System Center Operation Manager or OpsMgr in short SCOM, a tool that plays a key role in maintaining the health of the whole Windows infrastructure of an organization. IT teams use this tool to monitor the health & performance, send configurations, apply OS & app patches, and run the scripts on SCOM agents to keep the health of infra. To make use of SCOM services, all the workstations and servers should be connected and reported to the SCOM servers. SCOM can manage the domain workstations and domain servers using the default Kerberos protocol over network ports 5723 & 5724. But, how SCOM will manage the workgroup computers and the machines that are in a domain that doesn’t trust Ops Manager? This is why SCOM needs digital certificates to manage untrusted SCOM clients. SCOM can manage the untrusted clients by importing certificates in both Gateway or Management Server and the client machine not joined to the domain. This required creating a specific certificate template in the internal CA server to issue the certificates for SCOM clients, the management server, and gateways. So, we have created a detailed step-by-step procedure to create a SCOM certificate template in this post.
Follow this procedure to create a SCOM certificate template on the internal CA servers.
Issue the ‘certsrv’ command on the CLI
Right-click on the ‘Certificate Template’.
Fill in the Template Name, Validity, and Renewal Period in the general setting tab
Choose ‘Windows Server 2003‘ in the Capability Authority dropdown and Windows XP/ Server 2003 in the ‘Certificate recipient‘ dropdown
Set the Purpose to the ‘Signature and Encryption‘ and check the ‘Allow private key to be exported.
Set these three settings in the cryptography settings tab.
Provider Category: Legacy Cryptography Service Provider
Algorithm name: Determined by CSP
Minimum Key Size: 1024 or 2048 as per Organisation security requirement.
Select the ‘Request must use one of the following providers‘Click on ‘Microsoft RSA SChannel Cryptographic Provider
The Key Attestation tab should look like the one below
It should be like this
Edit the ‘Application Policies‘. Add the Server Authentication and Client Authentication Policies to the Application Policy.
Application policy should look like this
Take a look at the Basic Constraints in Extension settings
See the Issuance policy in the Extension settings below
Edit ‘Key Usage‘Select ‘Digital Signature‘ under the signatureSelect ‘Allow key exchange only with key encryption‘Select ‘Make this extension critical‘
Select ‘Supply in the request‘
Your Issuance requirements should be like this
After creating the certificate template publish the template.1. Right Click on Certificate Template
2. Click New
3. Click Create Template to issue
Upon creating a SCOM certificate template, create a certificate syringing request from a SCOM client computer and submit the CSR , and get it signed with your internal PKI server. After you get the certificate check the private key is exported along with the certificate as shown here.
Thanks for reading the post. Please share the post with those who are struggling to create a SCOM certificate template on their internal CA server.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.