The tool is reporting vulnerabilities on SSL.
The following vulnerabilities may be reported:
SSL Server Allows Cleartext Communication Vulnerability (QID: 38143)
SSL Server Supports Weak Encryption Vulnerability (QID: 38140)
SSL Server Allows Anonymous Authentication Vulnerability (QID: 38142)
The Symantec Brightmail Gateway appliance is not vulnerable, provided best practices are followed in securing administrative accounts, client machine integrity, and a Symantec supported Web browser is used for management.
The Symantec Brightmail Gateway appliance is managed utilizing a client web browser.
Connectivity to the Symantec Brightmail Gateway User Interface is a HTTP over Secure Sockets Layer (SSL) based connection on TCP port 443 (or 41443).
The QualysGuard scan signatures are focused on standardized web server implementations of Secure Sockets Layer (SSL).
These scan signatures are targeted at the out-of-the-box behavior that you would expect from any SSL server.
Please refer to Symantec Brightmail Gateway appliance Administration Guide and Release Notes to follow Symantec's recommended best practices on configuring your Symantec Brightmail Gateway appliance.