Skip to main content
Skyhigh Security

Configure the Bypass List (Trellix ePO)

You can configure domain names, network addresses, network ports, and process names in the bypass list. You can view the lists of items added to the bypass list and add, edit, or remove items from the lists as you need.

Before you begin
You must be logged on to the Trellix ePO server as an administrator.

  1. From the Trellix ePO menu, select Policy > Policy Catalog > Skyhigh Security Client Proxy.
  2. Click MCP Policy to view the policy list.
  3. Click Edit on the same row as the policy you want to configure.
  4. Under Client Proxy Settings, click Bypass List.
  5. In the Bypass List pane, select a category:
    • Domain name — Enter the domain name and click Add. The web traffic sent to the domains in this list bypasses the proxy server.
      Example: google.com
    • Network Address (IP) — Enter the network IP address and click Add. The web traffic sent to the IP addresses in this list bypasses the proxy server. Addresses can be configured individually, as a range, using a subnet or CIDR.
      • Examples include:
      • 192.168.1.1
      • 172.31.255.10–172.31.255.20
      • 10.50.0.0/255.255.128.0
      • 10.50.0.0/17
    • Network Port — Enter the port number, its description, and click Add. The web traffic sent to the ports in this list bypasses the proxy server. Examples: 40, 80, 400–500
    • Process List — Enter the process name and click Add. The web traffic coming from the processes in this list bypasses the proxy server. A process runs on the endpoints. Windows process names must end with .exe. macOS process names don't require a file name extension. Add Skyhigh Security and other trusted processes to this list.
  6. Click Save.
  7.  Optionally, click Duplicate to duplicate a policy.

 

  • Was this article helpful?