Not 100% correctly
At our work we uses Forcepoint to block unwanted traffic.
Here how it works.
1. You need a local installed certificate from Forcepoint
2. You try to open an https site.
3. WCCP (web redirecting proxy) see that you are coming form at destination that we like to inspect, sends it to Forcepoint
4. Forcepoint strips of https certificate, looks at were you go and allow/block session. If it allows session it uses the real cert from the site you are visiting.
So at the client site you can see the look is green on the https sites, but if you look at certificate its a spesial created one, not the site cert.
This works fine in most of cases, but if you have application that read https and do not see or understand that you have a local certificate, it will not work. So Browser traffic is ok, but for application, you need exceptions.
There are other vendors that can do this like Check Point
This video explain how it works:
https://www.youtube.com/watch?v=1lJBBRsc03A