SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Cryoserver 
Certificate Fix 
Forensic & Compliance Systems Ltd 
+44 (0)800 280 0525 
info@cryoserver.com 
www.cryoserver.com 
January 2008
Cryoserver Certificate Fix 
This document describes how to install an SSL certificate for all users in a domain under 
MS Server 2003. 
1. Start Internet Explorer and go to the Cryoserver interface. 
You see the website security certificate error: 
2. Click Continue to this website (not recommended). 
You see the Untrusted Certificate warning: 
2008 FCS. All rights reserved. Page 2 of 11
Cryoserver Certificate Fix 
3. Click View certificates. 
You see the Certificate Properties dialog box: 
4. Click Install Certificate to start the Certificate Import Wizard: 
2008 FCS. All rights reserved. Page 3 of 11
Cryoserver Certificate Fix 
5. Click Next. 
You see the import options: 
6. Select Place all certificates in the following store and then click Browse… 
You see the Select Certificate Store dialog box: 
From the list of Certificate Stores, click Trusted Root Certificate Authorities and 
then click OK. 
2008 FCS. All rights reserved. Page 4 of 11
Cryoserver Certificate Fix 
7. Click Next. 
8. Click Finish. 
You see a confirmation message stating that the import was successful: 
9. Close and then restart Internet Explorer. 
After restarting Internet Explorer 
1. Click Tools, Internet Options: 
2008 FCS. All rights reserved. Page 5 of 11
Cryoserver Certificate Fix 
You see the Internet Options dialog box: 
2. Select the Content tab and then click Certificates. 
You see the Certificates dialog box: 
2008 FCS. All rights reserved. Page 6 of 11
Cryoserver Certificate Fix 
3. Select the Trusted Root Certification Authorities tab. Select your certificate from 
the list and then click Export. 
The Certificate Import Wizard starts: 
4. Click Next. 
You see the File Format options, with the DER encoded binary X.509 (.CER) 
selected as default: 
2008 FCS. All rights reserved. Page 7 of 11
Cryoserver Certificate Fix 
5. Click Next. 
You see the File to Export dialog box: 
6. Click Browse… to specify where you want the certificate to be exported to and then 
click Next. 
2008 FCS. All rights reserved. Page 8 of 11
Cryoserver Certificate Fix 
7. Click Finish. 
You see a confirmation message stating that the export was successful: 
Group Policy Editor 
1. Click Start, Run and type in gpmc.msc and then click OK. 
You see the Group Policy Object Editor window: 
2. Right-click Trusted Root Certification Authorities and then click Import. 
You see the File to Import dialog box: 
2008 FCS. All rights reserved. Page 9 of 11
Cryoserver Certificate Fix 
3. Click Browse… and select your .CER file. Then click Next. 
You see the Certificate Store dialog box: 
4. Click Next and check your changes: 
2008 FCS. All rights reserved. Page 10 of 11
Cryoserver Certificate Fix 
5. Click Finish. 
You see a confirmation message stating that the import was successful: 
6. Close all open windows and your group policy will be applied. This can take a while to 
filter down to domain users – maybe 15 minutes or more. 
NOTE: Domain users will have to log off and then log on again for the policy to take 
effect. 
2008 FCS. All rights reserved. Page 11 of 11

Contenu connexe

Tendances

Let’s start with the configuration steps of smtp
Let’s start with the configuration steps of smtpLet’s start with the configuration steps of smtp
Let’s start with the configuration steps of smtpAlthaf Althaf
 
How to remove startgo123.com hijacker from infected browsers easily
How to remove startgo123.com hijacker from infected browsers easilyHow to remove startgo123.com hijacker from infected browsers easily
How to remove startgo123.com hijacker from infected browsers easilyharoNaroum
 
How to Renew ringEmail uConnect from your Mobile Phone?
How to Renew ringEmail uConnect from your Mobile Phone?How to Renew ringEmail uConnect from your Mobile Phone?
How to Renew ringEmail uConnect from your Mobile Phone?Clearhub Pte Ltd
 
SAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingSAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingRishikesh Sah
 
Uninstallting microsoft sql server 2016
Uninstallting microsoft sql server 2016Uninstallting microsoft sql server 2016
Uninstallting microsoft sql server 2016AllDatabaseSolutions
 
Installing v mware esxi server
Installing v mware esxi serverInstalling v mware esxi server
Installing v mware esxi serversudhir singh yadav
 
Disable windows update
Disable windows updateDisable windows update
Disable windows updatePlanetB4U
 
