The following topics describe how to protect your organization from malware and other Web-based threats:
- Configuring malware
inspection—Describes how to enable and configure the inspection
of user-requested Web pages and files for harmful content.
- Configuring HTTPS
inspection—Describes how to enable inspection of outbound HTTPS
traffic, in order to protect your organization from security risks
inherent to Secure Sockets Layer (SSL) tunnels.
- Configuring HTTP
filtering—Describes how to configure the application-layer HTTP
filter to allow only HTTP traffic that complies with your corporate
policy and security needs.