Software Secure Access
Activity Manage

Security Profile

  • Choose the security profile that includes the web-related settings that you want applied to traffic that matches this rule.
  • For all rules, including Block, Warn, and Isolate rules, unless you have good reason not to, choose a security profile that is configured to decrypt the traffic that will hit the rule. Decryption is required to accurately process traffic to most internet destinations.
  • If the rule will block traffic or warn users, you can choose a security profile that specifies the notifications to display to end users.

For more information, see Security Profiles for Internet Access.