ALERT: Some images may not load properly within the Knowledge Base Article. If you see a broken image, please right-click and select 'Open image in a new tab'. We apologize for this inconvenience.
Endpoint Protection 14.2 clients fail to communicate with the Endpoint Protection Manager when using a self-signed certificate created with openssl
book
Article ID: 172400
calendar_today
Updated On:
Products
Endpoint Protection
Issue/Introduction
When utilizing a self-signed certificate created with openssl, Endpoint Protection (SEP) clients running 14.2 will not communication with the Endpoint Protection Manager (SEPM) when "Verify certificate when using HTTPS protocol" is enabled and the certificate is installed in the local computer's certificate store under "Trusted Root Certificate Authorities."
Environment
14.2 SEP Client
"Verify certificate when using HTTPS protocol" enabled
Self-signed certificate installed on the client under local computer > trusted root certificate authorities