You can configure the settings of encrypted connection scans. These settings are used by the Web Threat Protection component.
When the encrypted connection scan settings are changed, the application generates a Network settings changed event.
Network settings
| Setting | Description | 
|---|---|
| Enable encrypted connection scans | This check box enables or disables encrypted connection scans. The check box is selected by default. | 
| Action when an untrusted certificate is encountered | In the drop-down list, you can select an action to be performed by the application upon detection of an untrusted certificate: 
 | 
| Action on an encrypted connection scan error | In this drop-down list, you can select an action to be performed by the application when an error occurs during an encrypted connection scan: 
 | 
| Certificate verification policy | In the drop-down list, you can select how the application verifies certificates: 
 | 
| Trusted domains | This group of settings contains the Configure button. Clicking this button opens the Trusted domains window. In this window, you can configure the list of trusted domain names. | 
| Trusted certificates | This group of settings contains the Configure button. Clicking this button opens the Trusted certificates window. In this window, you can configure a list of trusted certificates, which is used when scanning encrypted connections. | 
| Network ports settings | This group of settings contains the Configure button. Clicking this button opens the Network ports window. |