Installation or upgrade to ePolicy Orchestrator fails when using SSL connection for SQL Server
Last Modified: 2023-06-28 04:34:47 Etc/GMT
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
After December 1, 2024, please log in to the Thrive Portal for support, knowledge articles, tools, and downloads. For information about using the Thrive Portal, view the Trellix Thrive Portal User Guide.
Installation or upgrade to ePolicy Orchestrator fails when using SSL connection for SQL Server
Technical Articles ID:
KB87731
Last Modified: 2023-06-28 04:34:47 Etc/GMT Environment
ePolicy Orchestrator (ePO) 5.10.x, 5.9.x Skyhigh Web Gateway (SWG) 7.x Problem 1
A fresh install or upgrade of ePO that connects to SQL over an SSL connection fails. An error similar to the following is recorded in
Also, the following pop-up error might display: Problem 2
After an ePO upgrade, some registered servers that use SSL certificates are no longer able to connect. For example, if you have a registered LDAP server that uses an SSL connection, that connection might fail.
CauseePO ships with the updated
Solution 1
Manually reorder the cipher suites on the SQL Server with a Windows Group Policy. For detailed steps, see this Microsoft document.
For the cipher suite list priority order, follow the order list found in the following Microsoft article in the New default priority order for these versions of Windows section. Solution 2
Install or update the certificate used by the SQL Server or other registered server. For more information about how to use a secured connection to the SQL Server, see KB84628 - Configurations for ePolicy Orchestrator certificate validation issue for secure database connection. NOTE: Other registered server types might also be affected if they use SSL. Example: You have a registered LDAP server and you use the secure connection. The connection fails if the certificate provided by the LDAP server uses an RSA 1024-bit public key. The solution in this scenario is to update the certificate on the LDAP server to not use a 1024-bit RSA public key. Solution 3
ePO 5.10.0 and later ePO has migrated away from the The Below is the list of ciphers present in the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA" NOTE: An upgrade is successful as long as the cipher suite on your SQL Server contains a minimum of one of the above ciphers, regardless of the order. Related Information
This issue might also affect the SWG appliance and requires a certificate update. The Bypass ePO Requests ruleset contains the SSL Scanner default root. If you encounter this issue, Technical Support recommends that you replace the RSA server key size and hash algorithm:
Affected ProductsLanguages:This article is available in the following languages: |
|