Upgrades fail due to a third-party self-signed certificate
Last Modified: 2022-03-18 14:47:11 Etc/GMT
Affected Products
Languages:
This article is available in the following languages:
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
As of May 14, 2024, Knowledge Base (KB) articles will only be published and updated in our new Trellix Thrive Knowledge space.
Log in to the Thrive Portal using your OKTA credentials and start searching the new space. Legacy KB IDs are indexed and you will be able to find them easily just by typing the legacy KB ID.
Upgrades fail due to a third-party self-signed certificate
Technical Articles ID:
KB81863
Last Modified: 2022-03-18 14:47:11 Etc/GMT EnvironmentMcAfee ePolicy Orchestrator (ePO) 5.x
Problem
An upgrade to ePO 5.9.0 or later fails because of a self-signed certificate generated by a third-party application. You see the following errors in the ePO MSI file Return code: 1 Error Message: Incorrect function. CustomAction: MerMod_StartCurrentServices Cause
A self-signed certificate generated by a third-party application blocks a remote client call during the upgrade, which causes the upgrade failure. The message in the ePO MSI file installation log is generic. To confirm the issue, you must identify the actual Fatal Alert received: Handshake Failure. SolutionTo resolve this issue:
Affected ProductsLanguages:This article is available in the following languages: |
|