Setup Outlook 2013 with Exchange 2013
Setup Outlook 2013 with Exchange 2013Setup Outlook 2013 with Exchange 2013
Setup Outlook 2013 with Exchange 2013thexyz
 
Ocodewire Magento_Customer_Registration_Email_Notifications_Extension_Demo
Ocodewire Magento_Customer_Registration_Email_Notifications_Extension_DemoOcodewire Magento_Customer_Registration_Email_Notifications_Extension_Demo
Ocodewire Magento_Customer_Registration_Email_Notifications_Extension_DemoMagento oCodewire
 
How to log on to windows server 2008
How to log on to windows server 2008How to log on to windows server 2008
How to log on to windows server 2008PasswordSeeker
 

Tendances (11)

Let’s start with the configuration steps of smtp
Let’s start with the configuration steps of smtpLet’s start with the configuration steps of smtp
Let’s start with the configuration steps of smtp
 
How to remove startgo123.com hijacker from infected browsers easily
How to remove startgo123.com hijacker from infected browsers easilyHow to remove startgo123.com hijacker from infected browsers easily
How to remove startgo123.com hijacker from infected browsers easily
 
How to Renew ringEmail uConnect from your Mobile Phone?
How to Renew ringEmail uConnect from your Mobile Phone?How to Renew ringEmail uConnect from your Mobile Phone?
How to Renew ringEmail uConnect from your Mobile Phone?
 
SAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue HandlingSAP Cloud for Customer - User Creation & Password issue Handling
SAP Cloud for Customer - User Creation & Password issue Handling
 
Uninstallting microsoft sql server 2016
Uninstallting microsoft sql server 2016Uninstallting microsoft sql server 2016
Uninstallting microsoft sql server 2016
 
Setup thunderbird for imap access to google apps
Setup thunderbird for imap access to google appsSetup thunderbird for imap access to google apps
Setup thunderbird for imap access to google apps
 
Installing v mware esxi server
Installing v mware esxi serverInstalling v mware esxi server
Installing v mware esxi server
 
Disable windows update
Disable windows updateDisable windows update
Disable windows update
 
Setup Outlook 2013 with Exchange 2013
Setup Outlook 2013 with Exchange 2013Setup Outlook 2013 with Exchange 2013
Setup Outlook 2013 with Exchange 2013
 
Ocodewire Magento_Customer_Registration_Email_Notifications_Extension_Demo
Ocodewire Magento_Customer_Registration_Email_Notifications_Extension_DemoOcodewire Magento_Customer_Registration_Email_Notifications_Extension_Demo
Ocodewire Magento_Customer_Registration_Email_Notifications_Extension_Demo
 
How to log on to windows server 2008
How to log on to windows server 2008How to log on to windows server 2008
How to log on to windows server 2008
 

Similaire à Cryoserver IIS Certificate Fix

Capital software installation procedure
Capital software installation procedureCapital software installation procedure
Capital software installation procedureSomashekar S.M
 
Symantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management GuideSymantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management GuideSSLRenewals
 
Installation Instructions for Microsoft Exchange 2010 Server
Installation Instructions for Microsoft Exchange 2010 ServerInstallation Instructions for Microsoft Exchange 2010 Server
Installation Instructions for Microsoft Exchange 2010 ServerAboutSSL
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docxRajAmbere1
 
Poc setting up citrix presentation server 4.5 for proof of concept
Poc   setting up citrix presentation server 4.5 for proof of conceptPoc   setting up citrix presentation server 4.5 for proof of concept
Poc setting up citrix presentation server 4.5 for proof of conceptxKinAnx
 
Citrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation GuideCitrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation GuideNuno Alves
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTWilliam hendric
 
Lock Lizard Secure Pdf Mac Viewer V2 5
Lock Lizard Secure Pdf Mac Viewer V2 5Lock Lizard Secure Pdf Mac Viewer V2 5
Lock Lizard Secure Pdf Mac Viewer V2 5Optimal Markets
 
Net scaler installation and configuration
Net scaler installation and configurationNet scaler installation and configuration
Net scaler installation and configurationbimalkishore4
 
Ca1 report
Ca1 reportCa1 report
Ca1 reportaeehhhly
 
Windows prosystemserverinstallguide
Windows prosystemserverinstallguideWindows prosystemserverinstallguide
Windows prosystemserverinstallguidedjedvaji
 
How to install SSL Certificate on Microsoft Exchange Server 2013
How to install SSL Certificate on Microsoft Exchange Server 2013How to install SSL Certificate on Microsoft Exchange Server 2013
How to install SSL Certificate on Microsoft Exchange Server 2013CheapSSLsecurity
 
