LogoLogo
  • Introducing dope.swg
    • Changing the Rules...
    • Quick Start Guide
      • Create a dope.swg Account
      • Get Started with the dope.endpoint
      • Import User and Group Data
      • Create a dope.swg Web Policy
    • Mitre ATT&CK and Nist CSF
  • dope.console
    • Analytics
      • Overview dashboard
      • Policy View
      • Productivity
      • Shadow IT
      • Detail View
    • dope.swg Policy
      • Editing the Base Policy
      • Adding Policy Exceptions
      • Assigning a Block Page
      • Creating Custom Categories
      • URL Bypass List
      • Application Bypass List
      • Default Bypass List
      • Cloud Application Control (CAC)
        • Microsoft O365
        • Google
        • Box
        • Salesforce
        • Dropbox
        • Slack
        • WebEx
      • Custom Policy
      • Policy Assignment
      • Policy Inheritance and Customization
    • CASB Neural
      • Microsoft 365 - Authentication
      • Google - Authentication
      • CASB DLP
        • DLP Files Table
    • Endpoint Manager View
      • Searching the View
      • Filtering and Sorting the Endpoint View
      • Endpoint Count
      • Running Diagnostics
      • Disable Endpoint
    • Settings
      • General
      • Block Pages
      • Endpoints
      • Users
        • Importing from Google
        • Why not SAML & SCIM?
      • Audit Log
      • SIEM Integration
        • Category & Verdict Mappings
      • API Client Credentials
      • Billing Details
    • Notifications
      • SSL Errors
  • dope.endpoint
    • Trusted Process Names
    • Generate Diagnostics
    • Disable Endpoint
    • Installing using MDM on Mac
      • Using JAMF
      • Using Kandji
      • Using Intune
    • Installing using Intune on Win
    • Mac Installer
      • Installation Process - Silent
      • Uninstall
      • Endpoint Authentication
    • Windows Installer
      • Installation Process - Silent
      • Uninstall
      • Endpoint Authentication
    • dope.endpoint UI
      • Windows UI
      • macOS UI
    • Automatic Updates
  • Release Notes
  • DOPE.APIs
    • Public API Specification
Powered by GitBook
On this page
  • The Application Bypass List is a list of apps that the dope.swg will not apply policy to. These are normally applications that break when proxied. To do this, you just need to tell dope.swg which ones you want to allow.
  • Default Application Bypass List
  • Add a URL to the Custom Bypass List
  • Delete Application
  1. dope.console
  2. dope.swg Policy

Application Bypass List

PreviousURL Bypass ListNextDefault Bypass List

Last updated 1 year ago

The Application Bypass List is a list of apps that the dope.swg will not apply policy to. These are normally applications that break when proxied. To do this, you just need to tell dope.swg which ones you want to allow.

Default Application Bypass List

At dope.security we always put customer experience first. That’s why we have created a list of applications that we know will break when proxied. The applications in our default bypass list will automatically be bypassed in all of your policies. You can review the list by selecting the default tab in the Application Bypass section.

If there is any application in the list that you do not want to include in the bypass list then select the dropdown from the traffic column and select “Do Not Bypass.”

Add a URL to the Custom Bypass List

There maybe other URLs that you discover that you want to bypass. These can be added to your own custom bypass list.

The final step to complete the addition of the application is to save the policy.

If you enter .exe or .msi as an extension the console will automatically assign this to be a windows process. All other processes will be assigned to macOS.

By adding an application name to the list it will bypass all applications with this name. You can add the path to a specific application that you want to bypass e.g. usr/bin/example_app.

Each policy can have its own list of allowed applications. The Base Policy bypass list is the default for any other policy created but dope.swg lets you change this and add acceptable apps to suit your requirements.

You cannot use wild cards on the Application Bypass List.

You can see in the policy view which apps are macOS and which are windows.

Delete Application

You can delete any application from this list whenever you want. Simply select the application you want to delete and from the right hand panel select the Delete option.

After you have deleted the application the policy will need to be saved.

To add a App Bypass, select the custom tab and start typing in the “Assign a new application...” field or select the Add App Bypass button on the right hand panel. Now simply enter the Application that you need to bypass and select enter or tab.

Default Application Bypass List
Do Not Bypass
Add Application to the Custom Bypass List
Save Button