Application Bypass List
Last updated
Last updated
At dope.security we always put customer experience first. That’s why we have created a list of applications that we know will break when proxied. The applications in our default bypass list will automatically be bypassed in all of your policies. You can review the list by selecting the default tab in the Application Bypass section.
If there is any application in the list that you do not want to include in the bypass list then select the dropdown from the traffic column and select “Do Not Bypass.”
There maybe other URLs that you discover that you want to bypass. These can be added to your own custom bypass list.
The final step to complete the addition of the application is to save the policy.
If you enter .exe
or .msi
as an extension the console will automatically assign this to be a windows process. All other processes will be assigned to macOS.
By adding an application name to the list it will bypass all applications with this name. You can add the path to a specific application that you want to bypass e.g. usr/bin/example_app
.
Each policy can have its own list of allowed applications. The Base Policy bypass list is the default for any other policy created but dope.swg lets you change this and add acceptable apps to suit your requirements.
You cannot use wild cards on the Application Bypass List.
You can see in the policy view which apps are macOS and which are windows.
You can delete any application from this list whenever you want. Simply select the application you want to delete and from the right hand panel select the Delete option.
After you have deleted the application the policy will need to be saved.
To add a App Bypass, select the custom tab and start typing in the “Assign a new application...” field or select the Add App Bypass button on the right hand panel. Now simply enter the Application that you need to bypass and select enter or tab.