Just for the unqualified label, *.
example.com already works for subdomains. And in our example the unqualified label for any host in the DNS domain, not just the single host given as a trivial example.
> Is there a reason that specifying, in the AuthServerWhitelist, "*.
>
example.com, myintranet" doesn't/wouldn't work? Understanding that use case
The underlying issue is there are thousands of service endpoints involved here, and constantly changing. Not just the one example.
> Group Policy to modify the Local Machine/Local Intranet security zone, and
> explicitly not specifying an AuthServerWhitelist, satisfy the need? This
This solution doesn't work for our non-Windows client systems. Ideally we'd have a solution that solved this problem everywhere with similar functionality across the user base. DNS short name should be treated the same by all platforms. A cross platform solution like a token that can be specified in the whitelist that means 'dns short names' or checking the resolver for search domains and allowing those would be ideal.
Even for Windows I suspect making a change like this for Chrome where the current settings for the GPO today work correctly for the IE/Edge browsers is going to be a tough sell due to risk of other impacts in a large environment. I will however bounce it off the appropriate administrative team.