You can configure the settings of encrypted connection scans. These settings apply to the Web Threat Protection and Network Threat Protection components.
Network settings
Setting |
Description |
---|---|
Enable encrypted connection scans |
This check box enables or disables encrypted connection scans. The check box is selected by default. |
Action when an untrusted certificate is encountered |
In the drop-down list, you can select an action to be performed by the application upon detection of an untrusted certificate:
|
Action on an encrypted connection scan error |
In this drop-down list, you can select the action to be performed by the application when an error occurs during an encrypted connection scan:
|
Certificate verification policy |
In the drop-down list, you can select how the application verifies certificates:
|
Exclusions |
This group of settings contains the Configure button. Clicking this button opens the Exclusion scopes window. In this window, you can configure the list of trusted domain names. |
Network ports settings |
This group of settings contains the Configure button. Clicking this button opens the Network ports window. |