When enabled, the Check for Publisher Certificate Revocation security feature forces Internet Explorer to verify and validate the Certification Authority (CA) that issued the signing certificate used for signing Software Vulnerability Manager 2018. This feature also verifies whether Software Vulnerability Manager 2018’s code-signing certificate was previously revoked or not. Internet Explorer will then attempt to connect to crl.verisign.net to verify the CA issuer or to crl.thawte.com to verify the Software Vulnerability Manager 2018’s SSL certificate.
In corporate environments, where advanced Firewall setups or Proxy Servers are used to authenticate and strictly control all inbound/outbound connections, this security feature may cause a potential problem for Software Vulnerability Manager 2018 users.
If the addresses crl.verisign.net, crl.thawte.com and *.ws.symantec.com are not white-listed in the Firewall/Proxy server configuration, the CA validation check may not succeed. Additionally, Software Vulnerability Manager 2018, and its scanning Agent respectively, will be denied access to system and online resources causing them to fail to start.
White-listed in the Firewall/Proxy server configuration:
• | crl.verisign.net |
• | crl.thawte.com |
• | *.ws.symantec.com |
Software Vulnerability Manager 2018 (Cloud Edition) Quick Start GuideNovember 2018 |
Copyright Information | Flexera Software |