You can perform additional configuration
steps to meet your business requirements, including the following:
-
Configuring Active Directory services that allow you to use Active Directory users and groups when creating policies, HTTPS inspection rules, and accounts, and for authentication when users access web resources.
-
Creating the Approved List and Blocked List.
-
Managing and customizing the notifications sent to end users when there are violations.
-
Managing reports that are sent to configured recipients.
-
Configuring additional system settings such as static routes, proxy settings, NTP servers, authentication certificates, and X-Header handling settings.
-
Configuring additional integrated products and services such as Deep Discovery Director integration, threat intelligence sharing, and configuring a syslog server.
-
Managing settings that determines how long to save log data.
-
Backing up certain settings.
-
Creating new accounts and contacts.
For information about how to perform additional configuration tasks, see the
Deep Discovery Web Inspector Administrator's Guide.