<< < 1 2 3 4 5 6 > >>   ∑:129  Sort:Rank

Certificate Properties General Tab
The General tab can be used to provide a display name and description that can be used to differentiate between two certificates that are similar, such as two unique signing certificates. You can also use the General tab to enable or disable specific purposes or uses for the certificate. ✍ Note Y...
2016-07-22, 1369🔥, 0💬

Display Archived Certificates
Archived certificates are certificates that have expired or have been renewed. In many cases, it is good practice to retain archived certificates instead of deleting them. For example, you might keep an archived certificate to verify digital signatures on old documents that were signed by using the ...
2016-07-21, 3975🔥, 0💬

Modify the Properties of a Certificate
You can modify the properties of a certificate for a number of reasons: Adding or modifying a display name to help differentiate it from other similar certificates. Changing the purpose of the certificate by adding or disabling purposes. Specifying cross-certificate download locations. Users or loca...
2016-07-21, 3687🔥, 0💬

Find Certificates
The Find Certificates dialog box allows you to locate certificates based on criteria that you specify. Users or local Administrators is the minimum group membership required to complete this procedure. Review the details in "Additional considerations" in this topic. ☞ To find a certificate In the...
2016-07-21, 2005🔥, 0💬

Delete a Certificate
Certificates can become obsolete for a number of reasons, such as when they are compromised, become corrupted, or are replaced by a new certificate. However, even when a certificate is deleted, the corresponding private key is not deleted. ! Important Before deleting a certificate, be sure that you ...
2016-07-21, 1634🔥, 0💬

View Certificate Revocation List Details
Certificate revocation lists (CRLs) are used to distribute information about revoked certificates to individuals, computers, and applications attempting to verify the validity of certificates. The Revocation List tab lists the serial numbers of certificates that have been revoked and the date they w...
2016-07-21, 1334🔥, 0💬

Export a Certificate with the Private Key
In some cases, you may want to export a certificate with its private key to store on removable media or to use on a different computer. There are some restrictions to this procedure: A private key is exportable only when it is specified in the certificate request or certificate template that was use...
2016-07-20, 1634🔥, 0💬

Move Certificates
Many applications look for a certificate in only one certificate store. If a certificate is not in the certificate store that you need, you can move it from one store to another. Users or local Administrators is the minimum group membership required to complete this procedure. Review the details in ...
2016-07-20, 1584🔥, 0💬

Export a Certificate
You can export a certificate in order to import a copy on a different computer or device or to store a copy in a secure location. If you are exporting certificates for import onto a computer running Windows, PKCS #7 format is the preferred export format. This format preserves the chain of certifica...
2016-07-20, 1560🔥, 0💬

Import a Certificate
You should only import certificates obtained from trusted sources. Importing an unreliable certificate could compromise the security of any system component that uses the imported certificate. You can import a certificate into any logical or physical store. In most cases, you will import certificate...
2016-07-20, 1378🔥, 0💬

Automate Certificate Management
Managing certificates individually can be a laborious, if not impossible, task. Many organizations will manage certificates by using Group Policy settings configured on a server and applied to client computers in a domain, group, or organizational unit. The following options can be viewed on a clien...
2016-07-20, 1356🔥, 0💬

Credential Roaming
Credential roaming allows organizations to store certificates and private keys in Active Directory Domain Services (AD DS) separately from application state or configuration information. How credential roaming works Credential roaming uses existing logon and autoenrollment mechanisms to securely do...
2016-07-17, 5433🔥, 0💬

Manage Network Retrieval and Path Validation
To be effective, certificate-related data such as trusted root certificates, cross- certificates, and certificate revocation lists (CRLs) must be updated in a timely manner. Network retrieval and path validation settings allow administrators to: Automatically update certificates in the Microsoft Roo...
2016-07-17, 5117🔥, 0💬

Certificate Path Validation
As certificate use for secure communication and data protection is increasing, administrators can use certificate trust policy to enhance their control of certificate use and public key infrastructure performance by using certificate path validation settings. Certificate path validation settings in ...
2016-07-17, 5030🔥, 0💬

Manage Trusted Publishers
Software signing is being used by a growing number of software publishers and application developers to verify that their applications come from a trusted source. However, many users do not understand or pay little attention to the signing certificates associated with applications that they install....
2016-07-17, 3897🔥, 0💬

Manage Trusted Root Certificates
Because of the growing variety of certificates in use today and the growing number of certificate issues, some organizations may want to manage certificate trust and prevent users in the domain from configuring their own set of trusted root certificates. In addition, some organizations may want to i...
2016-07-17, 2943🔥, 0💬

Required Root Certificates for Windows XP
What are required root certificates for Windows XP and other Windows systems? I was told to not touch these certificates. Some root certificates are required and trusted in Windows XP, and in Windows Server 2003. Here is why: As part of a public key infrastructure (PKI) trust management procedure, s...
2016-07-16, 4419🔥, 0💬

Required Root Certificates for Windows 2000
What are required root certificates for Windows 2000? I was told to not touch these certificates. Some root certificates are required and trusted in Windows 2000. Here is why: As part of a public key infrastructure (PKI) trust management procedure, some administrators may decide to remove trusted ro...
2016-07-16, 2635🔥, 0💬

Troubleshoot Certificate-Related Problems
This section lists a few common issues you may encounter when using the Certificates snap-in or working with certificates. What problem are you having? I cannot enroll for a new certificate by using the Certificate Request Wizard. I get a message indicating that I need to enroll for a new certificat...
2016-07-15, 1979🔥, 0💬

Manage Revocation Checking Policy
Revocation of a certificate invalidates a certificate as a trusted security credential prior to the scheduled expiration of its validity period. A public key infrastructure (PKI) depends on distributed verification of credentials in which there is no need for direct communication with the central tr...
2016-07-15, 1889🔥, 0💬

What is the Certificates Snap-in?
The Certificates snap-in is the primary tool for users and administrators to view and manage certificates for a user, computer, or service. The Certificates snap-in allows the user to request, renew, find, view, move, copy, and delete certificates. Why use the Certificates snap-in The Certificates s...
2016-07-15, 4893🔥, 0💬

Certificates Overview
A public key certificate, usually just called a certificate, is a digitally signed statement that binds the value of a public key to the identity of the person, device, or service that holds the corresponding private key. One of the main benefits of certificates is that hosts no longer have to maint...
2016-07-15, 2473🔥, 0💬

Public and Private Keys
In public key encryption, two different keys are used to encrypt and decrypt information. The private key is a key that is known only to its owner, while the public key can be made known and available to other entities on the network. The two keys are different but complementary in function. For exa...
2016-07-15, 1862🔥, 0💬

Using Certificates
Certificates can be used for: Authentication, which verifies the identity of someone or something. Privacy, which ensures that information is only available to the intended audience. Encryption, which disguises information so that unauthorized readers are unable to decipher it. Digital signatures, w...
2016-07-15, 1516🔥, 0💬

<< < 1 2 3 4 5 6 > >>   ∑:129  Sort:Rank