I do have a provider that complains the trusted root certificates on our several windows server systems (2008, 2012, 2016, 2019) are outdated. I was not able to prove the opposite. For sure "Turn off Automatic Certificate Update" is not configured on any of those systems and thus the root storage should be updated.
First question: Anyway, is there a simple automated way (or even a slick tool) that would compare the actual installed trusted root certificates on a windows system against the newest trusted root on the internet?
I could
- download the latest root certificates with "certutil -generateSSTFromWU WURoots.sst"
- do some magic with the PowerShell *CERT* commands (see "Get-Command *CERT*")
- do compare serial numbers, thumbprint, etc..
Yet, I am not really a programmer.
Perhaps there is a tool around which would do what I'd need?
Second question: Besides comparing, is there a simple way to force the root certificates to be updated? Yes, I could go the way with
- certutil -generateSSTFromWU WURoots.sst
- select the certificates I need and export it into an own .sst file
- use Import-Certificate (or distribute over GPO)
There is surely a less complicated and more automated way?
Thanks Dan