You can configure the settings of encrypted connection scans. These settings are used by the Web Threat Protection component.
When the encrypted connection scan settings are changed, the application generates a Network settings changed event.
Network settings
Setting |
Description |
---|---|
Enable encrypted connection scans |
This check box enables or disables encrypted connection scans. The check box is selected by default. |
Action when an untrusted certificate is encountered |
In the drop-down list, you can select an action to be performed by the application upon detection of an untrusted certificate:
|
Action on an encrypted connection scan error |
In this drop-down list, you can select an action to be performed by the application when an error occurs during an encrypted connection scan:
|
Certificate verification policy |
In the drop-down list, you can select how the application verifies certificates:
|
Trusted domains |
This group of settings contains the Configure button. Clicking this button opens the Trusted domains window. In this window, you can configure the list of trusted domain names. |
Trusted certificates |
This group of settings contains the Configure button. Clicking this button opens the Trusted certificates window. In this window, you can configure a list of trusted certificates, which is used when scanning encrypted connections. |
Network ports settings |
This group of settings contains the Configure button. Clicking this button opens the Network ports window. |