ALERT: Some images may not load properly within the Knowledge Base Article. If you see a broken image, please right-click and select 'Open image in a new tab'. We apologize for this inconvenience.

Endpoint Protection 14.2 clients fail to communicate with the Endpoint Protection Manager when using a self-signed certificate created with openssl

book

Article ID: 172400

calendar_today

Updated On:

Products

Endpoint Protection

Issue/Introduction

When utilizing a self-signed certificate created with openssl, Endpoint Protection (SEP) clients running 14.2 will not communication with the Endpoint Protection Manager (SEPM) when "Verify certificate when using HTTPS protocol" is enabled and the certificate is installed in the local computer's certificate store under "Trusted Root Certificate Authorities."

Environment

  • 14.2 SEP Client
  • "Verify certificate when using HTTPS protocol" enabled
  • Self-signed certificate installed on the client under local computer > trusted root certificate authorities

Resolution

{KNOWN_ISSUE.EN_US}