Remember to maintain security and privacy. Do not share sensitive information. Procedimento.com.br may make mistakes. Verify important information. Termo de Responsabilidade
In a Windows environment, ensuring secure communication between systems and update servers is crucial. One method to enhance security is through TLS certificate pinning, which helps prevent man-in-the-middle attacks by ensuring that the server's certificate matches a known good copy. However, there are scenarios where strict enforcement of TLS certificate pinning can cause issues, particularly in enterprise environments with complex update infrastructures.
The DoNotEnforceEnterpriseTLSCertPinningForUpdateDetection
setting allows administrators to disable the enforcement of TLS certificate pinning for update detection. This can be particularly useful in situations where updates are managed through a proxy or other intermediary that may alter the certificate chain.
In this article, we will explore how to configure this setting using Group Policy and the Windows Registry, providing practical examples to help you implement this adjustment in your environment.
Examples:
Open the Group Policy Management Console:
Win + R
, type gpmc.msc
, and press Enter.Navigate to the appropriate Group Policy Object (GPO):
Edit the GPO:
Edit
.Navigate to the policy setting:
Computer Configuration
-> Administrative Templates
-> Windows Components
-> Windows Update
.Configure the setting:
Do not enforce Enterprise TLS certificate pinning for update detection
.Enabled
.Apply and close:
Apply
and then OK
.Open the Registry Editor:
Win + R
, type regedit
, and press Enter.Navigate to the relevant key:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
.Create or modify the DWORD value:
WindowsUpdate
key does not exist, create it by right-clicking on Microsoft
, selecting New
-> Key
, and naming it WindowsUpdate
.WindowsUpdate
key, create a new DWORD value named DoNotEnforceEnterpriseTLSCertPinningForUpdateDetection
.1
to disable enforcement.Close the Registry Editor:
To verify that the setting has been applied correctly, you can use the following methods:
Open Command Prompt:
Win + R
, type cmd
, and press Enter.Check the registry value:
reg query "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v DoNotEnforceEnterpriseTLSCertPinningForUpdateDetection
0x1
.Open PowerShell:
Win + X
and select Windows PowerShell (Admin)
.Check the registry value:
Get-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" -Name "DoNotEnforceEnterpriseTLSCertPinningForUpdateDetection"
1
.By following these steps, you can configure the DoNotEnforceEnterpriseTLSCertPinningForUpdateDetection
setting in your Windows environment, ensuring that update detection processes are not disrupted by strict TLS certificate pinning enforcement.