Adding and importing sites that bypass the proxy

The Proxy Bypass tab of the Bypass Settings page enables you to define sites that bypass the cloud service for all policies. This may include, for example, internal sites that are not accessible from the Internet, so the cloud service cannot serve or analyze them.

A proxy bypass destination can be a domain name, an IP address, or a subnet.

  • Both the Proxy Connect and Direct Connect endpoint clients use the bypass definitions. In the case of the Neo or Direct Connect endpoint, destinations in the bypass list are not analyzed by the cloud service.
  • When a PAC file is used to direct traffic through the cloud proxy, configured destinations are added to the PAC file for your organization.

Recommended bypass destinations include organizational webmail sites, internal IP addresses, and system traffic such as Microsoft and antivirus updates. If remote browser isolation is configured, the provider IP address or domain name is automatically added as a bypass destination.

If your organization uses Microsoft Office 365, select the Office 365 box under Cloud Applications and click Save to bypass the cloud service for sites and URLs associated with Office 365.

Note:

The URLs included in the bypass list for Office 365 are those domains that are owned by Microsoft and used directly by the Office 365 application, listed here:

https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges

This list also includes third-party URLs that host Certificate Revocation Lists (CRLs), which are not included in the bypass when you select the Office 365 checkbox. Bypassing these domains may not be appropriate for all customers.

If you have difficulty installing or using Office 365 with this option selected, you may need to add one or more of these additional URLs as non-proxied domains. If you need further assistance, please contact Technical Support.

You can also configure policy-specific bypass destinations on the Connections tab of each policy. For more information, see Proxy bypass.