On the command line, you can use special management commands to manage network traffic scan settings. You can use network traffic scan settings management commands to:
In this section
Viewing and editing settings for encrypted connections scan
Viewing exclusions from encrypted connections scan
Managing the list of trusted root certificates
Configuring and viewing traffic interception exclusions
Exclusions from traffic interception using the tools of the operating system