US English (US)
FR French
DE German
ES Spanish
IT Italian
NL Dutch
JP Japanese

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • Contact Us
English (US)
US English (US)
FR French
DE German
ES Spanish
IT Italian
NL Dutch
JP Japanese
  • Home
  • CyberFOX DNS Filtering
  • Filtering Policies

Proxy Service

Written by Owen Parry

Updated at January 30th, 2026

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • AutoElevate Knowledgebase
    New to AutoElevate? START HERE General & Troubleshooting Managing Rules Integrations Announcements FAQ Sales & Marketing
  • Password Boss Knowledgebase
    Using Password Boss Business Administration Password Boss Partner Documents
  • CyberFOX DNS Filtering
    Getting Started Filtering Policies Company and Location Setup Roaming Clients Reporting and Logging Troubleshooting
  • Marketing Toolkit
    MSP Marketing & Education Toolkit
  • Changelogs for Autoelevate and Password Boss
  • CyberFOX Product Roadmap
  • Current Status
+ More

Table of Contents

Overview What the Proxy Service Is Not All Websites Can Be Proxied How It Works Request Handling Content Prefiltering Website Manipulation Rendering Safe Content Limitations Website Compatibility Hardcoded Blocks Example Scenario How to Use the Proxy Advanced Use Cases Best Practices Troubleshooting Common Issues & Resolutions Security & Sync Behavior

Overview

The Proxy Service in CyberFOX DNS Filtering provides a secure, controlled method of browsing by rewriting and sanitizing website content before it reaches the end‑user. Instead of loading a site directly, the proxy retrieves the page, removes unsafe elements, and presents a safer version to the user. This is especially valuable when browsing potentially risky sites, controlling exposure to active content, and enforcing strict security policies in sensitive environments.

Its purpose is to reduce attack surface by stripping away scripts, remote content, and dynamic components that attackers commonly use to deliver malware or exploit users. While powerful, proxy‑based browsing introduces limitations with certain websites and should be used only where appropriate.

 

What the Proxy Service Is


The Proxy Service acts as an intermediary between the user and the destination website. Unlike traditional DNS filtering—which blocks or allows domains—the Proxy Service actively modifies the fetched webpage to prevent unsafe or dynamic elements from executing.

Key capabilities include:

  • Removing JavaScript and script‑based behaviors
  • Blocking remote content loading (images, third‑party scripts, embedded widgets)
  • Disabling macros and other executable content
  • Rewriting internal/external links to ensure users stay within the proxy
  • Automatically rendering “safe” versions of pages for end‑users

The result is a browsing experience similar to the original site, but without the components that could compromise security.

 

Not All Websites Can Be Proxied


Certain categories of websites contain sensitive data and therefore cannot be proxied. These restrictions prevent the exposure of confidential or regulated information during a man‑in‑the‑middle transformation process.

Hard‑blocked categories include:

  • Banking and financial sites (online banking, investment platforms)
  • Healthcare portals (EHR systems, medical records)
  • Email providers (Gmail, Outlook.com, Yahoo Mail, etc.)
  • Authentication portals or identity‑related services
  • Any site that transmits confidential personal data

These blocks ensure maximum security and regulatory compliance.

 

How It Works


Request Handling

When a user attempts to load a website, the Proxy Service intercepts the HTTP/HTTPS request and downloads the site content rather than forwarding the request. This ensures full control over what code is executed.

Content Prefiltering

The proxy analyzes the page and strips or modifies:

  • JavaScript and inline scripts
  • External scripts (CDNs, ad networks, trackers)
  • Embedded objects
  • Remote content loads (images, frames, asynchronous requests)
  • Any macro or active components capable of executing code

This prefiltering removes the most common vectors used for phishing, malware delivery, and social engineering attacks.

Website Manipulation

All links and structures are rewritten to route back through the proxy. This prevents users from accidentally navigating away to unfiltered or unsafe content and ensures that all interactions remain sanitized.

Rendering Safe Content

Once the content is sanitized and rewritten, the proxy serves a modified safe version to the user. The site typically resembles the original but will not support dynamic or script‑based functionality.

 

Limitations


Website Compatibility

Because the proxy removes dynamic content, some websites may:

  • Render incorrectly
  • Break functionality (e.g., login flows, video playback, interactive forms)
  • Fail to load entirely

These limitations are expected, as the proxy's purpose is safety, not feature preservation.

Hardcoded Blocks

Certain sites—especially financial services, email platforms, and other sensitive destinations—are hardcoded to bypass the proxy entirely for security reasons. This helps prevent man‑in‑the‑middle scenarios and protects user credentials and sensitive data.

Example Scenario

A user browsing google.com through the proxy will receive a sanitized version of the homepage. Search may function, but interactive elements, personalization, and dynamic responses will not, as the proxy strips the site down to its safe core.

How to Use the Proxy


The Proxy Service is automatically applied when configured within your DNS Filtering policy. To use it:

  1. Enable the proxy option within your filtering policy in the CyberFOX DNS Filtering Portal.
  2. Apply the policy to the appropriate devices, locations, or roaming clients.
  3. Users who attempt to access sites requiring safe rendering will be automatically routed through the proxy.
  4. The modified content displays without requiring any user action or software installation.

Note: The proxy only activates on pages designated for safe rendering or categories enforced by your filtering rules.

