Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
I've been reading through a number of these bugs in preparation for upgrading.The workarounds and general language and writing of these bug tickets is absolutely awful / amateurish / I don't quite know a pleasant word that can cover it.Please tell me...
Does anybody have some background on this issue / experienced this ? You couldn't make up the TAC response I had. Bug currently lists v12.0.0-419 / 12.5.0-066"After doing a research" (you mean googled cisco bug fix site)"I found that there are not ...
Graymail engine restarting due to Graymail Rules update.There is a 'manual' engine rollback feature - does not work - this is a rules update issue, not an engine update issue.We would like 2 engines available.Current engine version+ Previous engine v...
Issue did not occur on v10Issue does occur on...v11.5.1-115v12.0.0-452 ESA limittrackingevents does not prevent situationSMA 10% unallocated space does not prevent situationSMA v12 does not prevent situation - new database is in SMA v13 not v12
Why is this marked as the solution - I wouldn't say the subject is closed.I simply wouldn't accept the response and escalate until you speak to the product manager.What is being described is exactly how the ESA works without the header for TLS negoti...
What's your remit and what's your budget allowanceWe log every log subscription ( unless its an unused feature ) and also collect data via SSH HTTPs connectionsRan out of budget on the LDAP logs - and really needed them the other day to analyse a str...
As you are sending the email, you should enter the destination domain in checktls.comGoing back to the start, there is no problem here, just understanding the additional information printed in the TLS output line.What I find strange is that I see sub...
Use www.checktls.com/TestReceiverenter email address for destination domainselect CertDetailWhat appears in the brackets as below ?Certificate 1 of 3 in chain: Cert VALIDATED: okCert Hostname VERIFIED ( ... )Rather than None - you can get things like...
Sounds like a Mail Flow Policy attributed to the Sender Group that the internal Exchange Servers are a member of, (or is inheriting from the default Mail Flow Policy) has had email authentication verification checks enabled.- And as only DMARC has a ...