# Default Bypass List

For easier deployment of the dope.endpoint, dope.security have created default application and URL bypass lists to bypass traffic we know will impact your users if we apply policy to it.

<table><thead><tr><th>Product</th><th>Company</th><th>Windows Process(es)</th><th width="160.81640625">macOS Process(es)</th><th>Domain(s) / Wildcards</th></tr></thead><tbody><tr><td>Adobe Acrobat Reader</td><td>Adobe</td><td>CRWindowsClientService.exe; AdobeCollabSync.exe; AcroCEF.exe</td><td>RdrCEF Helper.app</td><td>*.acrobat.com; *.echosign.com; *.echocdn.com; *.bam.nr-data.net; *.newrelic.com</td></tr><tr><td>Adobe Updates</td><td>Adobe</td><td></td><td></td><td>*.adobe.com</td></tr><tr><td>Amazon Web Services (AWS)</td><td>Amazon</td><td></td><td></td><td>*.amazonaws.com; *.aws.amazon.com</td></tr><tr><td>AnyConnect (Cisco)</td><td>Cisco Systems</td><td>Vpnui.exe; Vpnclient.exe</td><td>Vpnui; Vpnclient; Vpnagentd; /opt/cisco/anyconnect/bin/vpnagentd; /opt/cisco/hostscan/bin64/ciscod; Cisco AnyConnect Secure Mobility Client.app; acumbrellaagent</td><td></td></tr><tr><td>AnyDesk</td><td>AnyDesk Software GmbH</td><td>AnyDesk.exe</td><td>AnyDesk</td><td>*.anydesk.com</td></tr><tr><td>Apple iMessage</td><td>Apple</td><td></td><td></td><td>*.icloud.com</td></tr><tr><td>Apple iTunes / App Store / Updates</td><td>Apple</td><td></td><td></td><td>*.apple.com; *.mzstatic.com; *.akadns.net; *.apple-cloudkit.com; updates.cdn-apple.com</td></tr><tr><td>Apple Configurator</td><td>Apple</td><td></td><td>Apple Configurator</td><td></td></tr><tr><td>Apple Mail App</td><td>Apple</td><td></td><td></td><td>*.me.com</td></tr><tr><td>Azure VPN Client</td><td>Microsoft</td><td>AzVpnAppx.exe</td><td>Azure VPN Client</td><td></td></tr><tr><td>Avira VPN</td><td>Avira (Gen Digital)</td><td>Avira.Spotlight.UI.Application.exe; Avira.Spotlight.Systray.Application.exe; Avira.Spotlight.Service.exe; Avira.OptimizerHost.exe; Avira.VpnService.exe; phantomvpn.exe</td><td></td><td>*.msftncsi.com</td></tr><tr><td>Bitdefender</td><td>Bitdefender</td><td>EPIntegrationService.exe</td><td></td><td></td></tr><tr><td>Bitly</td><td>Bitly</td><td></td><td></td><td>bit.ly</td></tr><tr><td>Burp Suite (Community)</td><td>PortSwigger</td><td></td><td>Burp Suite Community Edition.app</td><td></td></tr><tr><td>Cloudflare DNS</td><td>Cloudflare</td><td></td><td></td><td>cloudflare-dns.com</td></tr><tr><td>Code42 (CrashPlan)</td><td>Code42 Software</td><td>Code42Service.exe</td><td>Code42Service.app</td><td></td></tr><tr><td>CrowdStrike Falcon Agent</td><td>CrowdStrike</td><td></td><td>com.crowdstrike.falcon.Agent.systemextension</td><td></td></tr><tr><td>Cuttly (Cutt.ly)</td><td>Cuttly</td><td></td><td></td><td>cutt.ly</td></tr><tr><td>Dameware</td><td>SolarWinds (N‑able)</td><td>BASEClient.exe</td><td></td><td></td></tr><tr><td>DBeaver</td><td>DBeaver Corp.