Encrypted connections scan
Encrypted connections scan
Oct 22, 2023
ID 236580
You can configure settings for scanning the encrypted connections used in the Web Threat Protection task.
You can also configure the list of trusted certificates, which is used when scanning encrypted connections.
Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.