"Set correctly" is just an opinion. I saw the Darren Duke blog a day ago or so. The Qualys thing is great, and it's proven indispensable during these SSL issues. However, the problem isn't so simple, and configuring a system to score well on a single test may or may not translate to the real world.
The problem with removing the AES ciphers and leaving the RC4 to get a "B" on the test is that many have argued previously that it is the RC4 ciphers that should be disabled. To wit:
http://blog.cloudflare.com/killing-rc4-the-long-goodbye/
"We recently removed support for RC4 for browsers using TLS 1.1+. Now we are removing RC4 as the preferred cipher. Servers behind CloudFlare will prefer AES-based cipher suites..."
http://www.acunetix.com/blog/articles/tls-ssl-cipher-hardening/
"Furthermore, it is also crucial to disable weak ciphers. Weak ciphers such as DES and RC4 should be disabled. Using current technology, DES can be broken in a few hours while RC4 has been found to be weaker than was previously thought. While it may have been advised to use RC4 to mitigate BEAST attacks in the past, given the latest attacks on the RC4 cipher, Microsoft has issued an advisory again its use."
Just two examples from a quick search. Microsoft apparently advises against using RC4. Cloudflare, an awesome vendor we use, removed support for RC4 for TLS 1.1+ (yes, I know we're stuck at 1.0).
Many of the ciphers and SSL/TLs versions each have different vulnerabilities. If you offer a very narrow set of ciphers (i.e. exactly two in this case), and a connecting client or SMTP server (TLS isn't just about HTTP...) has removed those due to some other valid security reason and only offers different ciphers, no secure connection can be made.
The point is, it's not so simple to choose what to do here without risking breaking something else. IBM needs to rebuild Domino's SSL/TLS support from the ground up, and it needs to look forward to TLS 1.3 that is expected to be approved in 2015, as well as SHA3.