I am having an URL automatedirstrprdweu.blob.core.windows.net which is already bypassed from Authentication under Custom URL Category.
Now I am adding this to SSL Bypass with Do not Inspect (Bypass other policies).
In this case, will authentication bypass works or not? .Or should I create SSL Bypass rule with Inspect Other policies.
I usually do it quite similar, basically with Custom URL categories named like
I usually use “Inspect other policies” even this is most likely reduced to “URL Category / IP blacklisting” since Zscaler will not longer be able to do inline inspections.
I never had issues with that. Keep in mind, that you will see a “special user”, like noauth-bypassurl$ or noauth-protocol$ in the log. I would have to test which user is selected in this case.
For this URL/use case I guess that “Bypass other policies” is suitable as you most likely have no URL policies that prevent certain users (eg. base on Location/sub location/special user) to access this URL and you also trust this URL, so you would not care about APT-Module to block this IP.