Your customer is deploying devices that will be used at a university. One of the requirements is to monitor traffic for unauthorized content. They wish to implement SSL inspection to fulfill this requirement. What would be your recommendation based on Google’s best practices?
- (A) The customer can use any SSL proxy solution out of the box, as none of them will interfere with their Android deployment
- (B) The customer can configure SSL inspection, as long as traffic to Google services bypasses the proxy
- (C) The customer should configure traffic on ports other than 443 to bypass the proxy
- (D) The customer should configure all traffic to hosts connecting on port 443 to bypass the proxy