Enabling certificate services autoenrollment GPO's broke antivirus on Pre 2008R2/W7 systems
I recently discovered a problem with our Symantec Endpoint Protection software not starting it's services on our winxp and 2008 systems. I'm seeing a few errors, but event logs show a timeout waiting for response from the service. I get the following error in the event log: A timeout was reached (30000 milliseconds) while waiting for the Symantec Settings Manager service to connect. After working with symantec on this issue and digging into it on my own, I found that it seems to have started when our default domain policy was updated recently. I moved a server to an OU with inheritance blocked, and confirmed that SEP started working again. As far as I can tell, the only change made on the day the problem started was adding certificate services related policies. I'm not the one that added these, but he and I have both looked over the policies and can't see why it would be affecting SEP. Here is the portion of the policy that I believe was added the day this SEP problem began. Can anyone see something in this GPO, or think of something related to this that would cause SEP services to not start? Under Computer Configuration: Public Key Policies/Certificate Services Client - Auto-Enrollment Settings Policy Setting Automatic certificate management Enabled Option Setting Enroll new certificates, renew expired certificates, process pending certificate requests and remove revoked certificates Enabled Update and manage certificates that use certificate templates from Active Directory Enabled Public Key Policies/Certificate Path Validation Settings/Stores Policy Setting Allow user trusted root Certificate Authorities (CAs) to be used to validate certificates Enabled Allow users to trust peer trust certificates Enabled Peer trust certificate purposes: Client Authentication; Secure Email; Encrypting File System Root CAs that client computers can trust: Third-Party Root Certification Authorities and Enterprise Root Certification Authorities For certificate-based authentication of users and computers, along with CAs that are registered in Active Directory, the client computer must use should also use user principal name (UPN) constraint compliant CAs Disabled Public Key Policies/Certificate Path Validation Settings/Trusted Publishers Policy Setting Trusted Publishers can be managed by: All administrators only Verify that certificate is not revoked when adding Disabled Verify that certificate has a valid time stamp when adding Disabled Public Key Policies/Certificate Path Validation Settings/Network Retrieval Policy Setting Default URL retrieval timeout in seconds 15 Default path validation cumulative timeout in seconds 20 Allow issuer certificate retrieval during path validation Enabled Default cross-certificate download interval in hours 168 Public Key Policies/Encrypting File System Certificates Issued To Issued By Expiration Date Intended Purposes Administrator Administrator 12/24/2008 4:44:28 PM File Recovery For additional information about individual settings, launch Group Policy Object Editor. Public Key Policies/Automatic Certificate Request Settings Automatic Certificate Request Computer For additional information about individual settings, launch Group Policy Object Editor. Public Key Policies/Trusted Root Certification Authorities Properties Policy Setting Allow users to select new root certification authorities (CAs) to trust Enabled Client computers can trust the following certificate stores Third-Party Root Certification Authorities and Enterprise Root Certification Authorities To perform certificate-based authentication of users and computers, CAs must meet the following criteria Registered in Active Directory only Under User Configuration: Security Settings Public Key Policies/Certificate Services Client - Auto-Enrollment Settings Policy Setting Automatic certificate management Enabled Option Setting Enroll new certificates, renew expired certificates, process pending certificate requests and remove revoked certificates Enabled Update and manage certificates that use certificate templates from Active Directory Enabled Show certificate expiry notifications Disabled
August 30th, 2011 9:09am

It is very hard to give an exact answer to this, but I can possibly think of the setting below as a possible cause if the service uses certificate based authentication and has its own trust "To perform certificate-based authentication of users and computers, CAs must meet the following criteria" with the value "Registered in Active Directory only" /Hasain
Free Windows Admin Tool Kit Click here and download it now
August 31st, 2011 2:58am

Okay, I found the specific policy setting that seems to be causing this problem. : Trusted Publishers can be managed by: All administrators only I'm not sure exactly why this is affecting it, but when I change this setting to "Allow all administrators and users to manage user's own trusted publishers", symantec starts working again. Is there something that 2008 handles differently about this policy than 2008 R2? (Our Win7 and R2 systems were not affected by this problem, only 2008 and XP machines.)
August 31st, 2011 7:13pm

Good, I just missed that one! The trusted publisher tells the system when and how to trust signed applications, scripts, drivers and installation packages. The reason it only affected XP and 2008 but not R2 and W7 might be related to 32/64 bit and differences in how the service/driver software is signed. /Hasain
Free Windows Admin Tool Kit Click here and download it now
August 31st, 2011 7:22pm

Hmm, for XP that would definitely make sense, as they are all 32 bit systems where our W7 machines are all 64 bit, but I am certain that we have 64 bit 2008 servers in production that were affected by this issue. Still, it's probably somewhere in there.
August 31st, 2011 7:27pm

W7 and 2008 R2 share the same requirements for driver signing in 64 bit and requires the use of Software Publishing Certificate that chains to an approved certification authority (CA) part of the Microsoft Cross-Certificates for Windows Kernel Mode Code Signing (http://go.microsoft.com/fwlink/?linkid=150525 while Windows Vista and 2008 allow components to be signed by a certificate from "any" trusted CA. /Hasain
Free Windows Admin Tool Kit Click here and download it now
August 31st, 2011 7:38pm

The more restrictive requirements of R2 would lead me to expect 2008R2 and W7 machines to have problems, in this case they continued working normally, it was only the 2008 / xp systems affected.
August 31st, 2011 7:45pm

It is actually the opposite, as the less restrictive requirement means the software can be signed by "any" trusted publisher in the local computer and the GPO prevented software from adding the vendors own certificates as trusted publisher. The special Microsoft Cross-Certificates for Windows Kernel Mode Code Signing required by R2 & W7 is not affected by the GPO setting because it is not a "normal" publisher certificate. /Hasain
Free Windows Admin Tool Kit Click here and download it now
August 31st, 2011 7:55pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics