You can perform additional configuration steps to meet your business requirements, including the following:
  • Configuring Active Directory services that allow you to use Active Directory users and groups when creating policies, HTTPS inspection rules, and accounts, and for authentication when users access web resources.
  • Creating the Approved List and Blocked List.
  • Managing and customizing the notifications sent to end users when there are violations.
  • Managing reports that are sent to configured recipients.
  • Configuring additional system settings such as static routes, proxy settings, NTP servers, authentication certificates, and X-Header handling settings.
  • Configuring additional integrated products and services such as Deep Discovery Director integration, threat intelligence sharing, and configuring a syslog server.
  • Managing settings that determines how long to save log data.
  • Backing up certain settings.
  • Creating new accounts and contacts.
For information about how to perform additional configuration tasks, see the Deep Discovery Web Inspector Administrator's Guide.