Configuring network traffic scanning in the Administration Console

In the Administration Console, you can configure network traffic scan settings in the policy properties (General settings → Network settings).

Encrypted connections scan settings

Setting

Description

Enable encrypted connections scan

This check box enables or disables the encrypted connections scan.

The check box is selected by default.

Encrypted connections scan settings

This section contains the encrypted connections scan settings:

  • Visiting a domain with an untrusted certificate specifies the action that the application must perform when a domain with an untrusted certificate is visited:
    • Allow (default value) — Allow connecting to the domain with an untrusted certificate.
    • Block — Block connection to the domain with an untrusted certificate.
  • Visiting a domain with an encrypted connections scan error specifies the action that the application must perform when a domain with an encrypted connections scan error is visited:
    • Allow and add domain to exclusions (default value) — Add the domain that resulted in the error to the list of domains with scan errors and do not scan encrypted network traffic when this domain is visited.
    • Block — Block connection to the domain with a scan error.
  • Certificate verification policy is the method the application uses to verify certificates:
    • Local check: the application does not use the internet to verify a certificate.
    • Full check (default value): the application uses the internet to check and download the missing chains that are needed to verify a certificate.

Trusted domains

This group of settings contains the Configure button, which opens the Trusted domains window, where you can configure the list of trusted domain names.

Trusted root certificates

This group of settings contains the Configure button, which opens the Trusted root certificates window, where you can configure the list of trusted root certificates. The list is used when scanning encrypted connections.

Traffic interception exclusions

This group of settings contains the Configure button, which you can click to open the Traffic interception exclusions window. In this window, you can manage the settings of connections that the application excludes from traffic interception.

Network ports settings

This group of settings contains the Configure button. Clicking this button opens the Monitored ports window.

Page top