Scenario: The Director of network security in a financial organization wants to protect the enterprise network from any external malware threats. To do this, the director needs to gain visibility into otherwise-bypassed traffic and control access to malicious web sites. The director is required to do the following:
✑ Intercept and examine all the traffic, including SSL/TLS (encrypted traffic), coming in, and going out of the enterprise network.
✑ Block access to URLs identified as serving harmful or insecure content.
✑ Identify users (employees) in the enterprise who are accessing malicious websites.
Which Citrix ADC deployment mode should a Citrix Administrator use to achieve this requirement?