The logs spill everything. Every request, every header, every byte. And sometimes, they expose what should remain private: email addresses.
When using Zscaler, logs can flow into SIEMs, monitoring tools, or shared storage. If those logs contain raw email addresses, you risk compliance violations, data leaks, and unnecessary exposure. Masking