Bypasses Network Control
Flags items that enable users to circumvent organizational network controls, such as firewalls, content filters, or secure gateways. Tools like VPNs or proxy extensions can obscure traffic, bypass security monitoring, and facilitate unauthorized access to restricted content or external services, introducing significant security, compliance, and data exfiltration risks.