We're implementing Microsoft Attack Simulation training in my organization.
The Anti-Virus blade on my gateway (R81.10) is preventing DNS queries to the Microsoft training URLs, so we need to create exceptions for them.
Microsoft has their list of Attack Simulation URLs used for phishing training published here:
Get started using Attack simulation training | Microsoft Learn
Reviewing similar threads, I see others have created a Site/Application with the list of URLs, and then created an Exception to their Threat Prevention policy with the Site/Application set as the Protection/Site/File/Blade. I did the same with no success:
Name: MSFT Attack Simulation Allow
Protected Scope: LAN
Protection/Site/File/Blade: MSFT_Attack_Simulation (Site/Application I created with list of URLs)
Action: Detect
Track: Log
Install On: gateway01
This did not work. DNS queries to these sites are still blocked. I noticed that under the Site/Application it does not list DNS under Services. It only lists http(s) and http(s)_proxy. I thought perhaps this may be why the exclusions is not working, since it's the DNS query being prevented (port 53) rather than the https connection (port 80/443).
Any guidance or advice from anyone who has accomplished this would be greatly appreciated. I can't imagine I'm the only person to have ever needed something like this for phishing training.
I attached relevant screenshots to provide context for the information above. I'm happy to provide any additional information that may be helpful.