Currently there is no quick and easy way to discover URLs that are not being blocked, but are causing issues with the filter and need to be on the SSL Exclusion list.
For example, a banking app is not working properly, we go to investigate, and nothing is reported as being blocked (or not even reporting where the app is going as allowed), but the application will not open or work properly. We need to discover where this application is going to know what to SSL exclude. Apparently the only way to discover things like this is run commands against the agent installed on the computer to capture the traffic, which can be time consuming and not user friendly.
We are hoping there is a way things like this could be logged somewhere in the Relay GUI, to at least see where a computer/ip-address are going and be able to add these URL's to the SSL Exclusion list.
Thank you for your time and consideration of this feature.