The topics in this section describe how the Security user can secure the system:
Configuring Cloud Probe SSL keys and settings for traffic decryption
Configuring a Collector to decipher encrypted traffic