Data center servers only reach out to trusted servers
such as update servers, so decrypting that traffic isn’t necessary. | Malware or command-and-control software that
is already in the data center may attempt to communicate with external servers
to download more malware or exfiltrate data. | Decrypt all traffic from the data center to the
internet. Create a custom URL categories that defines the URLs data
center servers are allowed to contact and use it in Security policy
to limit internet access to external servers. Use the same custom
URL in Decryption policy to decrypt traffic to those external servers. |