Hello, guys! I met this issue and found out the root cause. Many of you know that desktop applications often check certificate. Anydesk does it. So we need to exclude it from SSL decryption, but here is the trick: *.anydesk.com works only for Anydesk website (NGFW detects web-browsing application, see that URL match *.anydesk and exclude the session from decryption), but it doesn't work for the desktop application and here is why: I made a little investigation and found out that the application makes DNS query for random URL, generated upon installation. (Guess it called DGA, but correct me if I wrong) Here is an example: Then it establishes TCP session to IP, that was previously taken from DNS Query and that's all: So our exclusion rules will not work for IP. Solution: 1. Go to Monitor>Traffic and filter logs by application "Anydesk". 2. Export logs to CSV and open it in Excel 3. Find Destination IP column, select all items and delete duplicates 4. Copy this list to *.txt file and create EDL. 5. Use this EDL in No-Decrypt policy 6. PROFIT! You also can go further. According to WHOIS service - backend IP addresses are located in different DCs all over the world. You can take IPs you found in logs and find the whole IP ranges in WHOIS info and use these ranges in EDL. But it doesn't seem safe to me, because many of those IPs in IP range can be used by other applications, not Anydesk, so this is a potential risk.
... View more