In the Web Security Service SSL policy editor, Symantec maintains a list of applications in the SSL Bypass List and Mobile App Bypass list that are known to break when their traffic is intercepted, due to certificate pinning. The list is continually being updated; however, traffic for additional applications and domains that are not included in the list might break. For these applications and domains, Symantec recommends using the policy editor to exempt them from SSL interception.
For more information on Symantec Web Security Service, see the Web Security Service Solutions Dashboard.
The following table lists the applications that are in the SSL Bypass List by default:
Application | URL |
---|---|
Apple iTunes |
|
DropBox |
|
Microsoft Downloads |
|
Mozilla |
|
Mozilla Messaging |
|
Office 365 Exchange Online
Note: If a rule exists in CASB or Elastica domains for an Office 365 Exchange URL, this exepmtion is ignored and traffic for this application is intercepted.
|
|
Skype for Business |
|
ThreatPulse |
|
TomTom |
|
Webex |
|
Windows Support |
|
The following table lists the applications that are in the Mobile App Bypass list by default:
Application |
URL |
---|---|
Adobe Photoshop Express |
|
AirBnB |
|
Amazon Alexa |
|
Apple App Store |
|
Apple iTunes |
|
Chase |
|
DropBox |
|
Facebook Messanger |
|
Google Drive |
|
Google Hangouts |
|
Join.me |
|
Lynda.com |
|
Microsoft Excel Mobile |
|
Microsoft Office Lens |
|
Microsoft OneNote |
|
Microsoft Powerpoint |
|
Microsoft Word |
|
Overwatch |
|
PayPal |
|
SoundCloud |
|
Southwest Mobile App |
|
Starcraft |
|
|
|
Vimeo |
|
Windows Apps |
|
Subscribing will provide email updates when this Article is updated. Login is required.
This will clear the history and restart the chat.
Thanks for your feedback. Let us know if you have additional comments below. (requires login)