The following table shows the screens and elements with replicated configuration settings.
|
Screen |
Element |
|
|---|---|---|
|
|
All settings |
|
|
|
Policy |
All policy rules and policy global settings |
|
Decryption Rules |
All HTTPS decryption rules (formerly known as HTTPS Inspection rules) |
|
|
|
All certificates in the trusted, untrusted, and invalid certificate stores and certificate exceptions |
|
|
HTTPS Tunnels |
All domain tunnels |
|
|
Intelligent Decryption |
All custom patterns and exceptions |
|
|
|
Network Objects |
All network objects |
|
Domain Objects |
All domain objects |
|
|
Approved/Blocked Lists |
Approved list and blocked list |
|
|
Notifications |
All notification settings |
|
|
|
|
All alert rules |
|
|
All report schedules |
|
|
|
|
All schedule settings |
|
|
All settings |
|
|
|
|
All settings |
|
|
All settings |
|
|
Global Authentication Settings |
All settings Note:
The Kerberos keytable information is not backed up. |
|