MVT Checklist 9.0.pdf
MVT Checklist 9.0.pdfMVT Checklist 9.0.pdf
MVT Checklist 9.0.pdfssuser426e15
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoWilliam hendric
 
Support article1224
Support article1224Support article1224
Support article1224Breanna.org
 
Psn3661u
Psn3661uPsn3661u
Psn3661uAnu R.N
 

Similaire à Cryoserver IIS Certificate Fix (20)

Capital software installation procedure
Capital software installation procedureCapital software installation procedure
Capital software installation procedure
 
Symantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management GuideSymantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management Guide
 
Installation Instructions for Microsoft Exchange 2010 Server
Installation Instructions for Microsoft Exchange 2010 ServerInstallation Instructions for Microsoft Exchange 2010 Server
Installation Instructions for Microsoft Exchange 2010 Server
 
Microsoft Lync Server 2010 Installation
Microsoft Lync Server 2010 InstallationMicrosoft Lync Server 2010 Installation
Microsoft Lync Server 2010 Installation
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docx
 
T hin client configuration
T hin client configurationT hin client configuration
T hin client configuration
 
Poc setting up citrix presentation server 4.5 for proof of concept
Poc   setting up citrix presentation server 4.5 for proof of conceptPoc   setting up citrix presentation server 4.5 for proof of concept
Poc setting up citrix presentation server 4.5 for proof of concept
 
Citrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation GuideCitrix StoreFront - Implementation Guide
Citrix StoreFront - Implementation Guide
 
Get installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPTGet installation process of comodo internet security in PPT
Get installation process of comodo internet security in PPT
 
Lock Lizard Secure Pdf Mac Viewer V2 5
Lock Lizard Secure Pdf Mac Viewer V2 5Lock Lizard Secure Pdf Mac Viewer V2 5
Lock Lizard Secure Pdf Mac Viewer V2 5
 
Net scaler installation and configuration
Net scaler installation and configurationNet scaler installation and configuration
Net scaler installation and configuration
 
Ca1 report
Ca1 reportCa1 report
Ca1 report
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
 
Windows prosystemserverinstallguide
Windows prosystemserverinstallguideWindows prosystemserverinstallguide
Windows prosystemserverinstallguide
 
How to install SSL Certificate on Microsoft Exchange Server 2013
How to install SSL Certificate on Microsoft Exchange Server 2013How to install SSL Certificate on Microsoft Exchange Server 2013
How to install SSL Certificate on Microsoft Exchange Server 2013
 
MVT Checklist 9.0.pdf
MVT Checklist 9.0.pdfMVT Checklist 9.0.pdf
MVT Checklist 9.0.pdf
 
Installation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodoInstallation guide for internet security 2014 From comodo
Installation guide for internet security 2014 From comodo
 
Support article1224
Support article1224Support article1224
Support article1224
 
CargoX-Platform-Users-Manual.pdf
CargoX-Platform-Users-Manual.pdfCargoX-Platform-Users-Manual.pdf
CargoX-Platform-Users-Manual.pdf
 
Psn3661u
Psn3661uPsn3661u
Psn3661u
 

Plus de cryoserver

Cryoserver V8 admin guide
Cryoserver V8 admin guideCryoserver V8 admin guide
Cryoserver V8 admin guidecryoserver
 
Cryoserver v7 User Guide
Cryoserver v7 User GuideCryoserver v7 User Guide
Cryoserver v7 User Guidecryoserver
 
Cryoserver v7 Administration Guide
Cryoserver v7 Administration GuideCryoserver v7 Administration Guide
Cryoserver v7 Administration Guidecryoserver
 
Cryoserver Technical Overview
Cryoserver Technical OverviewCryoserver Technical Overview
Cryoserver Technical Overviewcryoserver
 
Cryoserver Configuring Lotus Notes
Cryoserver Configuring Lotus NotesCryoserver Configuring Lotus Notes
Cryoserver Configuring Lotus Notescryoserver
 
Cryoserver Configuring Groupwise
Cryoserver Configuring GroupwiseCryoserver Configuring Groupwise
Cryoserver Configuring Groupwisecryoserver
 

Plus de cryoserver (6)

Cryoserver V8 admin guide
Cryoserver V8 admin guideCryoserver V8 admin guide
Cryoserver V8 admin guide
 
Cryoserver v7 User Guide
Cryoserver v7 User GuideCryoserver v7 User Guide
Cryoserver v7 User Guide
 
