Encrypted connections scan

The settings for the encrypted connections scan are used by the Web Threat Protection component. The Web Threat Protection component can decrypt and inspect network traffic sent over secure connections. The encrypted connections scan is enabled by default.

You can enable or disable the encrypted connections scan, and also configure the scan settings:

When the encrypted connections scan settings are changed, the application records a NetworkSettingsChanged event in the log file.

In this Help section

Configuring network traffic scanning in the Web Console

Configuring network traffic scanning in the Administration Console

Configuring network traffic scanning on the command line

Page top