New in Certificates Lite: Active certificate scanning and smarter expiry alerts

A quick recap

Earlier this year, we launched Red Sift Certificates Lite, the free TLS certificate expiration monitoring service recommended by Let’s Encrypt. Since launch, thousands of organizations have adopted it to track their certificates and avoid expiry-related outages.

What we heard from customers

At launch, we had adopted Let’s Encrypt’s approach for consistency with its retiring service: notify based on certificate expiry status, not on whether a certificate was actively deployed.

Unsurprisingly, users told us these alerts weren’t always useful, especially when they flagged certificates no longer in use. What really matters is knowing when the certificates your domains are actually using are about to expire.

In our Certificates Enterprise product, we’ve long solved this with detection of active certificates across HTTPS (port 443), SMTP (port 25), and dedicated network range scans across the 1,000 most popular TCP and UDP ports. Extending that level of network handshakes to an unknown number of free users required extra work, but now that it is complete, we’re pleased to make a Lite-appropriate version available. 

What’s new

With this update, Certificates Lite performs daily scans over HTTPS (port 443), giving you visibility into all endpoints of your domains and the certificates installed on each one. We’ve focused on HTTPS because for the majority of Lite users — often hobbyists and smaller organizations — the main priority is ensuring their websites and web services are secure and available, making it the most valuable place to start.

We’ve also added a new email notification setting that sends expiry alerts only for Active certificates. This will become the default setting in Certificates Lite, so you’re only notified about the certificates that actually matter to your domains. You can change this setting anytime if you’d like to receive alerts for all certificates.

So, you can now:

  • See whether a certificate is actively deployed
  • Identify which certificate is installed on each monitored endpoint
  • Receive expiry alerts only for Active certificates, reducing noise from certificates you no longer use

Sometimes seeing is believing. Check out this short interactive demo to see how endpoint scanning and Active certificate alerts work in practice.

Why it matters

This update fills a critical visibility gap by showing you which certificates are actively deployed, and only alerting you on those. No more noise from unused certificates, just clear insights into what’s protecting your domains.

Get started

If you’re already using Certificates Lite, you don’t need to do anything — the updates are live today. If you haven’t tried it yet, sign up for free and start gaining visibility into your certificates today.

PUBLISHED BY

Francesca Rünger-Field

16 Oct. 2025

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
Certificates

New in Certificates Lite: Active certificate scanning and smarter expiry alerts

Francesca Rünger-Field

A quick recap Earlier this year, we launched Red Sift Certificates Lite, the free TLS certificate expiration monitoring service recommended by Let’s Encrypt. Since launch, thousands of organizations have adopted it to track their certificates and avoid expiry-related outages. What we heard from customers At launch, we had adopted Let’s Encrypt’s approach for consistency…

Read more
AI

Red Sift’s AI Agent, Part II: Optimization for accuracy and scale

Phong Nguyen

In our previous blog post, we introduced Red Sift’s AI Agent for lookalike classification – an intelligent system that determines whether a suspicious domain has been deliberately crafted to mimic a legitimate one or if the resemblance is merely coincidental. That post focused on the what and why of the solution: why rule-based automation…

Read more
Brand Protection

Separating signal from noise when fighting brand spoofing

Rahul Powar

“Alert fatigue” must be the most common malady among cybersecurity professionals. According to a recent survey, 56% of large companies handle 1,000+ alerts each day. For 70% of security professionals, the volume of alerts has doubled in the past few years, with more than 51% of campaigns involving some form of AI-generated brand spoofing.…

Read more
Research

49% of Big Pharma companies are vulnerable to email phishing as weaponized…

Rahul Powar

New analysis from Red Sift of the 100 largest pharma companies shows nearly half of the sector is still open to domain spoofing. Only 51% of companies are at DMARC enforcement (p=reject)—the control that stops spoofed email at the door. Another 13% sit at p=quarantine, which offers limited filtering but does not equal enforcement.…

Read more