Created
January 10, 2025 11:03
-
-
Save emilwojcik93/6c2c3b26eaf46042645d90784fd1b907 to your computer and use it in GitHub Desktop.
This PowerShell script verifies Zscaler status by checking installation, required services, registry entries, and authentication via HTTP requests. It ensures Zscaler is operational and authenticated. For more details, visit Zscaler documentation and community links.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
.SYNOPSIS | |
This PowerShell script verifies the status of Zscaler by checking if it is installed, if the required services are running, if the necessary registry entries exist and have the correct values, and by making HTTP requests to verify Zscaler authentication. | |
.DESCRIPTION | |
The Test-ZscalerStatus function performs the following checks: | |
- If Zscaler is installed by querying the registry. | |
- If the required Zscaler services are installed and running. | |
- If the necessary registry entries exist and have the correct values. | |
- Makes HTTP requests to ip.zscaler.com to verify Zscaler authentication. | |
.PARAMETER Verbose | |
Switch to provide detailed output. | |
.EXAMPLE | |
Test-ZscalerStatus -Verbose | |
This command verifies the status of Zscaler and provides detailed output. | |
.INPUTS | |
None | |
.OUTPUTS | |
System.Boolean | |
.LINK | |
https://help.zscaler.com/zscaler-client-connector/zscaler-app-registry-keys | |
.LINK | |
https://help.zscaler.com/client-connector/what-is-zscaler-client-connector | |
.LINK | |
https://community.zscaler.com/s/question/0D54u00009evlSdCAI/detect-when-zpa-is-connected-using-powershell-and-wmi | |
.LINK | |
https://en.wikipedia.org/wiki/Zscaler | |
#> | |
# Arguments | |
param ( | |
[switch]$Verbose, | |
[switch]$Debug | |
) | |
# Variables | |
$regPath = "HKCU:\Software\Zscaler\App" | |
# Lists/Arrays | |
$regPaths = @( | |
"HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall", | |
"HKLM:\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall", | |
"HKCU:\Software\Microsoft\Windows\CurrentVersion\Uninstall" | |
) | |
$requiredServices = @("ZSAService", "ZSATunnel") | |
$optionalServices = @("ZSATrayManager", "ZSAUpm") | |
$znwStateDescriptions = @{ | |
"TRUSTED_VPN" = "Connected to a trusted full tunnel VPN." | |
"NON_TRUSTED" = "Connected to a non-trusted network." | |
"TRUSTED" = "Connected to a trusted network." | |
} | |
$zpaStateDescriptions = @{ | |
"OFF" = "Service is turned off." | |
"ON" = "Service is turned on." | |
"CONNECTING" = "Service is connecting." | |
"NONE_FORWARDING" = "Traffic interception is turned off." | |
"TUNNEL_FORWARDING" = "Network drivers are intercepting traffic." | |
"LOCAL_PROXY_FORWARDING" = "PAC files are intercepting traffic." | |
"ENFORCE_PROXY_FORWARDING" = "A PAC file is enforced on the system." | |
"ADAPTER_DOWN_ERROR" = "Adapter with a default route not found." | |
"SERVICE_DOWN_ERROR" = "One of the microservices is not operational." | |
"CAPTIVE_PORTAL_ERROR" = "Captive portal detected and open timeout expired." | |
"SERVER_DOWN_ERROR" = "Unable to reach ZIA or ZPA Public Service Edge." | |
"INTERNET_UNREACHABLE_ERROR" = "Network connected but ZPA can't resolve the broker name." | |
"FIREWALL_BLOCK_ERROR" = "Outbound/inbound connection to itself failed." | |
"SYSTEM_SOCKETS_EXHAUSTED_ERROR" = "System's limit for maximum sockets reached." | |
"DRIVER_ERROR" = "Unable to load the network driver." | |
"CAPTIVE_PORTAL_FAILOPEN" = "Captive portal detected, traffic interception stopped temporarily." | |
