You would like to identify which users are still using weaker SSL/TLS protocol versions
You are not intercepting SSL
It is possible to log protocol version and other TLS/SSL attributes without intercepting SSL, however you must enable protocol detection otherwise the data will not show up in the access log.
Assuming you will be creating a separate log for this, the steps are as follows
1. Create a new log format
from the GUI - > Configuration -> Access Logging -> Formats -> New
give the format a name, make sure W3C extended Log File Format is selected then copy the the following fields
date time time-taken c-ip s-action cs-categories x-rs-certificate-validate-status x-rs-certificate-observed-errors cs-uri-scheme s-ip cs-host x-rs-connection-negotiated-ssl-version
x-rs-connection-negotiated-cipher x-rs-connection-negotiated-cipher-size x-rs-certificate-hostname x-rs-certificate-hostname-category
x-cs-connection-negotiated-ssl-version x-cs-connection-negotiated-cipher x-cs-connection-negotiated-cipher-size
test the format to make sure no errors exist
2. Associate the new format with a log
Again from the GUI - > Configuration -> Access Logging -> Logs -> New
give the log a name, from the dropdown list select the "Format" you just created and click OK
3. Finally you need to create policy to write to the new log, this can be done either from the VPM or in CPL, the following is an example of CPL
<Proxy>
access_log[NameOfTheLog](yes)
The following is an example of the output produced, note you in this example we see both the client and server side data:
2018-04-27 11:22:19 66891 192.168.1.7 TUNNELED "Search Engines/Portals" CERT_VALID none ssl 192.168.1.3 www.example.com TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 128 - "Search Engines/Portals" TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 128
2018-04-27 11:22:19 66888 192.168.1.7 TUNNELED "Search Engines/Portals" CERT_VALID none ssl 192.168.1.3 www.example.com TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 128 - "Search Engines/Portals" TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 128
2018-04-27 11:22:19 66894 192.168.1.7 TUNNELED "Non-Viewable/Infrastructure" CERT_VALID none ssl 192.168.1.3 www.example.com TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 128 - "Non-Viewable/Infrastructure" TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256 128