What Does Bypass Proxy Settings Mean
How to Use the Bypass Proxy Server for Local Addresses
i Creatas/Creatas/Getty Images The Bypass Proxy Server for Local Addresses option in Windows 8’s Internet Options dialog enables you to circumvent an active proxy when accessing local resources. In general, Windows recognizes addresses like “intranet” as a local address and bypasses the proxy. However, if you add periods or use an IP address, such as ” or ” Windows fails to recognize the address as local. Therefore, if you need to bypass these local addresses, add manual exceptions for them. Step 1Type “Internet Options” while viewing the Windows 8 Start screen, click “Settings” and select “Internet Options. ” Step 2Click the “Connections” tab and select “LAN Settings. ” Step 3Check “Bypass Proxy Server for Local Addresses. ” If this option is grayed out, you don’t have “Use a Proxy Server for Your LAN” checked, which means you’re not using a proxy server through Windows for any address. Step 4Click “Advanced” and enter each local address in the Exceptions box. Separate each address with a semicolon. Step 5Click “OK” in all three opened windows to accept your changes. References Tips Internet Explorer and Chrome both rely on the Internet Options settings for proxy information, so you don’t need to configure them separately. Firefox optionally uses its own proxy settings, so you might need to add exceptions in Firefox. Click “Firefox | Options | Options | Advanced | Network | Settings” and enter exceptions in the No Proxies For box, separated by commas. This option is only available when using the “Manual Proxy Configuration” option. Writer Bio C. Taylor embarked on a professional writing career in 2009 and frequently writes about technology, science, business, finance, martial arts and the great outdoors. He writes for both online and offline publications, including the Journal of Asian Martial Arts, Samsung, Radio Shack, Motley Fool, Chron, Synonym and more. He received a Master of Science degree in wildlife biology from Clemson University and a Bachelor of Arts in biological sciences at College of Charleston. He also holds minors in statistics, physics and visual arts.
Adding and importing sites that bypass the proxy – Forcepoint
The Proxy Bypass tab of the Bypass Settings page enables you to define sites that bypass the cloud service for all policies. This may include, for example, internal sites that are not accessible from the Internet, so the cloud service cannot serve or analyze them.
Note
The URLs included in the bypass list for Office 365 are those domains that are owned by Microsoft and used directly by the Office 365 application, listed here:
This list also includes third-party URLs that host Certificate Revocation Lists (CRLs), which are not included in the bypass when you select the Office 365 checkbox. Bypassing these domains may not be appropriate for all customers.
If you have difficulty installing or using Office 365 with this option selected, you may need to add one or more of these additional URLs as non-proxied domains. If you need further assistance, please contact Technical Support.
2.
Enter a Name and helpful Description for the destination.
3.
Specify the destination Type, then enter the Address (single IP address), Subnet (using CIDR notation or subnet mask), or Domain.
5.
Use the optional Comment box to add helpful information, such as why the entry was created.
1.
Click Import Destinations.
You can add a total of 1000 proxy bypass destinations per policy. Account-level bypass destinations (added via Web > Proxy Bypass) count towards this limit for each policy. For example, if your policy has 10 bypass destinations, and you have 10 account-level bypass destinations, this is counted as a total of 20 destinations for the policy.
Use Proxy Servers with Internet Explorer – Browsers
Use Proxy Servers with Internet Explorer – Browsers | Microsoft Docs
Skip to main content
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
07/14/2020
4 minutes to read
In this article
Important
The Internet Explorer 11 desktop application will be retired and go out of support on June 15, 2022 (for a list of what’s in scope, see the FAQ). The same IE11 apps and sites you use today can open in Microsoft Edge with Internet Explorer mode. Learn more here.
This article discusses how to use Microsoft Internet Explorer in proxy environments.
Original product version: Internet Explorer
Original KB number: 4551930
Bypass proxy servers for web requests
Some network requests have to bypass the proxy. The most common reason is for local (intranet) addresses. Generally, these addresses don’t contain periods.
To bypass the proxy, select the Bypass proxy server for local (intranet) addresses check box in the Local Area Network (LAN) Settings dialog box. This method bypasses the proxy for all addresses that don’t contain a period (for example, compserv). These addresses will also be resolved directly.
To bypass more complex addresses, set up exceptions for specific addresses or wildcards by using either of the following procedures.
