Avatar of mudcow007
mudcow007
Flag for United Kingdom of Great Britain and Northern Ireland asked on

PCI Compliance - Self signed cert Exchange 2013

Hello

we are just in the middle of a PCI Compliance test an we are failing on a few things, of them being we are using a self signed certificate, i guess its the one that Exchange creates when its installed.

We have a 3rd party assigned SSL certificate installed aswell

Can i remove the self signed cert safely?

The self signed cert is currently assigned to SMTP & IIS although these are greyed out

The SSL cert is assigned to SMTP,IMAP,POP & IIS (although they are also greyed out)

thanks
ExchangeSSL / HTTPS

Avatar of undefined
Last Comment
mudcow007

8/22/2022 - Mon
Akhater

No don't uninstall the self-signed, there is no need to do so

if you have a 3rd party and it is well configured it is the one that should be assigned to IIS and that should solve your problem
mudcow007

ASKER
Thanks Akhater

How do i know if the 3rd part cert is assigned to IIS?

many thanks
Akhater

Get-ExchangeCertificate what is the output
Your help has saved me hundreds of hours of internet surfing.
fblack61
mudcow007

ASKER
It shows thumbprints of all current certs and which services they are attached to and "subject"
cert.png
Akhater

yes the public one is enabled for IIS I really doubt that is your issue since it is also enabled for SMTP

what is the PCI compliance failure exactly is ?
mudcow007

ASKER
The actual failure is:

SSL Self Signed Certificate : The SSL certificate chain for this certificate ends in an unrecognised self signed certificate

I will run the PCI test again to confirm the error

thanks
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.
suriyaehnop

The exchange self signed used by exchange for authentication each others and will not enable for smtp by default.

The public certificate shall enable by smtp,pop,imap,iis one installation complete
Todd Nelson

Every self-signed certificate is assigned SMTP and SMTP cannot be unassigned from the cert.  It's a default setting.

self-signed-cert.png
However, if the FQDN names of the servers are in the certificate issued by a public CA, the original self-signed certificate(s), that was replaced by the public certificate, can be safely removed.

But like Akhater stated, you don't need to remove the self-signed certificates.
Akhater

I don't have experience with the pci compliance test but I guess it connects to a url?? Which url is it connecting to?
Experts Exchange has (a) saved my job multiple times, (b) saved me hours, days, and even weeks of work, and often (c) makes me look like a superhero! This place is MAGIC!
Walt Forbes
ASKER CERTIFIED SOLUTION
Simon Butler (Sembee)

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
Todd Nelson

Simon,

Correct.  I was wrong to assume everyone would know I was referring to the server names might actually be a routable name like server1.contoso.com and not server1.contoso.local.
mudcow007

ASKER
Thank you I was unaware of that

Thanks