I've found a ton of information on how to implement proxy bypasses but not how the bypasses themselves are evaluated by Windows.
I'm looking for information specific to Windows and how the operating system evaluates those bypasses.
For example:
Say you have a domain such as "microsoft.com" with two subdomains, "security.microsoft.com" and "intune.microsoft.com". Your proxy bypass list has the following entries:
*.microsoft.com security.microsoft.com intune.microsoft.com
I'm trying to figure out in which order Windows would evaluate this list. My gut feeling is that Windows is going to evaluate the most specific bypass' first and then make its way down the list; the order of evaluation being [security.microsoft.com|intune.microsoft.com] then *.microsoft.com. However, I cannot seem to find any documentation on this.
I realize that this example is incredibly redundant and not a real-world example, I just couldn't think of a better generalized example.
Any assistance would be greatly appreciated.