The installation of the Symantec Endpoint Protection (SEP) or Symantec Endpoint Security (SES) client fails with a certificate error. Additionally, if you try to use Cleanwipe tool to remove the installation, it also fails. Below are examples of errors generated during install when one or more required certificates are missing from the device.
ScriptGen: ShowServiceProgress() Look for timeout starting SepMasterService or other failure loading SIS.dll.
or
"Could not open registry key SYSTEM\CurrentControlSet\Services\SepMasterServiceMig for flushing. Error: 2"
File C:\Program Files\Symantec\Symantec Endpoint Protection\14.3.8268.5000.105\bin64\EFAInst64.exe is not trusted. Verification result: 20
or
File C:\Program Files\Symantec\Symantec Endpoint Protection\14.3.12167.10000.105\Bin64\Smc.exe is not trusted. Verification result: 3
Failed to initialize SEPRemovalToolNative. WaitForSingleObject returned 258. Last error: 0. Check C:\WINDOWS\Temp\CleanWipe_timestamp\SepRemovalToolNative_x86.log file.
The device lacks required root certificates and cannot validate the protection agent binaries. This issue can occur if:
To fix this issue, update the root certificates on the computer. This can be accomplished automatically with Windows Updates or manually by importing required certificates.
If the computer has internet access, launch Windows Update. The download and installation of the updated root certificates occurs automatically in the background. You do not need to take additional action.
If the computer does not have internet access, use the process below to download and install the necessary files. Multiple certificates are required to properly validate the Symantec Endpoint Protection binaries. Two files are attached to this document.
The Windows interface for adding certificates may look slightly different depending on your version of Windows. Symantec Technical Support does not officially support this process; these instructions are provided for your convenience.
It may also be necessary to delete one or more Symantec/Verisign certificates in the "Untrusted Certificates" folder that display the following error upon review of the root certificate before following the steps above
This certificate has been revoked by its certification authority.
When you discover that one of the certificates shows up as 'revoked' even though Symantec/Versign did not revoke the certificates, it typically means that the certificate was either moved or copied to the "Untrusted Certificates" store on the local machine.
Notes:
* In some instances additional certificates may be necessary. These are available in the Additional_Certificates_For_Backwards_Compatibility.zip attachment.
* The VeriSign_Class_3_Code_Signing_2010_CA.cer needs to be placed into the Intermediate Certification Authorities store instead of the Trusted Root Certification Authorities store.