Recommendations for the Inspection of TLS-Encrypted Web Traffic

This video series covers best practices and operational guidelines for the configuration of SSL Inspection policies and the management of SSL bypasses.

rate limit

Code not recognized.

About this course

This series of videos covers best practices, operational guidelines and deployment considerations for SLL Inspection policy inside Zscaler Internet Access.
 
Video 1 Covers what's at stake, the security risks created by encrypted traffic, and why it's so important that you inspect your encrypted traffic.
Video 2 Covers what traffic you should inspect and what traffic cannot or should no be inspected.
Video 3 Discusses how to start your SSL Inspection journey and the various considerations you should keep in mind to do so if you have not yet started inspecting encrypted traffic.
Video 4  Covers the model policy, which is the recommended policy outline for SSL Inspection, and discusses how to best configure SSL inspection rules.
Video 5 Covers operational guidelines for managing SSL Inspection bypasses.

Curriculum7 mins

  • Video Series
  • Video 1: Why Inspect Your Traffic
  • Video 2: What Traffic to Inspect
  • Video 3: How to Start Inspecting Traffic
  • Video 4: Recommended Policy Model
  • Video 5: Operational Best Practices

About this course

This series of videos covers best practices, operational guidelines and deployment considerations for SLL Inspection policy inside Zscaler Internet Access.
 
Video 1 Covers what's at stake, the security risks created by encrypted traffic, and why it's so important that you inspect your encrypted traffic.
Video 2 Covers what traffic you should inspect and what traffic cannot or should no be inspected.
Video 3 Discusses how to start your SSL Inspection journey and the various considerations you should keep in mind to do so if you have not yet started inspecting encrypted traffic.
Video 4  Covers the model policy, which is the recommended policy outline for SSL Inspection, and discusses how to best configure SSL inspection rules.
Video 5 Covers operational guidelines for managing SSL Inspection bypasses.

Curriculum7 mins

  • Video Series
  • Video 1: Why Inspect Your Traffic
  • Video 2: What Traffic to Inspect
  • Video 3: How to Start Inspecting Traffic
  • Video 4: Recommended Policy Model
  • Video 5: Operational Best Practices