Introduction
The Isolation Bypass feature in the Silo for Safe Access Platform allows administrators to specify certain websites that should be accessed directly through the user's local browser, rather than being isolated within Silo. This configuration can be crucial for situations where a specific site needs to interact with local browser settings or plugins that are not available within the Silo environment.
System Requirements
Silo Admin Permissions
Notes:
- Only Use the "Bypass List' functionality:
- The "Isolation Bypass" policy has two configurations: the "Bypass List" and the "Isolate List". Unless instructed by the Authentic8 Professional Services Team, only use the "Bypass List" section when configuring this policy.
- The "Isolation Bypass" policy has two configurations: the "Bypass List" and the "Isolate List". Unless instructed by the Authentic8 Professional Services Team, only use the "Bypass List" section when configuring this policy.
- Special Configuration:
- If neither list is populated, the system will automatically isolate the first domain visited during the session and bypass isolation for all other domains.
- If neither list is populated, the system will automatically isolate the first domain visited during the session and bypass isolation for all other domains.
Steps:
- Access the Admin Console:
- Begin by logging into the Silo Admin Console.
- Navigate to the "Policies" section.
- Locate the Isolation Bypass Settings:
- Within the Policies section, find and expand the "Browser Settings" drop-down.
- Edit the "Isolation Bypass" policy.
- Configure the Bypass List:
- Bypass List: Enter the domains that you want to bypass Silo's isolation. Any site listed here will be opened in the user's default browser rather than within Silo. This is useful for sites that need direct access to local browser resources.
- Bypass List: Enter the domains that you want to bypass Silo's isolation. Any site listed here will be opened in the user's default browser rather than within Silo. This is useful for sites that need direct access to local browser resources.
- Save Your Configuration:
- Once you’ve configured your lists, click the "Save" button to apply the changes. These settings will take effect immediately for all users within the specified organization.
Recommendation:
- Regularly review and update your Bypass lists to ensure they meet your organization's security and operational needs.
- Consider the security implications of bypassing isolation for specific domains, as this will expose users to the normal risks associated with browsing without isolation.
Additional Notes
Please contact Support if you have any additional questions and/or require further information.