As you may know Forefront TMG Beta 3 includes outbound HTTPS Inspection.
With the help of the Firewall Client we can notify the users that their HTTPS connections are being inspected(the Microsoft TMG Client for Forefront TMG can be found within the location where the downloaded TMG Beta 3 .exe file was extracted):
![fwc_loc fwc_loc](/blog/image.axd?picture=fwc_loc.png)
A system policy is enabled:
![sys_pol3 sys_pol3](/blog/image.axd?picture=sys_pol3_thumb.png)
How the notification looks like at this moment ?
See it yourself:
![not4 not4](/blog/image.axd?picture=not4_thumb_1.png)
And it’s interesting to see what we would normally not see, for example while accessing Gmail, in the “background” we have other HTTPS connections:
![not6 not6](/blog/image.axd?picture=not6_thumb.png)
I must say I’m not sure exactly right now how the notifications work(the help files do not include many details at this moment), but I did not get any notifications until I configured on the browser the TMG Beta 3 machine as a web proxy, so basically my client was a web proxy client + firewall client + secure NAT client.