</td><td>dbeaver.exe</td><td>DBeaver.app</td><td></td></tr><tr><td>Docker Desktop</td><td>Docker, Inc.</td><td>docker.exe; docker desktop.exe</td><td>Docker Desktop; docker</td><td></td></tr><tr><td>Dropbox</td><td>Dropbox, Inc.</td><td>Dropbox.exe; DropboxUpdate.exe</td><td>Dropbox; DropboxMacUpdate.app</td><td></td></tr><tr><td>Evernote</td><td>Evernote</td><td></td><td></td><td>*.announce.evernote.com; *.cd1.evernote.com; *.evernote-a.akamaihd.net; www.evernote.com</td></tr><tr><td>Firefox (telemetry)</td><td>Mozilla</td><td></td><td></td><td>*.telemetry.mozilla.org</td></tr><tr><td>Fortinet Client VPN</td><td>Fortinet</td><td>FortiClientConsole.exe</td><td></td><td></td></tr><tr><td>GlobalProtect</td><td>Palo Alto Networks</td><td>pangpa.exe</td><td>GlobalProtect</td><td></td></tr><tr><td>Google Cloud Platform (IAP)</td><td>Google</td><td></td><td></td><td>*.tunnel.cloudproxy.app</td></tr><tr><td>Google – Shared Services / Drive</td><td>Google</td><td>GoogleDriveFS.exe</td><td>Google Drive</td><td>*.connectivitycheck.gstatic.com; *.dl-ssl.google.com; *.dl.google.com; *.m.google.com; *.safebrowsing-cache.google.com; *.safebrowsing.google.com; *.tools.google.com; *.pack.google.com</td></tr><tr><td>Google Hangouts (legacy)</td><td>Google</td><td></td><td></td><td>*.accounts.google.com; *.apis.google.com; *.googleapis.com; *.appspot.com; *.googleusercontent.com; *.video.google.com</td></tr><tr><td>Grammarly</td><td>Grammarly</td><td></td><td></td><td>*.grammarly.com</td></tr><tr><td>JetBrains Toolbox</td><td>JetBrains</td><td></td><td>JetBrains Toolbox.app</td><td></td></tr><tr><td>Join.me</td><td>GoTo (formerly LogMeIn)</td><td>join.me.exe</td><td>join.me</td><td></td></tr><tr><td>Insomnia REST Client</td><td>Kong Inc.</td><td></td><td>Insomnia.app; Insomnia Helper.app</td><td></td></tr><tr><td>Jamf</td><td>Jamf</td><td></td><td></td><td>*.jamf.com; *.jamfcloud.com</td></tr><tr><td>Kandji</td><td>Kandji, Inc.</td><td></td><td></td><td>*.kandji.io</td></tr><tr><td>Kubernetes CLI</td><td>CNCF</td><td>kubectl.exe</td><td>kubectl</td><td></td></tr><tr><td>LINE</td><td>LINE Corporation</td><td>LINE.exe</td><td>LINE</td><td></td></tr><tr><td>Microsoft Defender</td><td>Microsoft</td><td>Defender.exe; MsMpEng.exe; MpCmdRun.exe; MpDlpCmd.exe; ConfigSecurityPolicy.exe; NisSrv.exe; MsSense.exe; SenseCnCProxy.exe; SenseIR.exe; SenseCE.exe; SenseSampleUploader.exe; SenseNdr.exe; SenseSC.exe</td><td></td><td>*.dm.microsoft.com; *.wd.microsoft.com; winatp-gw-usmv.microsoft.com; winatp-gw-usmt.microsoft.com; winatp-gw-ukw.microsoft.com; winatp-gw-uks.microsoft.com; winatp-gw-weu.microsoft.com; winatp-gw-neu.microsoft.com; winatp-gw-cus.microsoft.com; winatp-gw-eus.microsoft.com; winatp-gw-usgv.microsoft.com; winatp-gw-usgt.microsoft.com; *.data.microsoft.com; *.core.windows.net; winatp-gw-eus3.microsoft.com; winatp-gw-cus3.microsoft.com; winatp-gw.microsoft.com; winatp-gw-weu3.microsoft.com