Cryoserver v7 Administration Guide
Cryoserver v7 Administration GuideCryoserver v7 Administration Guide
Cryoserver v7 Administration Guide
 
Cryoserver Technical Overview
Cryoserver Technical OverviewCryoserver Technical Overview
Cryoserver Technical Overview
 
Cryoserver Configuring Lotus Notes
Cryoserver Configuring Lotus NotesCryoserver Configuring Lotus Notes
Cryoserver Configuring Lotus Notes
 
Cryoserver Configuring Groupwise
Cryoserver Configuring GroupwiseCryoserver Configuring Groupwise
Cryoserver Configuring Groupwise
 

Dernier

JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIIvo Andreev
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLAlluxio, Inc.
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024Mind IT Systems
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesSoftwareMill
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdfMeon Technology
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntelliSource Technologies
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadIvo Andreev
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Jaydeep Chhasatia
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionsNirav Modi
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesShyamsundar Das
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxJoão Esperancinha
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyRaymond Okyere-Forson
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxAutus Cyber Tech
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.Sharon Liu
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampVICTOR MAESTRE RAMIREZ
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...OnePlan Solutions
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptkinjal48
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Incrobinwilliams8624
 

Dernier (20)

JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AI
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retries
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdf
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptx
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspections
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security Challenges
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptx
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in Trivandrum
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human Beauty
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptx
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - Datacamp
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.ppt
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Inc
 

Cryoserver IIS Certificate Fix

  • 1. Cryoserver Certificate Fix Forensic & Compliance Systems Ltd +44 (0)800 280 0525 info@cryoserver.com www.cryoserver.com January 2008
  • 2. Cryoserver Certificate Fix This document describes how to install an SSL certificate for all users in a domain under MS Server 2003. 1. Start Internet Explorer and go to the Cryoserver interface. You see the website security certificate error: 2. Click Continue to this website (not recommended). You see the Untrusted Certificate warning: 2008 FCS. All rights reserved. Page 2 of 11
  • 3. Cryoserver Certificate Fix 3. Click View certificates. You see the Certificate Properties dialog box: 4. Click Install Certificate to start the Certificate Import Wizard: 2008 FCS. All rights reserved. Page 3 of 11
  • 4. Cryoserver Certificate Fix 5. Click Next. You see the import options: 6. Select Place all certificates in the following store and then click Browse… You see the Select Certificate Store dialog box: From the list of Certificate Stores, click Trusted Root Certificate Authorities and then click OK. 2008 FCS. All rights reserved. Page 4 of 11
  • 5. Cryoserver Certificate Fix 7. Click Next. 8. Click Finish. You see a confirmation message stating that the import was successful: 9. Close and then restart Internet Explorer. After restarting Internet Explorer 1. Click Tools, Internet Options: 2008 FCS. All rights reserved. Page 5 of 11
  • 6. Cryoserver Certificate Fix You see the Internet Options dialog box: 2. Select the Content tab and then click Certificates. You see the Certificates dialog box: 2008 FCS. All rights reserved. Page 6 of 11
  • 7. Cryoserver Certificate Fix 3. Select the Trusted Root Certification Authorities tab. Select your certificate from the list and then click Export. The Certificate Import Wizard starts: 4. Click Next. You see the File Format options, with the DER encoded binary X.509 (.CER) selected as default: 2008 FCS. All rights reserved. Page 7 of 11
  • 8. Cryoserver Certificate Fix 5. Click Next. You see the File to Export dialog box: 6. Click Browse… to specify where you want the certificate to be exported to and then click Next. 2008 FCS. All rights reserved. Page 8 of 11
  • 9. Cryoserver Certificate Fix 7. Click Finish. You see a confirmation message stating that the export was successful: Group Policy Editor 1. Click Start, Run and type in gpmc.msc and then click OK. You see the Group Policy Object Editor window: 2. Right-click Trusted Root Certification Authorities and then click Import. You see the File to Import dialog box: 2008 FCS. All rights reserved. Page 9 of 11
  • 10. Cryoserver Certificate Fix 3. Click Browse… and select your .CER file. Then click Next. You see the Certificate Store dialog box: 4. Click Next and check your changes: 2008 FCS. All rights reserved. Page 10 of 11
  • 11. Cryoserver Certificate Fix 5. Click Finish. You see a confirmation message stating that the import was successful: 6. Close all open windows and your group policy will be applied. This can take a while to filter down to domain users – maybe 15 minutes or more. NOTE: Domain users will have to log off and then log on again for the policy to take effect. 2008 FCS. All rights reserved. Page 11 of 11