cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
McDuff
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 1 of 6

Migration from SHA11to SHA-2 and new installs post migration

Jump to solution

Greetings!

Re: Migration from SHA-1 to SHA-2 certificates is needed after upgrading to ePolicy Orchestrator (trelli... 

We use OSD to apply a packaged version of the agent to new Windows 10 builds.

My question is for step 5 the "waiting for sufficient saturations" step.  If we create an SCCM package with the Trellix Agent during the "saturation stage" (but prior to activating) will the updated certificates be in the new framepkg.exe, sufficient for new installs?  Or, do we need to wait until we've fully activated the certificates before obtaining a new copy of framepkg to create a new SCCM package from?

1 Solution

Accepted Solutions
cdinet
Employee
Employee
Report Inappropriate Content
Message 2 of 6

Re: Migration from SHA11to SHA-2 and new installs post migration

Jump to solution

If you create an agent package in its current state to use for that, it will create one that includes both sha1 and sha2 certs, so the new clients should be fine.  Sha1 cert will be removed then when migration is finalized, but until then, they will have both.

Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?

View solution in original post

5 Replies
cdinet
Employee
Employee
Report Inappropriate Content
Message 2 of 6

Re: Migration from SHA11to SHA-2 and new installs post migration

Jump to solution

If you create an agent package in its current state to use for that, it will create one that includes both sha1 and sha2 certs, so the new clients should be fine.  Sha1 cert will be removed then when migration is finalized, but until then, they will have both.

Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?

McDuff
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 3 of 6

Re: Migration from SHA11to SHA-2 and new installs post migration

Jump to solution

Thanks for the prompt response!  🙂

McDuff
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 4 of 6

Re: Migration from SHA11to SHA-2 and new installs post migration

Jump to solution

@cdinet one more question, if I may.

When I go into Certificate Manager, it looks like someone has already chosen to regenerate a new certificate and it's just waiting for someone to click Activate Certificate.  My question is should the certificate still show 1024 prior to activation (see my attached screenshot)?

I don't recall regenerating a new certificate so it's possible that the regenerated certificate is very old.

We have close to 100% saturation at the moment, but wondering if the displayed certificate needs to be 2048.  Wondering if I should regenerate a new one and wait a few weeks or if there's any way to verify within the cabundle.cer whether the certificate is 1024 or 2018.  Thoughts?

  

cdinet
Employee
Employee
Report Inappropriate Content
Message 5 of 6

Re: Migration from SHA11to SHA-2 and new installs post migration

Jump to solution

Go through this kb - make sure you have the backup folder it mentions and check your status with that.  You can cancel and restart it if things don't look right.

https://kcm.trellix.com/corporate/index?page=content&id=KB91288

Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?

McDuff
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 6 of 6

Re: Migration from SHA11to SHA-2 and new installs post migration

Jump to solution

Also, a way to verify the certificate you're prepopulating is SHA-2 is to do the following on any existing client that's already been pre-staged:

1.  Open up "C:\ProgramData\McAfee\Agent\cabundle.cer" from any client with notepad.  As @cdinet mentioned, look for 4 entries to indicate the client has both the (future) new and the (current) old certificates.

2.  As the KB states, you can also export sitelist.xml from the ePO server and look for 4 certificate entries (as opposed to 2), and confirm they're the same certificates you see in "C:\ProgramData\McAfee\Agent\cabundle.cer" on any client.  To export sitelist, from ePO, go to Software | Master Repository | Actions | Export Sitelist

3.  To confirm the new certificates are SHA-2, while still viewing "C:\ProgramData\McAfee\Agent\cabundle.cer"  in notepad, copy the bottom two certificates from -----BEGIN CERTIFICATE----- to -----END CERTIFICATE----- into two new notepad files, and save the files (e.g. Test.cer and Test2.cer).  Then. double click the files and confirm they are SHA-2 (sha265RSA).

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from product experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by employees.
Join the Community
Join the Community