"PRE_ENROLMENT_PROXY_ENFORCEMENT" = "Network access blocked until user logs in." | |
"SERVER_AUTH_ERROR" = "Auth credentials not accepted by ZIA or ZPA Public Service Edge." | |
"SERVER_AUTH_TERMINATED_AT_UNKNOWN" = "Realm mismatch between ZIA/ZPA Public Service Edge and logged-in user." | |
"ZPA_UNTRUSTED_SERVER_CERT_ERROR" = "SSL exception while connecting to ZPA." | |
} | |
$zwsStateDescriptions = @{ | |
"OFF" = "Service is turned off." | |
"ON" = "Service is turned on." | |
"CONNECTING" = "Service is connecting." | |
"NONE_FORWARDING" = "Traffic interception is turned off." | |
"TUNNEL_FORWARDING" = "Network drivers are intercepting traffic." | |
"LOCAL_PROXY_FORWARDING" = "PAC files are intercepting traffic." | |
"ENFORCE_PROXY_FORWARDING" = "A PAC file is enforced on the system." | |
"ADAPTER_DOWN_ERROR" = "Adapter with a default route not found." | |
"SERVICE_DOWN_ERROR" = "One of the microservices is not operational." | |
"CAPTIVE_PORTAL_ERROR" = "Captive portal detected and open timeout expired." | |
"SERVER_DOWN_ERROR" = "Unable to reach ZIA or ZPA Public Service Edge." | |
"INTERNET_UNREACHABLE_ERROR" = "Network connected but ZPA can't resolve the broker name." | |
"FIREWALL_BLOCK_ERROR" = "Outbound/inbound connection to itself failed." | |
"SYSTEM_SOCKETS_EXHAUSTED_ERROR" = "System's limit for maximum sockets reached." | |
"DRIVER_ERROR" = "Unable to load the network driver." | |
"CAPTIVE_PORTAL_FAILOPEN" = "Captive portal detected, traffic interception stopped temporarily." | |
"PRE_ENROLMENT_PROXY_ENFORCEMENT" = "Network access blocked until user logs in." | |
"SERVER_AUTH_ERROR" = "Auth credentials not accepted by ZIA or ZPA Public Service Edge." | |
"SERVER_AUTH_TERMINATED_AT_UNKNOWN" = "Realm mismatch between ZIA/ZPA Public Service Edge and logged-in user." | |
"ZPA_UNTRUSTED_SERVER_CERT_ERROR" = "SSL exception while connecting to ZPA." | |
} | |
# Function to check if a registry key exists | |
function Test-RegistryKeyExists { | |
param ( | |
[string]$path | |
) | |
try { | |
Write-Verbose "Checking if registry key exists: $path" | |
$key = Get-Item -Path $path -ErrorAction Stop | |
Write-Verbose "Registry key exists: $path" | |
return $true | |
} catch { | |
Write-Warning "Registry key does not exist: $path" | |
return $false | |
} | |
} | |
# Function to check if a service is installed | |
function Test-ServiceExists { | |
param ( | |
[string]$serviceName | |
) | |
try { | |
Write-Verbose "Checking if service exists: $serviceName" | |
$service = Get-Service -Name $serviceName -ErrorAction SilentlyContinue | |
if ($service) { | |
Write-Output "Service exists: $serviceName" | |
return $true | |
} else { | |
Write-Warning "Service does not exist: $serviceName" | |
return $false | |
} | |
} catch { | |
Write-Error "Error checking service: $serviceName" | |
return $false | |
} | |
} | |
# Function to check if Zscaler is installed by querying the registry | |
function Test-ZscalerInstalled { | |
foreach ($regPath in $regPaths) { | |
Write-Verbose "Checking registry path: $regPath" | |
$subKeys = Get-ChildItem -Path $regPath -ErrorAction SilentlyContinue | |
foreach ($subKey in $subKeys) { | |
$displayName = (Get-ItemProperty -Path $subKey.PSPath -Name DisplayName -ErrorAction SilentlyContinue).DisplayName | |
if ($displayName -like "*Zscaler*") { | |
Write-Output "Zscaler is installed." | |
return $true | |
} | |
} | |
} | |
Write-Warning "Zscaler is not installed." | |
return $false | |
} | |
# Function to retrieve the value of a registry entry | |
function Get-RegistryValue { | |
