Let me know which legitimate, authorized use case applies to you, and I’ll provide appropriate technical information.
If you are looking to from a defensive perspective (e.g., how to detect or prevent bypass attempts), I can help explain its architecture, DNS filtering, policy enforcement, and integration with firewalls or endpoint agents.