Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

Encrypted Traffic Handling Decryption Rules and Policy Example Decryption Rule Settings

Last updated: Jul 29, 2025

Decryption Rule Settings

How to configure recommended best practice settings for your decryption rules.

Decryption rules: Enable logging for every rule except those with a Do Not Decrypt rule action. (It's up to you; if you want to see information about traffic that isn't decrypted, enable logging for those rules also.)

Procedure

1

Click Policies > Access Control heading > Decryption.

2

Click Edit (edit icon) next to your decryption policy.

3

Click Edit (edit icon) next to a decryption rule.

4

Click the Logging tab.

5

Click Log at End of Connection.

6

Click Save.

7

Click Save at the top of the page.