param ( | |
[string]$path, | |
[string]$name | |
) | |
try { | |
Write-Verbose "Retrieving registry value: $path\$name" | |
$value = Get-ItemProperty -Path $path -Name $name -ErrorAction Stop | |
Write-Verbose "Retrieved registry value: $($value.$name)" | |
return $value.$name.Trim() | |
} catch { | |
Write-Warning "Registry value not found: $path\$name" | |
return "Not Found" | |
} | |
} | |
# Function to retrieve the description of a state from a hashtable | |
function Get-StateDescription { | |
param ( | |
[string]$state, | |
[hashtable]$stateDescriptions | |
) | |
Write-Verbose "Retrieving state description for: $state" | |
if ($stateDescriptions.ContainsKey($state)) { | |
Write-Output "State description found: $state = $($stateDescriptions[$state])" | |
return $stateDescriptions[$state] | |
} else { | |
Write-Warning "Unknown state: $state" | |
return "Unknown state." | |
} | |
} | |
# Function to get the status of a service | |
function Get-ServiceStatus { | |
param ( | |
[string]$serviceName | |
) | |
try { | |
Write-Verbose "Retrieving service status for: $serviceName" | |
$service = Get-Service -Name $serviceName -ErrorAction Stop | |
if ($service.Status -eq 'Running') { | |
Write-Output "Service status: $serviceName = Running" | |
return $true | |
} else { | |
Write-Warning "Service status: $serviceName = $($service.Status)" | |
return $false | |
} | |
} catch { | |
Write-Warning "Service not found: $serviceName" | |
return $false | |
} | |
} | |
# Function to check Zscaler authentication by making HTTP requests | |
function Test-ZscalerAuthentication { | |
$url = "https://ip.zscaler.com/" | |
$attempts = 5 | |
$interval = 10 | |
for ($i = 1; $i -le $attempts; $i++) { | |
try { | |
Write-Verbose "Attempt ${i}: Making HTTP request to $url" | |
$response = Invoke-WebRequest -Uri $url -UseBasicParsing -MaximumRedirection 30 -TimeoutSec 60 | |
if ($response.StatusCode -eq 200 -and ($response.Content -match "You are accessing the Internet via Zscaler Cloud" -or $response.Content -match "Your request is arriving at this server from the IP address")) { | |
Write-Verbose "Zscaler authentication successful." | |
return $true | |
} else { | |
Write-Warning "Zscaler authentication failed on attempt $i." | |
} | |
} catch { | |
Write-Warning "HTTP request failed on attempt $i." | |
} | |
Start-Sleep -Seconds ($interval * $i) | |
} | |
return $false | |
} | |
# Main function to verify the status of Zscaler | |
function Test-ZscalerStatus { | |
# Set VerbosePreference to ensure verbose messages are displayed | |
$originalVerbosePreference = $VerbosePreference | |
if ($Verbose) { | |
$VerbosePreference = 'Continue' | |
} | |
# Check if Zscaler is installed by querying the registry | |
$zscalerInstalled = Test-ZscalerInstalled | |
# Check if any Zscaler services are installed | |
$servicesInstalled = $false | |
foreach ($serviceName in $requiredServices + $optionalServices) { | |
if (Test-ServiceExists -serviceName $serviceName) { | |
$servicesInstalled = $true | |
break | |
} | |
} | |
# Check required services | |
$allServicesRunning = $true | |
$serviceStatuses = @() | |
foreach ($serviceName in $requiredServices) { | |
$status = Get-ServiceStatus -serviceName $serviceName | |
$serviceStatuses += "${serviceName}: $status" | |
Write-Verbose "Service status: $serviceName = $status" | |
if ($status -notcontains "Running") { | |
$allServicesRunning = $false | |
} | |
} | |
# Check registry entries | |
$znwState = (Get-RegistryValue -path $regPath -name "ZNW_State").Trim() | |
$znwStateDescription = Get-StateDescription -state $znwState -stateDescriptions $znwStateDescriptions | |
$zpaState = (Get-RegistryValue -path $regPath -name "ZPA_State").Trim() | |
$zpaStateDescription = Get-StateDescription -state $zpaState -stateDescriptions $zpaStateDescriptions | |
$zwsState = (Get-RegistryValue -path $regPath -name "ZWS_State").Trim() | |
$zwsStateDescription = Get-StateDescription -state $zwsState -stateDescriptions $zwsStateDescriptions | |
$zpaAuthState = (Get-RegistryValue -path $regPath -name "ZPAAuth_State").Trim() | |
if ($zpaAuthState -ne "AUTHENTICATED") { | |
Write-Warning "ZPAAuth_State is not AUTHENTICATED or does not exist. Zscaler is not authenticated." | |
return $false | |
} | |
$zpaStateValid = $zpaState -eq "TUNNEL_FORWARDING" | |
$zwsStateValid = $zwsState -eq "TUNNEL_FORWARDING" | |
# Determine overall status | |
$isZscalerOperational = $zpaStateValid -and $zwsStateValid -and $allServicesRunning | |
# Check Zscaler authentication | |
#$zscalerAuthenticated = Test-ZscalerAuthentication | |
# Log detailed status messages | |
Write-Verbose "ZNW_State (Zscaler Network State): $znwState - $znwStateDescription" | |
Write-Verbose "ZPA_State (Zscaler Private Access State): $zpaState - $zpaStateDescription" | |
Write-Verbose "ZWS_State (Zscaler Internet Access State): $zwsState - $zwsStateDescription" | |
Write-Verbose "Services:" | |
foreach ($serviceStatus in $serviceStatuses) { | |
Write-Verbose $serviceStatus | |
} | |
foreach ($serviceName in $optionalServices) { | |
$status = Get-ServiceStatus -serviceName $serviceName | |
Write-Verbose "${serviceName}: $status" | |
} | |
if ($zscalerInstalled) { | |
Write-Verbose "Zscaler is installed." | |
} else { | |
Write-Warning "Zscaler is not installed." | |
} | |
if ($servicesInstalled) { | |
Write-Verbose "Zscaler services are installed." | |
} else { | |
Write-Warning "Zscaler services are not installed." | |
} | |
if ($allServicesRunning) { | |
Write-Verbose "Zscaler required services are running." | |
} else { | |
Write-Warning "Zscaler required services are not fully running." | |
} | |
if ($zpaStateValid -and $zwsStateValid -and $allServicesRunning) { | |
Write-Verbose "Zscaler is authenticated and forwarding traffic." | |
} else { | |
Write-Warning " zsaStateValid: $zpaStateValid zwsStateValid: $zwsStateValid allServicesRunning: $allServicesRunning" | |
Write-Warning "Zscaler is not authenticated or not forwarding traffic." | |
} | |
Write-Verbose "Overall Zscaler status: $isZscalerOperational" | |
# Restore original verbose preference | |
$VerbosePreference = $originalVerbosePreference | |
#return $isZscalerOperational -and $zscalerAuthenticated | |
return $isZscalerOperational | |
} | |
# Run the Test-ZscalerStatus function | |
Test-ZscalerStatus |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Test-ZscalerStatus.ps1
This PowerShell script verifies the operational status of Zscaler by checking its installation, required services, registry entries, and authentication via HTTP requests. It ensures Zscaler is installed, services are running, registry entries are correct, and authentication is successful.
Usage
Options
-Verbose
: Enables verbose logging for detailed output.Running the Script from the Internet:
Use
Invoke-RestMethod
to download and execute the script. Here is how you can do it:Short URL
Note
If it doesn't work, then try to Set-ExecutionPolicy via PowerShell (Admin)
Note
To execute the script from the Internet with additional parameters, please run
Example of execution
Links