In the Administration Console, you can configure settings for encrypted connections scans in the policy properties (General settings → Network settings).
Encrypted connections scan settings
Setting |
Description |
---|---|
Enable encrypted connections scan |
This check box enables or disables the encrypted connections scan. The check box is selected by default. |
Visiting a domain with an untrusted certificate |
In the drop-down list, you can select the action that the application performs when a domain with an untrusted certificate is visited:
|
Visiting a domain with an encrypted connections scan error |
In the drop-down list, you can select the action that the application performs when a domain with an encrypted connections scan error is visited:
|
Certificate verification policy |
In the drop-down list, you can select how the application verifies certificates:
|
Trusted domains |
This group of settings contains the Configure button, which opens the Trusted domains window, where you can configure the list of trusted domain names. |
Trusted root certificates |
This group of settings contains the Configure button, which opens the Trusted root certificates window, where you can configure the list of trusted root certificates. Trusted certificates are used when performing an encrypted connections scan. |
Network ports settings |
This group of settings contains the Configure button. Clicking this button opens the Monitored ports window. |