Views:

Change the proxy settings by replacing the PAC file in use in the Secure Access Module.

Internet Access provides a default PAC file built in the Secure Access Module for HTTP/HTTPS traffic forwarding to the Internet Access Gateway. You can change the PAC file by individual endpoint, endpoint group, or operating system.
Note
Note
For a single endpoint, the PAC file applied using the following steps takes effect, regardless of the platform-based PAC file configured for the endpoint.

Procedure

  1. On the Trend Vision One console, go to Zero Trust Secure AccessSecure Access ConfigurationSecure Access Module.
  2. Decide the way you want to use to replace the PAC file being used in the Secure Access Module.
    • To replace the PAC file on individual endpoints, go to step 3.
    • To replace the PAC file on entire endpoint groups, go to step 4.
  3. Replace the PAC file on individual endpoints by performing the following steps.
    1. Click EndpointsEndpoint List.
    2. Filter out the desired endpoints by selecting Endpoints with module deployed or using the search text box.
    3. Select one or more endpoints that you want to replace the PAC file on and click Replace PAC File.
    4. On the Replace PAC File dialog that appears, select the PAC file that you want to apply to the endpoints from the list, and then click Replace.
      The PAC file list shows all the available PAC files that are created in the PAC Files screen (Zero Trust Secure AccessSecure Access ConfigurationInternet Access and AI Service Access Configuration).
  4. Replace the PAC file on entire endpoint groups by performing the following steps.
    1. Click EndpointsEndpoint Groups.
    2. Filter out the desired endpoint groups by selecting Endpoint groups with module deployed or using the search text box.
    3. Select one or more endpoint groups that you want to replace the PAC file on and click Replace PAC File.
    4. If you have previously replace the PAC file on some endpoints of the selected endpoint groups individually on the Endpoint List screen, decide whether to exclude certain endpoints from the replacement by clicking Skip or Skip All, and then click Replace.
    5. On the Replace PAC File dialog that appears, select the PAC file that you want to apply to the endpoint groups from the list, and then click Replace.
      The PAC file list shows all the available PAC files that are created in the PAC Files screen (Zero Trust Secure AccessSecure Access ConfigurationInternet Access and AI Service Access Configuration).
    6. If some endpoints do not have the Secure Access Module deployed, a confirmation dialog appears. Exclude these endpoints and continue with the replacement by clicking Confirm and Replace PAC File, or deploy the Secure Access Module on these endpoints and replace the PAC file on the endpoint groups again by clicking Cancel.