The most recent content from our members.
With the changes coming to the maximum length of time certificates can be valid, it would be awesome if there was a way to automate this replacement. While it will still be manageable for the next few years, it will eventually be untenable to do it manually for all the different certificates we have to manage in IT . We've…
Hello, My server admins came to me today with an odd issue. They were having some WRM communication issues with some of my polling engines and found the issue was that each of my polling engines have not only their own certificates but also the certificates for my primary polling engine host. I have no explanation as to…
All certificates in below display sections needs to be monitored for expiration and validity. Device-Certificate Management- Certificate
I'm trying to create a recording for a website with a self-signed certificate. I get I've tried adding the FQDN and IP from the machine hosting the website to the Hosts file on the Orion server, as suggested in the WPM documentation, but this doesn't seem to work. The documentation also suggests to configure the recording…
Provide the ability to import and manage certificates .
Tales From the Support Queue: A How-To Guide for Fixing Certificate Revocation Issues Digital Signing Certificate revocation is a common, transparent, and effective mechanism for application developers to help ensure users aren’t running unsupported or insecure software. It’s a demonstrably Good Thing. There’s one scenario…
I have recently written about two major reasons to keep your certificate stores clean: * Microsoft KB2661254 invalidates certificates with a key length of 1024 bits or smaller on all supported Windows systems. * Microsoft's algorithm for searching and scanning certificates in the Trusted Root Certification Authorities…
$eCerts = Get-ChildItem -Path cert:\LocalMachine -Recurse -ExpiringInDays 90 Write-Host "Statistic:" $eCerts.Count Write-Host "Message:" $eCerts.SerialNumber $eCerts.NotAfter $eCerts.Subject Exit 0 Above is the script which runs fine and returns expected results in the script editor and on the remote server. Testing is…
SAM provides with the option for monitoring the SSL certificates expiry but it automatically chooses one of the many deployed SSL certificates, which make it difficult to monitor all the installed SLL certificates. There should be an option which lists all the SSL certificates and the administrator can choose between them.
I see posting on how to configure Solarwinds to monitor and alert for 60/90 days before a Cert expires, but where/how do you actually see how many days are remaining? I can't just "Trust" that Solarwinds is going to notify me. -Akak
It looks like you're new here. Sign in or register to get started.