 

Advanced Use Cases


  • Sandboxed browsing for high‑risk users (interns, students, contractors)
  • Investigating suspicious websites safely for IT or security teams
  • Reducing exposure to drive‑by downloads on content-heavy sites
  • Protecting unmanaged BYOD devices where endpoint security cannot be enforced
  • Providing safe browsing for K–12 or public‑access environments

 

Best Practices


  • Use the Proxy Service for risky categories: newly registered domains, suspicious sites, and known malware vectors.
  • Avoid applying the proxy to business‑critical or interactive services.
  • Educate users that proxied pages may look “plain” or stripped-down by design.
  • Combine proxy features with DNS filtering, SSL inspection, and block page enforcement for layered protection.
  • Review logs to identify pages frequently failing under the proxy—these may require explicit allow‑listing or category adjustments.

 

Troubleshooting


Common Issues & Resolutions

Website won’t load / appears broken

  • The page may rely heavily on JavaScript or dynamic content blocked by the proxy.
  • Try accessing the site without proxy enforcement or add it to an allow list.

User sees repeated redirects

  • The site structure may conflict with proxy link rewriting.

Website appears plain or missing images

  • Expected behavior if the proxy removes remote content.

Page loads slowly

  • Proxy rendering requires downloading and sanitizing the entire page before serving it.

Site falls into a hard‑blocked category

  • Financial, healthcare, and email sites will always bypass proxy.

 

Security & Sync Behavior


  • The proxy operates as a man‑in‑the‑middle sanitizer, not a caching or syncing mechanism.
  • No user credentials or session tokens are stored by the proxy beyond what is required to retrieve content.
  • HTTPS content is decrypted, sanitized, and re‑encrypted before being served to the user.
  • The proxy does not sync state across sessions—each page request is reprocessed independently.
  • Avoid using it with applications requiring secure cookies, dynamic authentication tokens, WebSockets, or real‑time API interactions.

 

intermediary agent stand-in substitute middleman proxy service dns proxy behavior safe rendering website manipulation prefiltering dns filtering safe browsing javascript removal sanitized content cyberfox proxy secure browsing mode remote content blocking content rewriting dns security web filtering proxy limitations financial site blocking healthcare site blocking email site blocking dynamic content stripping high‑risk browsing protection drive‑by attack prevention sanitized website delivery proxy troubleshooting dns portal policies layered security sanitized page rendering web security proxy content sanitization

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Is AutoElevate hard to deploy?
  • Supported browsers
Request a Demo
  • Get Pricing
  • Start Trial
  • Contact
  • Support Center
  • Login
Solutions
AutoElevate
  • AutoElevate Overview
  • Remove Admin Privilege
  • Just-in-Time Admin
  • Blocker
Password Manager
  • Password Manager Overview
  • Features
DNS Filtering
  • DNS Filtering Overview
MSPs
IT Departments
  • Overview
  • State and Local Government
  • K-12 Education
  • Manufacturing
  • Higher Education
Resources
  • Resource Center
  • Group Demos
  • Events
  • The Simple 7™
Company
  • About
  • Leadership
  • Culture & Values
  • News & Press
  • Awards
  • Partnerships
  • Referral Program
  • Trust Center
CyberFox Logo

CALL US (813) 578-8200

© 2025 CYBERFOX LLC ALL RIGHTS RESERVED | Privacy Policy | Terms of Service | Sitemap


Knowledge Base Software powered by Helpjuice

//-------------------------------------------------------------------- // RESOLVE DESTINATION URL //-------------------------------------------------------------------- function resolveRedirect(path) { if (STATUS_SLUGS.includes(path)) { return "https://status.cyberfox.com"; } if (REDIRECTS.hasOwnProperty(path)) { return REDIRECTS[path]; } return null; } //-------------------------------------------------------------------- // CLICK HANDLER (Capture Phase) //-------------------------------------------------------------------- document.addEventListener( "click", function (e) { var link = e.target.closest && e.target.closest(LINK_SELECTOR); if (!link) return; // Let modified clicks behave normally (open in new tab, etc.) if (e.metaKey || e.ctrlKey || e.shiftKey || e.altKey) return; // Only left click if (e.button !== 0) return; var href = link.getAttribute("href") || link.href; if (!href || href.startsWith("#")) return; var path = normalizePath(href); var target = resolveRedirect(path); if (!target) return; // Intercept click BEFORE Helpjuice SPA/PJAX e.preventDefault(); e.stopPropagation(); if (e.stopImmediatePropagation) e.stopImmediatePropagation(); window.open(target, "_blank", "noopener"); }, true // capture ); //-------------------------------------------------------------------- // KEYBOARD ACCESSIBILITY (Enter / Space) //-------------------------------------------------------------------- document.addEventListener( "keydown", function (e) { if (e.key !== "Enter" && e.key !== " ") return; var link = document.activeElement.closest && document.activeElement.closest(LINK_SELECTOR); if (!link) return; var href = link.getAttribute("href") || link.href; if (!href || href.startsWith("#")) return; var path = normalizePath(href); var target = resolveRedirect(path); if (!target) return; e.preventDefault(); e.stopPropagation(); if (e.stopImmediatePropagation) e.stopImmediatePropagation(); window.open(target, "_blank", "noopener"); }, true ); })();
Expand