Muzzle the Poodle on TMG 2010

POODLE can be exploited to allow an attacker to recover sensitive data sent across the Internet in an encrypted SSL session. In his blog post, Richard Hicks explains that a TMG server that has SSL hardening implemented will offer some protection, but the best practice is to disable SSL 3.0 completely, and he shows you how to do it using PowerShell.

http://tmgblog.richardhicks.com/2014/10/21/mitigating-the-poodle-ssl-3-vulnerability-on-forefront-tmg-2010/

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top