This guide explains in which case authentication exceptions are used and how they can be stored in the proxy.
Infoschaltfläche
What are authentication exceptions used for?
Authentication exceptions are often required in connection with virus scanners or other programs that do not support NTLM authentication. In order for these programs to be able to communicate with the Internet despite this, it must be defined in the proxy that the requested URL can be called without previous authentication.
Example
LOG entry
A computer in the internal network cannot load Windows updates.
The entry status="407", appears in the log under the heading Only display application and kernel messages
Exception for subdomains
To exclude a website from the authentication exceptions, the URL must be entered as a regex in the list. The default entries \.ikarus\.at and \.mailsecurity\.at are required for our solution Securepoint Antivirus Pro.
Further notes on regex notation can be found in this Wiki article.
The default entries are available for a new UTM installation from v12.5. If an existing UTM before v12.5 is updated, the entries remain as .*\.ikarus\.at and .*\.mailsecurity\.at
Examples of exceptions for Windows update servers
Further examples for setting up authentication exceptions, virus scanners, web filters and SSL interception regarding Windows Updates can be found in the Knowledge Base article Windows Updates with HTTP-Proxy and Web Filter