HealthService – Event ID 2132 – The certificate authority "Baltimore CyberTrust Root" is not in the "Third-Party Root Certification Authorities" store

Hi all,

If you have been following this post:

SCCM-Endpoint Protection: Microsoft Defender Advanced Threat Protection (EDR) for Windows 7 SP1, Windows 8.1, Windows Server 2008 R2 SP1, Windows Server 2012 R2, and Windows Server 2016 (Part 15)

https://yongrhee.wordpress.com/2020/04/16/sccm-endpoint-protection-microsoft-defender-advanced-threat-protection-edr-for-windows-7-sp1-windows-8-1-windows-server-2008-r2-sp1-windows-server-2012-r2-and-windows-server-2016-part-15/

A 9th item that you could run into is the following in your Windows Server 2008 R2 or Windows Server 2012 R2 or Windows Server 2016…

Log Name:      Operations Manager
Source:        HealthService

Event ID:      2132
Task Category: HTTP Write Action
Level:         Error
Computer:      MachineName.Contoso.com
Description:
A secure connection could not be negotiated with the service <GUID>.ods.opinsights.azure.com.  The article KB3126513 has additional troubleshooting information for connectivity issues.  Possible reasons for this include:
The certificate authority “Baltimore CyberTrust Root” is not in the “Third-Party Root Certification Authorities” store.  Please add this authority to that store.
 
TLS 1.0, 1.1, and 1.2 are all disabled.

A suitable cypher suite could not be negotiated.
 
Other details:
 
Failure Code: 12175L
<SNIP>

Resolution:

You can download the Baltimore CyberTrust Root certificate from the following website:

https://cacert.omniroot.com/bc2025.crt

Reference:

Baltimore CyberTrust Root certificate  – Solution – You experience SSL certificate authentication issues when you use SharePoint Online

https://docs.microsoft.com/en-us/sharepoint/troubleshoot/sharing-and-permissions/ssl-certificate-authentication#solution

Connectivity issues may occur when the Baltimore CyberTrust Root certificate is not installed on client computers that use Microsoft Intune

https://support.microsoft.com/en-us/help/2831435/connectivity-issues-may-occur-when-the-baltimore-cybertrust-root-certi

We had published the following:

Protecting disconnected devices with Microsoft Defender ATP

https://techcommunity.microsoft.com/t5/microsoft-defender-atp/protecting-disconnected-devices-with-microsoft-defender-atp/ba-p/500341

which has a link to this whitepaper:

Windows security on disconnected devices

http://download.microsoft.com/download/3/0/8/3085D641-1CA8-4E21-92DB-3D17F231D252/Windows%20security%20on%20disconnected%20devices%20whitepaper.pdf

clip_image001

<SNIP>

clip_image002

// This last one here, leads to:

Configure a file or web server to download the CTL files

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265983(v=ws.11)#configure-a-file-or-web-server-to-download-the-ctl-files

                //Windows Servers w/o a network connectivity

Configure Trusted Roots and Disallowed Certificates

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265983(v=ws.11)

                // Windows Servers with a network connectivity

Thanks,

Yong

Published by yongrhee

A Cybersecurity & Information Technology (IT) geek.

Leave a comment

Design a site like this with WordPress.com
Get started