Bypassing verification
When verification bypass is enabled, users are allowed to access a website after they have been informed that the site has an invalid certificate.
It is recommended that organizations deploy initially with verification bypass enabled. Then, as the incident rate changes, administrators can use the Incident List to enforce policy. See Managing HTTPS website access.
Use the
tab in the Content Gateway manager to configure verification bypass settings.