<< < 1 2 3 4 5 6 > >>   ∑:133  Sort:Rank

Certificate Properties OCSP Tab
The OCSP tab is used by administrators to add Online Certificate Status Protocol (OCSP) responder URLs to issuing certification authority (CA) certificates, which are distributed by Group Policy to Active Directory domain members. This enables organizations to add OCSP responders to an existing publ...
2016-07-22, 2397🔥, 0💬

View the Certificates in a PKCS #7 file
If multiple certificates are exported and saved as PKCS #7 files, or if some time has passed since the file was created, it may not be obvious what certificates a PKCS #7 file contains. The following procedure allows you to inspect the certificates contained in a PKCS #7 file. Users or local Ad...
2016-07-22, 2038🔥, 0💬

Certificate Properties Cross-Certificates Tab
Cross-certificates are used to establish trust between separate certification hierarchies, such as in separate networks or portions of a network. In these cases, cross-certificates are typically configured to: Define the namespaces for which certificates issued in one certification hierarchy can be ...
2016-07-22, 1775🔥, 0💬

Certificate Properties Extended Validation Tab
The Extended Validation tab is used by administrators to add an Extended Validation (EV) certificate policy to root certificates that are distributed by Group Policy. Adding the EV certificate policy to root certificates and certificates issued to intranet Web sites provides a visual indicator that ...
2016-07-22, 1703🔥, 0💬

Certificate Properties General Tab
The General tab can be used to provide a display name and description that can be used to differentiate between two certificates that are similar, such as two unique signing certificates. You can also use the General tab to enable or disable specific purposes or uses for the certificate. ✍ Note Y...
2016-07-22, 1412🔥, 0💬

Display Archived Certificates
Archived certificates are certificates that have expired or have been renewed. In many cases, it is good practice to retain archived certificates instead of deleting them. For example, you might keep an archived certificate to verify digital signatures on old documents that were signed by using the ...
2016-07-21, 4023🔥, 0💬

Modify the Properties of a Certificate
You can modify the properties of a certificate for a number of reasons: Adding or modifying a display name to help differentiate it from other similar certificates. Changing the purpose of the certificate by adding or disabling purposes. Specifying cross-certificate download locations. Users or loca...
2016-07-21, 3794🔥, 0💬

Find Certificates
The Find Certificates dialog box allows you to locate certificates based on criteria that you specify. Users or local Administrators is the minimum group membership required to complete this procedure. Review the details in "Additional considerations" in this topic. ☞ To find a certificate In the...
2016-07-21, 2048🔥, 0💬

Delete a Certificate
Certificates can become obsolete for a number of reasons, such as when they are compromised, become corrupted, or are replaced by a new certificate. However, even when a certificate is deleted, the corresponding private key is not deleted. ! Important Before deleting a certificate, be sure that you ...
2016-07-21, 1660🔥, 0💬

View Certificate Revocation List Details
Certificate revocation lists (CRLs) are used to distribute information about revoked certificates to individuals, computers, and applications attempting to verify the validity of certificates. The Revocation List tab lists the serial numbers of certificates that have been revoked and the date they w...
2016-07-21, 1380🔥, 0💬

Export a Certificate with the Private Key
In some cases, you may want to export a certificate with its private key to store on removable media or to use on a different computer. There are some restrictions to this procedure: A private key is exportable only when it is specified in the certificate request or certificate template that was use...
2016-07-20, 1686🔥, 0💬

Move Certificates
Many applications look for a certificate in only one certificate store. If a certificate is not in the certificate store that you need, you can move it from one store to another. Users or local Administrators is the minimum group membership required to complete this procedure. Review the details in ...
2016-07-20, 1627🔥, 0💬

Export a Certificate
You can export a certificate in order to import a copy on a different computer or device or to store a copy in a secure location. If you are exporting certificates for import onto a computer running Windows, PKCS #7 format is the preferred export format. This format preserves the chain of certifica...
2016-07-20, 1592🔥, 0💬

Import a Certificate
You should only import certificates obtained from trusted sources. Importing an unreliable certificate could compromise the security of any system component that uses the imported certificate. You can import a certificate into any logical or physical store. In most cases, you will import certificate...
2016-07-20, 1442🔥, 0💬

Automate Certificate Management
Managing certificates individually can be a laborious, if not impossible, task. Many organizations will manage certificates by using Group Policy settings configured on a server and applied to client computers in a domain, group, or organizational unit. The following options can be viewed on a clien...
2016-07-20, 1386🔥, 0💬

Credential Roaming
Credential roaming allows organizations to store certificates and private keys in Active Directory Domain Services (AD DS) separately from application state or configuration information. How credential roaming works Credential roaming uses existing logon and autoenrollment mechanisms to securely do...
2016-07-17, 5495🔥, 0💬

Manage Network Retrieval and Path Validation
To be effective, certificate-related data such as trusted root certificates, cross- certificates, and certificate revocation lists (CRLs) must be updated in a timely manner. Network retrieval and path validation settings allow administrators to: Automatically update certificates in the Microsoft Roo...
2016-07-17, 5238🔥, 0💬

Certificate Path Validation
As certificate use for secure communication and data protection is increasing, administrators can use certificate trust policy to enhance their control of certificate use and public key infrastructure performance by using certificate path validation settings. Certificate path validation settings in ...
2016-07-17, 5099🔥, 0💬

Manage Trusted Publishers
Software signing is being used by a growing number of software publishers and application developers to verify that their applications come from a trusted source. However, many users do not understand or pay little attention to the signing certificates associated with applications that they install....
2016-07-17, 3972🔥, 0💬

Manage Trusted Root Certificates
Because of the growing variety of certificates in use today and the growing number of certificate issues, some organizations may want to manage certificate trust and prevent users in the domain from configuring their own set of trusted root certificates. In addition, some organizations may want to i...
2016-07-17, 2994🔥, 0💬

Required Root Certificates for Windows XP
What are required root certificates for Windows XP and other Windows systems? I was told to not touch these certificates. Some root certificates are required and trusted in Windows XP, and in Windows Server 2003. Here is why: As part of a public key infrastructure (PKI) trust management procedure, s...
2016-07-16, 4501🔥, 0💬

Required Root Certificates for Windows 2000
What are required root certificates for Windows 2000? I was told to not touch these certificates. Some root certificates are required and trusted in Windows 2000. Here is why: As part of a public key infrastructure (PKI) trust management procedure, some administrators may decide to remove trusted ro...
2016-07-16, 2756🔥, 0💬

Troubleshoot Certificate-Related Problems
This section lists a few common issues you may encounter when using the Certificates snap-in or working with certificates. What problem are you having? I cannot enroll for a new certificate by using the Certificate Request Wizard. I get a message indicating that I need to enroll for a new certificat...
2016-07-15, 2022🔥, 0💬

Manage Revocation Checking Policy
Revocation of a certificate invalidates a certificate as a trusted security credential prior to the scheduled expiration of its validity period. A public key infrastructure (PKI) depends on distributed verification of credentials in which there is no need for direct communication with the central tr...
2016-07-15, 1943🔥, 0💬

<< < 1 2 3 4 5 6 > >>   ∑:133  Sort:Rank