You can configure settings for scanning the encrypted connections used in the Web Threat Protection task.
You can also configure the list of trusted certificates, which is used when scanning encrypted connections.
In this section
Encrypted connections scan settings
Managing encrypted connections scan settings
Managing trusted certificates