; winatp-gw-neu3.microsoft.com; *.wdcp.microsoft.com; *.wdcpalt.microsoft.com; *.smartscreen-prod.microsoft.com; *.smartscreen.microsoft.com; *.checkappexec.microsoft.com; *.urs.microsoft.com; *.notify.windows.com; *.wns.windows.com; *.crl.microsoft.com; *.opsinsights.azure.com; *.azure-automation.net; *.officecdn-microsoft-com.akamaized.net; *.packages.microsoft.comt.com; winatp-gw-usgv.microsoft.com; winatp-gw-usgt.microsoft.com; *.data.microsoft.com; *.core.windows.net; winatp-gw-eus3.microsoft.com; winatp-gw-cus3.microsoft.com; winatp-gw.microsoft.com; winatp-gw-weu3.microsoft.com; winatp-gw-neu3.microsoft.com; *.wdcp.microsoft.com; *.wdcpalt.microsoft.com; *.smartscreen-prod.microsoft.com; *.smartscreen.microsoft.com; *.checkappexec.microsoft.com; *.urs.microsoft.com; *.notify.windows.com; *.wns.windows.com; *.crl.microsoft.com; *.opsinsights.azure.com; *.azure-automation.net; *.officecdn-microsoft-com.akamaized.net; *.packages.microsoft.com</td></tr><tr><td>Microsoft Entra</td><td>Microsoft</td><td></td><td></td><td>*.entra.microsoft.com</td></tr><tr><td>Microsoft Intune</td><td>Microsoft</td><td>intunemanagementextensionbridge.exe; companyportal.exe; Microsoft.Management.Services.IntuneWindowsAgent.exe</td><td></td><td>*.manage.microsoft.com; *.officeconfig.msocdn.com; *.config.office.com; *.graph.windows.net; *.enterpriseregistration.windows.net</td></tr><tr><td>Microsoft Store</td><td>Microsoft</td><td></td><td></td><td>*.delivery.mp.microsoft.com</td></tr><tr><td>Microsoft Windows Update</td><td>Microsoft</td><td></td><td></td><td>*.update.microsoft.com; *.download.microsoft.com; *.windowsupdate.com; *.windowsupdate.microsoft.com; *.ntservicepack.microsoft.com; *.wustat.windows.com; *.enterprise.activity.windows.com</td></tr><tr><td>Microsoft Teams Updater</td><td>Microsoft</td><td>msteamsupdate.exe</td><td></td><td></td></tr><tr><td>Microsoft Office docs (OneDrive/SharePoint)</td><td>Microsoft</td><td></td><td></td><td>*.docs.live.net; *.sharepoint.com</td></tr><tr><td>Microsoft Office (O365)</td><td>Microsoft</td><td></td><td></td><td>*.outlook.office365.com</td></tr><tr><td>Mimecast</td><td>Mimecast</td><td></td><td></td><td>*.mimecast.com</td></tr><tr><td>NPM registry</td><td>GitHub (npm, Inc.)</td><td></td><td></td><td>*.npmjs.org</td></tr><tr><td>Okta FastPass</td><td>Okta</td><td>OktaVerify.exe</td><td>Okta Verify.app</td><td></td></tr><tr><td>osquery (Vanta)</td><td>Vanta</td><td></td><td></td><td>*.osquery.vanta.com</td></tr><tr><td>PeopleGraph (Office add-in)</td><td>Microsoft</td><td></td><td></td><td>*.appsforoffice.microsoft.com</td></tr><tr><td>Perimeter 81 VPN</td><td>Check Point (Perimeter 81)</td><td>Perimeter81.Service.exe; Perimeter81.exe</td><td></td><td></td></tr><tr><td>Plex</td><td>Plex, Inc.