There are multiple ways to implement the integration between the Zeropoint Scope managed attribution solution and your environment including:
Regardless of which method for integration that was selected, the public IP address(es) from which traffic is received by Zeropoint’s cloud infrastructure must be communicated to the technical point-of-contact at Zeropoint Security Corp via ops [at] zeropointsecurity.com. Once the public IP address has been communicated and confirmed, it will be added to an allow list granting access to traffic arriving from that IP address.
The Scope managed attribution network will forward HTTP/HTTPS traffic sent to a Scope load-balancer through a pool of egress nodes distributed across geographic locations and infrastructure providers as determined by the Proxy Auto Configuration (PAC) file used to configure it. DNS requests are sent thru the Scope service and resolved by egress nodes.
It will not prevent adversaries from determining the source of this traffic if clients misconfigure their endpoints and environment. Scope can only obfuscate traffic that gets forwarded to it. Zeropoint cannot stop you from shooting yourself in the foot.
Zeropoint also provides no obfuscation on the endpoint. Clients are responsible for mitigating against disclosure of their identity by any means beyond the source IP address in HTTP/HTTPS traffic. Examples include but are not limited to:
Clients should consider blocking outbound traffic from leaving their environment destined for anywhere other than the Scope loadbalancer / domain to avoid leakages of their real public IP.
One or more URLs will be provided to Scope clients to access Proxy Auto Configuration (PAC) files which can be used to configure the integration of Scope in the endpoint or forwarding proxy. The specific file used can change:
The public IP address of your endpoints / environment can be determined by opening a browser in the and navigating to one of the following websites:
Brief instructions are available below for configuring the Scope integration on various operating systems. These instructions are subject to change with OS menus. Consult the documentation of your OS if the instructions do not match.








The integration between your endpoint and Scope can also be configured directly in certain browsers (i.e. Firefox). Certain browsers do not provide the ability to configure a proxy, but instead, respect the proxy settings of the OS as configured above (i.e. Chrome, Edge).


Alternatively, a Scope client could configure a proxy at the OS or browser level to point at a local proxy server (i.e. Squid proxy) which would be configured to forward traffic to a parent proxy over TLS. Multiple instances could be deployed that are configured to use different PAC files or ports on the same host allowing the client to select which profile of settings it wants to use.
Documentation on configuring a parent proxy using Squid can be found here: Squid Docs
This should be deployed, configured, and maintained by an IT professional.