Use the browser settings
If you’re configuring proxy settings on a user’s computer after the deployment, follow these steps:
In Internet Explorer, open the Tools menu, and then select Internet Options.
On the Connections tab, select LAN Settings.
In the Local Area Network Settings dialog box, select the Use a proxy server for your LAN settings check box.
Select the Advanced tab, and enter the appropriate exceptions in the Do not use proxy server for addresses beginning with: box.
Note
Multiple exceptions should be separated by semicolons (“;”).
For more information, see Internet Explorer uses Proxy Server for Local IP address even if the “Bypass Proxy Server for Local Addresses” option is turned on.
Use the Proxy setting in the Internet Explorer Customization Wizard
For more information about this method, see Use the Proxy Settings page in the IEAK 11 Wizard.
Use Group Policy
In earlier versions of the Windows operating system, Internet Explorer Maintenance (IEM) is used to configure Internet Explorer settings by using Group Policy. In Windows 8, the IEM settings have been deprecated in favor of Group Policy Preferences, Administrative Templates (), and the Internet Explorer Administration Kit 10 (IEAK 10).
To configure the proxy setting through a group policy, see How to configure Proxy Settings for Internet Explorer 10 and Internet Explorer 11 as IEM is not available.
More information
A proxy bypass entry may begin by using an,, ftp, or gopher protocol type.
If a protocol type is used, the exception entry applies only to requests for that protocol.
The protocol value is case insensitive. Multiple entries should be separated by semicolons.
If no protocol is specified, any request that uses the address will be bypassed.
If a protocol is specified, requests that use the address will be bypassed only if they are of the indicated protocol type. Address entries are case insensitive, the same as they are for the protocol type.
If a port number is given, the request is processed only if all previous requirements are met and the request uses the specified port number.
To bypass servers, use an asterisk (“*”) as a wildcard to replace actual characters in the exceptions area of the Proxy Settings dialog box.
Enter a wildcard at the beginning of an Internet address, IP address, or domain name that has a common ending. For example, use *. to bypass any entries that end in., such as and
Enter a wildcard in the middle of an Internet address, IP address, or domain name that has a common beginning and ending. For example, the entry * matches any entry that starts as www and ends as com.
Enter a wildcard at the end of an Internet address, IP address, or domain name that has a common beginning. For example, use to bypass any entries that begin as ,such as,, and
To bypass addresses that have similar patterns, use multiple wildcards. For example, use 123. 1*. 66. * to bypass addresses such as 123. 144. 12, 123. 133. 15, and 123. 187. 13.
Use wildcards carefully. For example, the entry * causes Internet Explorer to bypass the proxy for most websites.
If you bypass the proxy for a local domain, use * This method doesn’t use the proxy for any computer name that ends in You can use the wildcard for any part of the name. For more information, see The Intranet Zone.
Proxy Auto Configuration (PAC)
Example of a simple PAC file
The following is a simple PAC file:
function FindProxyForURL(url, host)
{
return “PROXY proxyserver:portnumber”;}
This PAC always returns the proxy proxyserver:portnumber. For more information about how to write a PAC file and the different functions of a PAC file, see Introduction of FindProxyForURL.
References
How can I configure Proxy AutoConfigURL Setting using Group Policy Preference (GPP)?
How to use GPP Registry to uncheck automatically detect settings?
How to configure a proxy server URL and Port using GPP Registry?
How to configure Group Policy Preference settings for Internet Explorer 11 in Windows 8. 1 or Windows Server 2012 R2
Third-party information disclaimer
The third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products.
Frequently Asked Questions about what does bypass proxy settings mean
What does it mean to bypass proxy?
The Proxy Bypass tab of the Bypass Settings page enables you to define sites that bypass the cloud service for all policies. This may include, for example, internal sites that are not accessible from the Internet, so the cloud service cannot serve or analyze them.
Why would you bypass a proxy?
Bypass proxy servers for web requests. Some network requests have to bypass the proxy. The most common reason is for local (intranet) addresses. Generally, these addresses don’t contain periods.Jul 14, 2020
Should proxy settings be on or off?
It’s basically split into two configurations: either Automatic or Manual proxy setup. In 99% of the cases, everything should be set to Off. If anything is turned on, your web traffic could be going through a proxy.Oct 2, 2017