</td><td>Plex.exe; Plex Media Server.exe</td><td>Plex.app</td><td></td></tr><tr><td>PS Remote Play</td><td>Sony Interactive Entertainment</td><td>RemotePlay.exe</td><td>PS Remote Play</td><td></td></tr><tr><td>PuTTY</td><td>Simon Tatham (PuTTY)</td><td>putty.exe; puTTYgen.exe</td><td></td><td></td></tr><tr><td>Python packaging</td><td>Python Software Foundation</td><td></td><td></td><td>*.pythonhosted.org; *.pypi.org; *.anaconda.org</td></tr><tr><td>Rapid7 Insight Agent</td><td>Rapid7</td><td></td><td>ir_agent; rapid7_endpoint_broker</td><td>*.rapid7.com</td></tr><tr><td>Ruby</td><td>Ruby community</td><td></td><td></td><td>rubygems.org; rubyonrails.org</td></tr><tr><td>Signal</td><td>Signal Messenger LLC</td><td>Signal.exe</td><td>Signal</td><td></td></tr><tr><td>Sniply</td><td>Sniply</td><td></td><td></td><td>sniply.io; .snip.ly</td></tr><tr><td>SolarWinds MSP (N‑able)</td><td>N‑able (formerly SolarWinds MSP)</td><td>BASupSrvc.exe</td><td></td><td></td></tr><tr><td>Sophos</td><td>Sophos</td><td>SophosUpdate.exe; SubmitTelem.exe</td><td></td><td></td></tr><tr><td>Tailscale</td><td>Tailscale</td><td>tailscaled.exe</td><td>io.tailscale.ipn.macsys.network-extension.systemextension</td><td></td></tr><tr><td>Tenable Nessus Agent</td><td>Tenable</td><td>nessus-agent-module.exe</td><td></td><td></td></tr><tr><td>Terraform</td><td>HashiCorp</td><td></td><td></td><td>releases.hashicorp.com</td></tr><tr><td>Thunderbird</td><td>Mozilla</td><td>thunderbird.exe</td><td>thunderbird</td><td></td></tr><tr><td>TinyURL</td><td>TinyURL</td><td></td><td></td><td>tinyurl.com</td></tr><tr><td>Touch VPN</td><td>Northghost</td><td></td><td></td><td>*.northghost.com</td></tr><tr><td>Trend Micro Apex One</td><td>Trend Micro</td><td>ATASAgent.exe; CETASvc.exe; CNTAoSMgr.exe; DSAgent.exe; ESClient.exe; ESEFrameworkHost.exe; ESEServiceShell.exe; EndpointBasecamp.exe; LogServer.exe; Ntrtscan.exe; NTRtScan.exe; PccNTMon.exe; ShowMsg.exe; TMBMSRV.exe; TMiACAgentSvc.exe; TmCCSF.exe; TmListen.exe; TmPfw.exe; TmSSClient.exe; TmWSCSvc.exe; TmsaInstance64.exe; WSCommunicator.exe; dsagent.exe; iVPAgent.exe</td><td></td><td></td></tr><tr><td>Twingate</td><td>Twingate</td><td>twingate.exe; twingate.service.exe; twingateupdater.exe</td><td>Twingate Tunnel Provider</td><td></td></tr><tr><td>Vizydrop</td><td>Vizydrop</td><td></td><td></td><td>reports.vizydrop.com</td></tr><tr><td>VMware Horizon</td><td>VMware (Broadcom)</td><td>vmware-view.exe; vmUpdateLauncher.exe; vmware-remotemks.exe; horizon_client_service.exe; ws_diag.exe; sdrclientworker.exe</td><td></td><td></td></tr><tr><td>Xerox</td><td>Xerox</td><td>XeroxPrintJobEventManagerLoader.exe; XeroxDeviceStatus.exe</td><td></td><td></td></tr><tr><td>Yarn (pkg manager)</td><td>Community (open source)</td><td></td><td>yarn</td><td>*.yarnpkg.com</td></tr><tr><td>Zoho</td><td>Zoho</td><td></td><td>dcondemand</td><td>*.zoho.com</td></tr><tr><td>Zoom</td><td>Zoom Video Communications</td><td>Zoom.exe</td><td>zoom.us</td><td>*.zoom.us</td></tr></tbody></table>
