Hi John,Excellent questions! Let's take them one by one.1A)To determine if the recipient's server is accepting my TLS connections:Our first step is to determine a host we want to verify TLS against.This may be as simple as searching your message trac...
Hi John, Good questions! 1A) An intermediate certificate is a "subordinate" certificate issued by the trusted root Certificate Authority (CA) specifically to issue end-entity server certificates. The Certificate Authority can be thought of as a cent...
Philippe,Unfortunately the KBs are limited as there is currently no support for loading/reloading configuration files from/to clustered appliances. As you've problably seen, the configurations get quite complex as each new machine is added to the clu...
Hi Philippe,It's true that the more rules you deploy, the more processing time and power needed to evaluate them all.What I would recommend in a situation such as yours would be the usage of dictionaries to combine similar filter expressions, along w...
Doug,Absolutely, no problem.I can't give away too much of our "secret sauce" , but rest assured every message is taken into account. As you can imagine, all this is more automated than human, but there are always engineers sampling and verifying sub...