The settings for the encrypted connections scan are used by the Web Threat Protection component. The Web Threat Protection component can decrypt and inspect network traffic sent over secure connections.
The encrypted connections scan is enabled by default. You can disable or enable the encrypted connections scan at any time.
By modifying the encrypted connections scan settings, you can:
The application will not scan encrypted connections established when visiting listed domains.
You can specify the network ports or network port ranges to be monitored.
When the encrypted connections scan settings are changed, the application records a NetworkSettingsChanged event in the log file.
Special administration commands are provided in the command line for administering the settings for the encrypted connections scan. Using the commands for managing the settings for the encrypted connections scan, you can:
If the encrypted connections scan is enabled, you cannot see the information about the real security certificate of the server you are connecting to.
If you try to connect to a server that does not support the encrypted connections scan, the application will not be able to scan the encrypted connection with that server.
The application does not scan encrypted connections in the following cases: