Configuring exclusions in traffic processing rules

3 July 2024

ID 189214

Prior to creating exclusions for CONNECT requests, make sure that you have enabled decryption of TLS/SSL connections. Otherwise, encrypted connections will not be scanned by the Anti-Virus and Anti-Phishing modules. This could lead to infection of users' computers.

To configure exclusions for CONNECT requests in traffic processing rules:

  1. In the application web interface, select the Rules section.
  2. Select the Access tab.
  3. Select the rule for which you need to correctly display the block page or redirect the user.

    The View rule page opens.

  4. Click Edit.

    The Edit rule page opens.

  5. Select the Exclusions tab.
  6. Click + Add exclusion.
  7. If you want to add an exclusion only for users that satisfy the defined criteria, in the Initiator settings group click + Rule criteria and specify the necessary criteria.

    If criteria are not defined, the exclusion is applied to all users.

  8. In the Traffic filter settings group, click + Rule criteria.
  9. In the drop-down list that appears on the left, select HTTP Method.
  10. In the drop-down list on the right, select CONNECT.
  11. Click Save.

The exclusion is now configured. The application will not scan HTTP messages that contain the CONNECT method.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.