Find sites that have untrusted CA certificates so you
can make informed decisions about allowed traffic.
Blocking access to sites with untrusted CA
certificates and certificates self-signed by an untrusted root CA
is a best practice because sites with untrusted CAs may indicate
a man-in-the-middle attack, a replay attack, or other malicious
activity.