Configure Connection LoggingThe following sections describe how to set up connection logging to match various rules and conditions.Logging Connections with Tunnel and Prefilter RulesLogging Decryptable Connections with TLS/SSLDecryption RulesLogging Connections with Security IntelligenceLogging Connections with Access Control RulesLogging Connections with a Policy Default ActionLimiting Logging of Long URLs