Identify encrypted traffic that you want to inspect for visibility, control, and granular
security. Decryption security rules allow you to define traffic to
decrypt and the type of SSL decryption, you want to perform on the
indicated traffic. All you need to do to start decrypting traffic is
set up the certificates Prisma Access requires to act as a
trusted third-party to a session. For everything else, we’ve built
in best practice decryption settings, including settings to exclude
sensitive content from decryption, as well as sites that are known
to not work well when decrypted. For more details, see Decryption.
SSH Proxy decryption is not
supported in Prisma Access Cloud Management.
|