Secondary root certificate for TLS might need to be updated
Last Modified: 2024-02-05 11:34:20 Etc/GMT
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
After December 1, 2024, please log in to the Thrive Portal for support, knowledge articles, tools, and downloads. For information about using the Thrive Portal, view the Trellix Thrive Portal User Guide.
Secondary root certificate for TLS might need to be updated
Technical Articles ID:
KB92937
Last Modified: 2024-02-05 11:34:20 Etc/GMT EnvironmentAll Microsoft Windows operating systems
All Linux operating systems
All macOS operating systems
Summary
Our product line uses TLS for secure communication. Two certificates validate our TLS chains, including a primary certificate that expires in 2038 and a secondary certificate that expired at 10:48 GMT on May 30, 2020. If either certificate, or both, are present in your environment, TLS functions correctly before May 30, 2020. After May 30, 2020, only the primary certificate is valid. Out of an abundance of caution, we're informing customers of this event. Generally, certificates are auto-updated through operating systems and customers aren't impacted. But, customers might see an impact in environments when the following hold true:
The secondary certificate that has expired is as below.
The certificate replacing the secondary certificate is as below.
FAQs What's the immediate action that I need to take? You need to make sure that you have the primary certificate installed in your environment for all Windows systems. How do I figure out if a system has an updated root certificate, and can I update it remotely? To determine whether the system has the updated root certificate, see KB92948 - How to check if a system has an updated root certificate and apply the certificate from Group Policy. The article also describes how you can apply the fix using Group Policy. Are Linux environments impacted? The certificate expiration doesn't impact Linux environments that use Endpoint Security for Linux Threat Prevention or VirusScan Enterprise for Linux. Are macOS environments impacted? For Endpoint Security for Mac environments, see KB92950 - Endpoint Security for Mac Global Threat Intelligence queries fail after a root certificate expired on May 30, 2020. Why is the certificate not updated automatically? By default, the Windows update automatically updates the trusted root certificates. Administrators can choose to disable this feature in favor of managing their environments' certificates manually. Also, some environments might have limited or no internet connectivity for the Windows updates to automatically update the certificate stores. Does the update of the certificate require a reboot? No. A reboot isn't needed after you update the certificate. Does this affect manageability from ePolicy Orchestrator (ePO)? ePO manageability isn't affected. For the possible issue with ePO, see KB92954 - Some ePO features or integrations might start to fail after May 29, 2020. Solution 1
Option 1 - Windows: Install the certificate using Active Directory (AD) Group Policy
To determine whether the system has the updated root certificate, see KB92948 - How to check if a system has an updated root certificate and apply the certificate from Group Policy. We recommend that you install certificates using AD Group Policy for wide deployment.
Option 2 - Windows: Install the certificate directly on the systemTo update the certificate attached to this article on the systems using AD Group Policy, follow the instructions given in KB92948 - How to check if a system has an updated root certificate and apply the certificate from Group Policy. The certificate is attached to this article as If you have a single system or only a few systems, you can use either of the following files to install the certificate directly on the system. Or, you can install the certificates remotely using any appropriate administrative deployment method. To install the certificates, perform one of the following actions:
We recommend that you install certificates using AD Group Policy for wide deployment. If this method isn't an option in your environment, you can also choose to use an ePO-deployable package to install the certificate. To install the certificate using this method, follow the steps below:
Solution 2Linux: Check whether the certificate is present and add it if needed
Solution 3
macOS: To remediate this issue for Endpoint Security for Mac, see KB92950 - Endpoint Security for Mac Global Threat Intelligence queries fail after a root certificate expired on May 30, 2020.
Related Information
See also the following related articles:
Attachment 1Attachment 2Attachment 3Attachment 4Affected ProductsLanguages:This article is available in the following languages: |
|