We are still looking for a solution to whitelisting individual domain/url/ip that are ingested via ioc_feeds. TAC has not been able to provide a solution.
We are currently manually removing domain/url/ip that we need access to (false positives) and repushing ioc_feeds. This has to be done on a separate feed server and then the push on the gateway. This process is not sustainable.
We have tried:
1. using the "Add Exception" link on the Prevent log associated with the lookup
2. create manual "Global" exception using "Domain" as "Destination"
3. create manual "Global" exception using "Custom Application Site" and domain regex as seen in SK165094
4. 3&4 in "Recommended Protections Exceptions"
Maybe this can not be done, but I would think anyone using ioc_feeds would have a viable solution to whitelist individual entries as users discover false positives.
A caveat we have discovered is after an exception is put in place, there seems to be a short window of opportunity where it appears the exception is working, possible during reload, but then it fails. The 'window' seems to range in time, nothing specific. So, when working with TAC or on our own, there have been several occasions of high-fives, only later to discover the site in question is still blocked.
If anyone is working with ioc_feeds and has a whitelisting process that works, we would be interested to hear how that happens.