About Configuring HTTPS Scanning
To configure HTTPS scanning, default rule sets and Feature Configurations are available as shown in the table below.
Configuration item | Remarks and more information |
---|---|
Default rule set — HTTPS Connection Options | This rule set is implemented by default after the initial setup. You can configure it as needed, see HTTPS Connection Options. |
Feature Configuration — Customer CA | This Feature Configuration is an instance of a configuration for the HTTPS Connection feature. It is implemented by default after the initial setup. You can copy (clone) this default instance and configure the cloned instance, see HTTPS Connection — Feature Configuration. |
Default rule set — Certificate Verification | This rule set is implemented by default after the initial setup. You can configure it as needed, see Certificate Verification. |
Feature Configuration — Default Certificate Verification | This Feature Configuration is an instance of a configuration for the Certificate Verification Options feature. It is implemented by default after the initial setup, You can copy (clone) this default instance and configure the cloned instance, see Certificate Verification Options — Feature Configuration. |
Feature Configuration — Default TLS Certificate Chain Settings | This Feature Configuration is an instance of a configuration for the Certificate Verification feature. It is implemented by default after the initial setup, You can copy (clone) this default instance and configure the cloned instance, see Certificate Verification — Feature Configuration. |
Default rule set — HTTPS Decryption | This rule set is implemented by default after the initial setup. You can configure it as needed, see HTTPS Decryption. |
Feature Configuration — Default Enable Content Inspection | This Feature Configuration is an instance of a configuration for the HTTPS Decryption feature. It is implemented by default after the initial setup, You can copy (clone) this default instance and configure the cloned instance, see HTTPS Decryption — Feature Configuration. |