diff --git a/docs/integrations/security-threat-detection/zscaler-internet-access.md b/docs/integrations/security-threat-detection/zscaler-internet-access.md index d8cee34912..2a7cbb4b39 100644 --- a/docs/integrations/security-threat-detection/zscaler-internet-access.md +++ b/docs/integrations/security-threat-detection/zscaler-internet-access.md @@ -118,7 +118,7 @@ To send logs to Sumo Logic using Cloud NSS, add a feed in ZIA using the followin 1. **Log Type**. Select **Web Log**. 1. **Feed Output Type**. Select **JSON**. 1. **JSON Array Notation**. Disable so that logs ingest as individual JSON objects instead of a JSON array. - 1. **Feed Escape Character**. Leave this field blank for Web, Firewall, and Tunnel. Set as **,\"** for DNS. + 1. **Feed Escape Character**. Add `,\"` as the character under the Feed Name **Zscaler Web**. 1. **Feed Output Format**. The JSON format is displayed. (Leave the default setting.) 1. **Timezone**. Set to GMT by default. 1. **Web Log Filters**. Choose filters you would like to have. @@ -149,7 +149,7 @@ If you are not able to use Zscaler Cloud NSS, you can collect logs for the ZIA a 1. **NSS Type**. NSS for Web is the default. 1. **Status**. Select Enabled. 1. **SIEM TCP Port**. Enter the Sumo Logic Syslog Source TCP port number. - 1. **Feed Escape Character**. Leave this field blank for Web, Firewall, and Tunnel. Set as **,\"** for DNS. + 1. **Feed Escape Character**. Leave this field blank for Web, Firewall, and Tunnel. Set as `,\"` for DNS. 1. **Feed Output Format**. Select Custom and paste the following: * Web Logs ```