Using transport rules as a security tool

Note Unfortunately, the images from this article were never able to be recovered, and it is unlikely I will be able to recreate them. Email security has come a long way, but there is still a lot of...
Read full article →