Encrypted connections scan
You can perform the following actions for configuring the encrypted connections scan:
- Enable the encrypted connections scan.
- Configure the encrypted connections scan settings.
- Create encrypted connections scan exclusion.
Page top