Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Bypass

When the default client policy is applied to a web request, the Bypass rule set processes the request initially. When the bypass ruleset is matched for a given traffic, all further rule processing stops only if there is a rule (Custom or Preset) that matches the incoming intercepted traffic.

To bypass a client-server:

  1. Navigate to Policy > Skyhigh Client > Policy.
  2.  Under the policy, select Bypass ruleset.
    The Bypass rules appear.

    clipboard_e44b4ae23a62c1317fe27969c2513294f.png
  3. In the Preset Rules section, configure the required Bypass rules.
    The following are the rules and their function:
    • Bypass Domains. Traffic to domains in this list is sent directly to the destination without being intercepted by Skyhigh Client.
    • Bypass Destination IPs. Traffic to IP addresses in this list is sent directly to the destination without being intercepted by Skyhigh Client.
    • Bypass Ports. Traffic to ports in this list is sent directly to the destination without being intercepted by Skyhigh Client.
    • Bypass Processes. Traffic from processes in this list is sent directly to the destination without being intercepted by Skyhigh Client.
    • Bypass All Local Traffic. Traffic from local subnets is sent directly without being intercepted by Skyhigh Client.
    • Bypass Windows Core Generated Traffic. The Skyhigh Client bypasses traffic from OS Core components.
    • Bypass Traffic When Client is On-Premises or Connected via VPN. The Skyhigh Client bypasses traffic from endpoints when connected to the corporate network directly or via vpn. 
    • Bypass All Non-Private Application Traffic. All the internet-bound traffic is bypassed and sent directly to the actual destination without being intercepted by Skyhigh Client.
    • Bypass All Private Application Traffic When Client is On-Premises or Connected via VPN. The Skyhigh Client bypasses all private access traffic from endpoints when connected to the corporate network directly or via vpn 

TIP: Configure criteria to limit the scope of this ruleset.

  • Was this article helpful?