The settings for the encrypted connections scan are used in the operation of the Web Threat Protection and Web Control components. The Web Threat Protection component can decrypt and inspect network traffic sent over secure connections. The encrypted connections scan is enabled by default.
You can enable or disable the encrypted connections scan, and also configure the scan settings:
Select the action to be performed by the application upon detection of an untrusted certificate.
Select the action to be performed when an encrypted connections scan error occurs on a website.
Enable or disable the use of the Internet for certificate verification.
View and configure a list of trusted domains. The application will not scan encrypted connections established when visiting specified domains.
Configure a list of certificates that the application will consider trusted when performing an encrypted connections scan.
Configure a list of network ports to be monitored by the application. You can specify the network ports or network port ranges to be monitored.
When the encrypted connections scan settings are changed, the application records a NetworkSettingsChanged event in the log file.