Certificate Expiration 30 Days
This monitor looks for any SSL certificates that have an expiration date of less than 30 days. This solution is effective for catching machines that may have been missed and do not have active reminders in place for certificate renewals. Additionally, the difference between the certification addition and expiration should be at least 30 days to trigger an alert.
Certificate Expiration Alerts
Select the operating system to enable monitoring and alerts for certificates that will expire in the next 30 days.
Certificate Expiration Monitoring
Group of machines with certificate expiration monitoring enabled.
Certificate Expiration Monitoring
This solution outlines the steps for identifying and monitoring Windows certificates that are set to expire within the next 30 days through CW RMM.
Cisco Umbrella Root CA Certificate Installation
This solution provides a mechanism to automatically deploy the Cisco Umbrella Root CA certificate to both Windows and Macintosh devices.
cPVAL - Server Role - Certificate Authority Servers
A group tailored for Windows Servers that have the Active Directory Certificate Services role installed.
cPVAL Install Cisco Umbrella Root CA Certificate
Flag this checkbox to enable installation of the Cisco Umbrella Root CA certificate on all Windows and Mac devices managed for the client. This ensures secure SSL inspection and trusted communication with Cisco Umbrella services.
cPVAL Secure Boot Status
This custom field shows whether Secure Boot is enabled on the device.
cPVAL SecureBoot Audit [Windows]
Devices with Secure Boot disabled for compliance and security monitoring.
cPVAL SecureBoot Status
This task checks and records the SecureBoot status on devices, including SecureBoot certificates.
cPVAL Windows DB Certificate
This custom field shows the status of the Windows Secure Boot Database (DB) certificate.
cPVAL Windows KEK Certificate
This custom field displays the status of the Windows Key Exchange Key (KEK) certificate.
cPVAL Windows Telemetry Status
This custom field indicates the current telemetry (diagnostic data) level on Windows. Shows whether Windows telemetry is enabled and its level (Basic, Enhanced, Full)
Deploy Cisco Umbrella Root CA Certificate
This group contains all client machines (Windows and Mac) where the organization-level custom field "cPVAL Install Cisco Umbrella Root CA Certificate" is enabled. A task runs daily against this group to install or verify the Cisco Umbrella.
Deploy Cisco Umbrella Root CA Certificate
Executes Cisco Umbrella Root CA certificate installation script daily on machines in target group.
Disable Cert Expiration Alert
Flag this custom field to exclude computer from the certification expiration monitoring.
Disable Cert Expiration Alerts
Flag this custom field to exclude location from the certification expiration monitoring.
Install Cisco Umbrella Root CA Certificate [Macintosh]
Downloads and installs the Cisco Umbrella Root CA certificate to the Local Machine Trusted Root store.
Install Cisco Umbrella Root CA Certificate [Windows]
Downloads and installs the Cisco Umbrella Root CA certificate to the Local Machine Trusted Root store.
Remediate-SecureBootCompliance2026
This script remediates UEFI Secure Boot compliance for Windows 2026 by ensuring systems have the required 2023 UEFI certificates (KEK and db), enabling Microsoft-managed certificate updates, and reporting the remediation status. It validates Secure Boot, configures registry keys for automatic updates, monitors servicing status, and logs results.
Remediation SecureBoot 2026 Compliance
This script automates the remediation of UEFI Secure Boot certificates required for Windows 2026 compliance. It ensures the system has the latest 2023 UEFI certificates (KEK and db) and configures the system for automatic Microsoft-managed UEFI certificate updates.
Secure Boot Compliance Audit
This solution checks the Secure Boot status and validates the associated certificates. If the system is using older Secure Boot certificates, the custom fields are updated accordingly. If the system is using updated certificates. The custom fields are updated to reflect the compliant status.
SecureBoot 2026 Compliance Check
This script evaluates whether a Windows device is prepared for the upcoming Microsoft Secure Boot certificate transition scheduled for 2026. Microsoft is replacing legacy Secure Boot certificates with updated 2023-era certificates (KEK and DB). Devices that do not contain these updated certificates may be considered at risk once older certificates expire.
SecureBoot Compliance - Audit
This script evaluates whether a Windows device is prepared for the upcoming Microsoft Secure Boot certificate transition scheduled for 2026.
Windows DB Certificate
Automate role to detect if a Windows agent has the updated 2023 DB Certificate
Windows KEK Certificate
Automate role to detect if a Windows agent has the updated 2023 KEK Certificate
Windows Secure Boot
Details all the Custom Fields related to Windows Secure Boot Audit
Windows Secure boot Audit
This solution helps to display the status of key certificate and configurations that will be needed before the current secure boot certificates expire.
Windows Secure Boot Audit
Fetches the status of key certificate and configurations that will be needed before the current secure boot certificates expire.
Windows Secure Boot Audit
This solution fetches the status of key certificate and configurations that will be needed before the current secure boot certificates expire.
Windows Secure Boot Audit [Role]
Dataview to display the status of certificate and configurations needed for secure boot