Method 2: Get a new certificate pair right from your CA in a .pfx keystore format and then import it into the a keystore for use with DLP
Get the new certificate in a pfx format from your CA.
If you are going to change the keystore type, then the private key password of the cert needs to be the current keystore password (default "protect")
If you plan to export/import from the pfx to the .keystore, then any password will be fine.
Create a new keystore with the certificates
First create a directory called NEW under root drive as we will place new keystore and all files in this directory.
Run the following command: keytool -importkeystore -deststorepass protect -destkeypass protect -destkeystore "/path/to/NEW/keystore/.keystore" -srckeystore "/path/to/certificates/enforce.pfx" -srcstoretype PKCS12 -srcstorepass password_for_pfx
Make sure the certs imported correctly using the following command: keytool -list -v -keystore /path/to/NEW/eystore/.keystore
Find the imported certs alias. Typically it will be a UID or the FQDN for the server.
To change the alias, use the following command: keytool -changealias -alias "ORIGINAL_ALIAS_FROM_PREVIOUS_STEP" -destalias "tomcat" -keystore "/path/to/NEW/keystore/.keystore" -storepass protect
Move the new keystore into the enforce tomcat directory. Example: <DRIVE>\Program Files\Symantec\DataLossPrevention\EnforceServer\<VERSION>\Protect\tomcat\conf\.keystore
Recycle the DLP Manager service
Enforce should now be using the newly created certificates.