Use the page to make changes to entries in the Exceptions list. Changes made on this page affect all machines (identified by IP address or range) that appear in the Selected
list.
Steps
-
Select an entry in the User identification drop-down list to indicate whether web protection software should attempt to identify users of these machines
transparently.
- Select Try to identify user transparently to request user information from a transparent identification agent or integration device.
- Select Ignore user information to avoid using any transparent method to identify users.
-
Indicate whether users should be prompted to provide logon credentials via the browser. This setting applies when user information is not available, either because transparent
identification failed, or because transparent identification was ignored.
-
Click OK to return to the User Identification page.
-
When you are finished updating the Exceptions list, click OK to cache your changes. Changes are not implemented until you click Save and
Deploy.