Cloudflare Docs
Cloudflare Zero Trust
Visit Cloudflare Zero Trust on GitHub
Set theme to dark (⇧+D)

Skip inspection for groups of applications

You can configure Cloudflare Zero Trust to skip inspection for certain groups of applications.

Certain client applications, such as Zoom or Apple services, rely on certificate pinning. The TLS inspection performed by Cloudflare Gateway will cause errors when users visit those applications. To avoid this behavior, you must add a Do Not Inspect HTTP policy.

This walkthrough covers how to:

  • Build a Do Not Inspect policy using Cloudflare’s list of certificate pinned resources
  • Configure that policy’s precedence in your Gateway configuration

Time to complete:

5 minutes

​​ Prerequisites

​​ Build the policy

  1. In Zero Trust, go to Gateway > Firewall Policies > HTTP. Select Add a policy.

  2. Name the policy and, optionally, provide a description.

  3. In the Selector field, choose Application. In the Operator field, select in. In the Value field, search for Do Not Inspect. You can select either individual applications or the entire Do Not Inspect set, which will update as new applications are added.

  4. In Select an action, select Do Not Inspect. Select Create policy.

​​ Change rule precedence

New rules are saved at the bottom of the rule list in Gateway. Gateway evaluates rules from top-to-bottom, except for Do Not Inspect rules. Those are always evaluated first. We recommend moving your Do Not Inspect rules to the top of the list to reduce confusion.

For more information, go to Order of enforcement.

Gateway rules displayed in recommended order.