Initial Configuration for All Security Modules > Content Gateway initial configuration
|
|
If proxy user authentication will be used, configure user authentication. Alternatively, configure Other methods of user identification.
|
|
Configure the real-time Scanning Options in the Forcepoint Security Manager
|
|
When HTTPS (SSL support) is used, configure categories, clients, and destination servers for SSL decryption bypass in the Forcepoint Security Manager.
|
|
In transparent proxy deployments, use ARM dynamic and static bypass, or use router ACL lists to bypass Content Gateway (see your router documentation)
|
Initial Configuration for All Security Modules > Content Gateway initial configuration
|