Sign in with Microsoft
Sign in or create an account.
Hello,
Select a different account.
You have multiple accounts
Choose the account you want to sign in with.

Symptoms

Consider the following scenario:

  • You enable Microsoft Forefront Threat Management Gateway (TMG) 2010 functionality to specify exact domains for HTTPS inspection, as is documented in update 2619986.

  • You specify a domain name set on which you want Forefront TMG 2010 to apply HTTPS inspection. For example, you specify Hotmail.com.

  • A user accesses a site that is in the domain name set.


In this scenario, HTTPS traffic may not be inspected.

Cause

This problem may occur if the destination site uses a server certificate that has subject alternative names (SANs). If any of the Domain Name System (DNS) names in the SAN list are not in the inclusion domain name set that is specified for HTTPS inspection, HTTPS traffic will not be inspected.

Resolution

To resolve this problem, install Rollup 5 for Forefront Threat Management Gateway 2010 Service Pack 2.

Workaround

To work around this problem, make sure that all the DNS names in the SAN list are included in the domain name set that is used for the inclusion domains. You can inspect these names by viewing the server certificate and then inspecting the Subject Alternative Name field.

Status

Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.

References

Learn about the terminology that Microsoft uses to describe software updates.

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

Was this information helpful?

What affected your experience?
By pressing submit, your feedback will be used to improve Microsoft products and services. Your IT admin will be able to collect this data. Privacy Statement.

Thank you for your feedback!

×