Quick Reference Guide

124 | Chapter 4. Content Filtering and Optimizing Scans
ProSecure Web/Email Security Threat Management (STM) Appliance
Specifying Trusted Hosts
You can specify trusted hosts for which the STM bypasses HTTPS traffic scanning and
security certificate authentication. The security certificate is sent directly to the client for
authentication, which means that the user does not receive a security alert for trusted hosts.
For more information about security alerts, see Managing Digital Certificates on page 76.
Note that certain sites contain elements from different HTTPS hosts. As an example, assume
that the https://example.com site contains HTTPS elements from the following three hosts:
trustedhostserver1.example.com
trustedhostserver2.example.com
imageserver.example.com
To completely bypass the scanning of the https://example.com site, you need to add all three
hosts to the trusted hosts list because different files from these three hosts are also
downloaded when a user attempts to access the https://example.com site.
To specify trusted hosts:
1. Select Web Security > HTTP/HTTPS from the menu. The HTTP/HTTPS submenu tabs
display, with the Malware Scan screen in view.
2. Click the Trusted Hosts submenu tab. The Trusted Hosts screen displays. (The following
figure contains an example.)
Figure 68.