channel history. No separate SIEM integration or audit log pipeline needed. Compliance reviews start and end in the channel they happened.
Built for Zscaler Security Teams:
SOC Engineers, Admins, and CISOs.
Everything your Zscaler stack can do.
From the channel you're already in.
User lockdown & isolation
Full containment in one command — ZPA DENY at rank 1, ZIA per-user URL block, all app segments disabled. Or push to CBI browser isolation to keep them working under surveillance. Lockdown and unlock require an MFA code at confirm time — two-factor protection for your highest-impact actions.
/zmate lockdown · /zmate isolateFirewall, DNS & URL blocking
Cloud firewall rules with port-level scoping, DNS-layer domain blocking, and URL category rules - created and activated from Slack in seconds. Every write confirmed before it runs.
/zmate firewall · /zmate dns-blockZDX experience & deep traces
Real-time app scores, per-user experience breakdowns, AI root-cause analysis, and full deep trace results - DNS, TCP, TTFB, cloud path, device health - without opening a dashboard.
/zmate triage · /zmate analyzeThreat intelligence & ZEASM
Live cyber incidents, 7/14-day threat trends, external attack surface findings, and lookalike phishing domains - proactively posted to your alert channel before anyone has to ask.
/zmate findings · /zmate threat-trendsPolicy & infrastructure CRUD
Full lifecycle for ZPA segment groups and server groups. ZIA network objects - IP groups, rule labels, time intervals. PRA credentials and provisioning keys. All confirm-gated.
/zmate segment-group · /zmate rule-labelExecutive reporting
Full posture snapshots, shadow IT CASB reports, firewall posture by location, web traffic geography, and a configurable daily digest - no portal, no BI tool, no meeting.
/zmate report · /zmate shadow-it-reportThree steps to deploy Zmate. No new infrastructure.
Connect credentials
Provide your Zscaler API credentials and Slack bot tokens. Point Zmate at your tenant. One-time setup, under ten minutes.
Type a command
Use /zmate <command> in any channel. Read exactly what will change before anything executes.
Confirm to execute
Type /zmate confirm. The result and full audit trail live in Slack history - permanently.
Every Zscaler product. One interface.
9 product areas, 60+ commands. All confirmed before execution. All audited in Slack.
What Zscaler security engineers say about Zmate.
"We ran a tabletop drill - account flagged as compromised at 11 PM. Before Zmate, containment was a fifteen-minute portal fumble even with the runbook open. With Zmate it was one command, and another to confirm before it ran. That confidence - knowing exactly what would happen before it happened - is what made it usable under pressure."Sr. Security Engineer · DiGiForces
Common questions about Zmate
and Zscaler security automation.
/zmate slash commands. Security teams can execute incident response, policy management, and reporting directly from Slack. Every write operation goes through a confirm/cancel flow so nothing changes without explicit approval./zmate lockdown user@company.com in Slack. Zmate queues a full lockdown — a ZPA DENY rule at rank 1 scoped to the user's SAML email, disabling all ZPA app segments, and a ZIA URL filtering rule blocking all categories for that user only. Because lockdown is a high-impact action, it requires double confirmation: type /zmate confirm <6-digit code> where the code comes from your authenticator app (Google Authenticator, Authy, or 1Password). The whole flow takes under 30 seconds./zmate confirm — but for lockdown and unlock specifically, that confirm step also requires a 6-digit MFA code from the admin's authenticator app (Google Authenticator, Authy, or 1Password). This means executing a lockdown requires both access to the Slack workspace and physical possession of the admin's phone. Admins set this up once with /zmate mfa setup, which generates a secret and walks through the Fly secrets registration. Each admin has an independent secret — one admin's key never affects another's./zmate unlock user@company.com to reverse a lockdown. Zmate deletes the ZPA DENY rule, re-enables all ZPA app segments, and removes the ZIA URL filtering rule. If the bot has restarted since the lockdown, it falls back to a name-based search to find and remove the rules automatically.
Next time it's 11 PM
and a credential is compromised -
you'll be ready.
Three commands. Full audit trail. No portal tab opened.