After renewing or replacing the IIS certificate, modifying HTTPS bindings, or making changes to the Symantec Management Platform (SMP Server or Notification Server (NS)), managed endpoints stop communicating with IT Management Suite (ITMS).
Common symptoms include:
Devices appear Offline in the SMP Console
Policies are not updating
Inventory is not reported
Tasks do not execute
Agents show SSL or connection errors in logs
ITMS 8.7.x, 8.8.x
When IIS bindings or SSL certificates are modified on the Notification Server without validating:
Certificate trust chain
Agent Communication Profile configuration
HTTPS bindings
Client trust of the issuing CA
the Symantec Management Agent (SMA) cannot establish secure communication.
This issue is most commonly caused by:
Expired or replaced server certificate
Missing intermediate certificate
IIS binding misconfiguration
Agent Communication Profile mismatch
The agent itself is typically functioning correctly but fails SSL validation.
| Root Cause | Description |
|---|---|
| Expired SSL certificate | Clients reject the server certificate |
| Certificate replaced but trust not updated | Clients do not trust new issuing CA |
| Missing intermediate CA | Trust chain incomplete |
| IIS HTTPS binding misconfigured | Wrong certificate bound to port 443 |
| Agent Communication Profile mismatch | Agent attempts HTTP/incorrect port |
Follow these suggested steps:
Open IIS Manager
Navigate to:
Sites > Default Web Site
Click Bindings
Confirm:
HTTPS binding exists
Port = 443
Correct certificate is selected
If changes are required:
Open MMC > Add or Remove Snap-ins
Add Certificates (Computer Account > Local Computer)
Navigate to:
Personal > Certificates
Open the bound certificate
Select Certification Path
Confirm:
No red X
Full certificate chain present
Certificate not expired
If intermediate certificates are missing:
Import them into:
Intermediate Certification Authorities
Open SMP Console
Navigate to:
Settings > Agents/Plug-ins > Symantec Management Agent > Symantec Management Agent Communication Profiles
Open active profile
Confirm:
HTTPS enabled
Correct FQDN
Port 443 configured
Click Save Changes
Agent logs exist in two different locations depending on system type.
Location:
Rollover logs:
Location:
Rollover logs:
Search for:
SSL Errors
Connection Errors
| Scenario | Expected Entry | Problem Indicator |
|---|---|---|
| Normal communication | Configuration updated successfully | Trust relationship failure |
| Successful HTTPS | Connected to server | Certificate validation error |
| Working profile | Server resolved | Unable to resolve host |
On an affected endpoint:
Open browser
Navigate to:
Expected:
No certificate warning
Valid secure connection
If warning appears:
Client does not trust certificate
From the endpoint:
Right-click Symantec Management Agent
Click Update Configuration
Then immediately review:
You should see:
On endpoint, open a command prompt as Administrator and restart Symantec Management Agent service:
Then recheck agent.log for any relevant log entries.
If certificate is valid but communication still fails:
Open certificate details
Review CRL Distribution Points
Ensure endpoints can reach CRL URLs
Blocked CRL access may cause certificate validation failure.
CRL (Certificate Revocation List) Distribution Points define where Windows checks whether a certificate has been revoked.
If endpoints cannot reach the CRL URL listed in the server certificate, SSL validation may fail and agents will not communicate.
Use this method to inspect the certificate bound in IIS.
On the SMP Server, press Win + R
Type:
Click File > Add/Remove Snap-in
Add Certificates
Select Computer account
Select Local computer
Click OK
Navigate to:
Identify the certificate bound to HTTPS (same thumbprint shown in IIS bindings).
Double-click the certificate.
Go to the Details tab.
Scroll down and select:
Click Edit or double-click the field.
You will see one or more URLs similar to:
| Check | Expected |
|---|---|
| URLs listed | Reachable from endpoints |
| Protocol | Usually HTTP |
| Internal vs External | Must match client network access |
| No unreachable legacy URLs | Old CA URLs should not exist |
This is the most important validation step.
From an affected endpoint:
Copy the CRL URL.
Paste it into a browser.
Expected:
File downloads
Or browser shows raw CRL data
If:
Page times out
DNS cannot resolve
Connection refused
then, CRL is unreachable.
From affected endpoint:
Export the server certificate from MMC (Base-64 encoded X.509).
Copy to affected endpoint.
Run the command above.
Select:
CRL Retrieval
Click Retrieve
When the Symantec Management Agent connects over HTTPS:
Windows validates the certificate chain.
Windows checks revocation status via CRL.
If CRL is unreachable, validation fails.
Agent logs show:
Depends on environment:
Ensure CA is publishing CRL
Ensure HTTP location is reachable
Allow outbound HTTP to CRL host
Remove unreachable CRL entries
Reissue certificate from CA
Restart agent (run the following from a command prompt as Administrator) on the client machine :
Check:
Expected:
Confirm device shows Online in Console.
CRL validation behavior depends on:
Windows Schannel settings
Certificate revocation checking configuration
Security baseline / GPO
It is not ITMS-specific behavior — it is Windows certificate validation behavior.
| Validation Step | Expected Result |
|---|---|
| HTTPS test in browser | No certificate warning |
| agent.log review | No SSL errors |
| Console view | Device shows Online |
| Last Configuration Request | Updates successfully |
Reinstall only if:
Agent installation corrupted
Service will not start
GUID mismatch persists
Certificate thumbprint mismatch remains after profile correction
Reinstallation is not typically required for certificate replacement issues. Running AexNSCHTTPS.exe (AeXNSChttps.exe - package contains NS URL HTTPS address, certificates, and other settings from the Communication profile) should have everything needed for the client machine to communicate back to the SMP Server.