In the Administration Console, you can configure network traffic scan settings in the policy properties (General settings → Network settings).
Encrypted connections scan settings
Setting |
Description |
---|---|
Enable encrypted connections scan |
This check box enables or disables the encrypted connections scan. The check box is selected by default. |
Encrypted connections scan settings |
This section contains the encrypted connections scan settings:
|
Trusted domains |
This group of settings contains the Configure button, which opens the Trusted domains window, where you can configure the list of trusted domain names. |
Trusted root certificates |
This group of settings contains the Configure button, which opens the Trusted root certificates window, where you can configure the list of trusted root certificates. The list is used when scanning encrypted connections. |
Traffic interception exclusions |
This group of settings contains the Configure button, which you can click to open the Traffic interception exclusions window. In this window, you can manage the settings of connections that the application excludes from traffic interception. |
Network ports settings |
This group of settings contains the Configure button. Clicking this button opens the Monitored ports window. |