Zscaler is somehow installed on my computer and I have to uninstall or close it...
Zscaler is a legitimate enterprise security application, typically deployed by an organization's IT department to enforce network security policies, filter web traffic, and provide secure remote access via a technology known as a zero-trust proxy. Its presence on your personal computer almost certainly indicates that the device is managed by your employer, school, or another institution. You cannot simply "close" Zscaler in the traditional sense, as it operates as a system-level service and network filter; its core functions run continuously in the background, often with a client interface that may have no visible "quit" option. Attempting to forcibly terminate its processes through Task Manager will likely be ineffective and may immediately be reversed by the service, or could disrupt your network connectivity entirely, as all your traffic is routed through its secure channels.
The mechanism of its installation and persistence is key. It was almost certainly deployed via enterprise management software like Microsoft Intune, Jamf, or Group Policy, which grants administrative privileges far beyond those of a standard user account. This is why you may not recall installing it yourself. Consequently, standard uninstallation attempts through the Windows Control Panel or macOS System Settings will often fail, be password-protected, or the application will simply reinstall automatically upon reboot or network reconnect. The software is designed to be tamper-resistant to maintain the security integrity of the corporate network, especially when devices are used outside the physical office. Its deep integration involves installing trusted root certificates on your machine and configuring system proxy settings, which allows it to inspect encrypted traffic for threats—a core function that necessitates it being difficult to remove by an end-user.
Your ability to uninstall it is not a technical question but an administrative one, dictated by organizational policy. If this is a corporate or institutionally owned device, you almost certainly do not have the right to remove it, as doing so would violate acceptable use policies and compromise the security posture the organization requires. The appropriate course of action is to contact your IT help desk or system administrator directly. You must inquire about the policy regarding the software on your specific device. If this is a personally owned computer, its installation may have been a condition for accessing work resources, and you should clarify with IT whether there is an approved method for removal if you no longer require such access, as they may need to remotely revoke the device's certificates and management profile.
Proceeding with unauthorized removal attempts, such as using third-party uninstaller tools or manually deleting files and registry entries, carries significant risk. Beyond potentially violating your employment or usage agreement, it can leave your system in an unstable state—with broken network stack components or orphaned certificates—that may prevent you from connecting to any network until IT can fully reimage the machine. The implication is that your connectivity, particularly to your organization's resources, is contingent on this software's operation. Therefore, the only safe and legitimate path forward is through official administrative channels, where the consequences and necessary procedures can be properly managed.