The Zero Trust Secure Access agent for Windows automatically configures a URL bypass
list. The
list varies depending on whether your authentication method is module- or browser-based.
The
table below lists the URLs that are allowed to bypass the firewall for each method.
NoteIf no proxy or service gateway is set in the TrendAI Vision One™ console, traffic goes directly to the internet. If configured, traffic follows PAC
file rules to the specified proxy.
|
|
Authorization type
|
URLs automatically bypassed
|
|
Module-based
|
|
|
Browser-based
|
|
