Enabling certificate services autoenrollment GPO's broke antivirus on Pre 2008R2/W7 systems
I recently discovered a problem with our Symantec Endpoint Protection software not starting it's services on our winxp and 2008 systems. I'm seeing a few errors, but event logs show a timeout waiting for response from the service. I get the following error in the event log: A timeout was reached (30000 milliseconds) while waiting for the Symantec Settings Manager service to connect. After working with symantec on this issue and digging into it on my own, I found that it seems to have started when our default domain policy was updated recently. I moved a server to an OU with inheritance blocked, and confirmed that SEP started working again. As far as I can tell, the only change made on the day the problem started was adding certificate services related policies. I'm not the one that added these, but he and I have both looked over the policies and can't see why it would be affecting SEP. Here is the portion of the policy that I believe was added the day this SEP problem began. Can anyone see something in this GPO, or think of something related to this that would cause SEP services to not start? Under Computer Configuration: Public Key Policies/Certificate Path Validation Settings/Trusted Publishers Policy Setting Trusted Publishers can be managed by: All administrators only Verify that certificate is not revoked when adding Disabled Verify that certificate has a valid time stamp when adding Disabled Public Key Policies/Trusted Root Certification Authorities Properties Policy Setting Allow users to select new root certification authorities (CAs) to trust Enabled Client computers can trust the following certificate stores Third-Party Root Certification Authorities and Enterprise Root Certification Authorities To perform certificate-based authentication of users and computers, CAs must meet the following criteria Registered in Active Directory only Edit: Removed sections of GPO reports that were unrelated to issue and/or not discussed in the thread.
August 30th, 2011 3:59pm

It is very hard to give an exact answer to this, but I can possibly think of the setting below as a possible cause if the service uses certificate based authentication and has its own trust "To perform certificate-based authentication of users and computers, CAs must meet the following criteria" with the value "Registered in Active Directory only" /Hasain
Free Windows Admin Tool Kit Click here and download it now
August 31st, 2011 9:47am

Okay, I found the specific policy setting that seems to be causing this problem. : Trusted Publishers can be managed by: All administrators only I'm not sure exactly why this is affecting it, but when I change this setting to "Allow all administrators and users to manage user's own trusted publishers", symantec starts working again. Is there something that 2008 handles differently about this policy than 2008 R2? (Our Win7 and R2 systems were not affected by this problem, only 2008 and XP machines.)
September 1st, 2011 2:02am

Good, I just missed that one! The trusted publisher tells the system when and how to trust signed applications, scripts, drivers and installation packages. The reason it only affected XP and 2008 but not R2 and W7 might be related to 32/64 bit and differences in how the service/driver software is signed. /Hasain
Free Windows Admin Tool Kit Click here and download it now
September 1st, 2011 2:11am

Hmm, for XP that would definitely make sense, as they are all 32 bit systems where our W7 machines are all 64 bit, but I am certain that we have 64 bit 2008 servers in production that were affected by this issue. Still, it's probably somewhere in there.
September 1st, 2011 2:16am

W7 and 2008 R2 share the same requirements for driver signing in 64 bit and requires the use of Software Publishing Certificate that chains to an approved certification authority (CA) part of the Microsoft Cross-Certificates for Windows Kernel Mode Code Signing (http://go.microsoft.com/fwlink/?linkid=150525 while Windows Vista and 2008 allow components to be signed by a certificate from "any" trusted CA. /Hasain
Free Windows Admin Tool Kit Click here and download it now
September 1st, 2011 2:27am

The more restrictive requirements of R2 would lead me to expect 2008R2 and W7 machines to have problems, in this case they continued working normally, it was only the 2008 / xp systems affected.
September 1st, 2011 2:34am

It is actually the opposite, as the less restrictive requirement means the software can be signed by "any" trusted publisher in the local computer and the GPO prevented software from adding the vendors own certificates as trusted publisher. The special Microsoft Cross-Certificates for Windows Kernel Mode Code Signing required by R2 & W7 is not affected by the GPO setting because it is not a "normal" publisher certificate. /Hasain
Free Windows Admin Tool Kit Click here and download it now
September 1st, 2011 2:44am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics