- 12 minutes to read

Configuring Windows Server Certificate Monitoring

Unlock comprehensive X509 certificate security monitoring! This guide shows you how to configure the Nodinite Windows Server Monitoring Agent for real-time certificate tracking, expiration alerts, private key health validation, weak cryptography detection, chain validation, and IIS binding monitoring. Gain proactive alerts, self-service management, and seamless integration with Nodinite.

What you will achieve with this guide:

  • ✅ Step-by-step configuration for certificate expiration and health monitoring
  • ✅ Customizable thresholds, store selection, and validation options
  • ✅ Self-service, role-based access for business and IT users
  • ✅ Proactive alerts for security risks and compliance violations

Info

This guide provides step-by-step instructions for configuring the Nodinite Windows Server Monitoring Agent certificate monitoring.

Note

To enable monitoring and remote configuration, first install and create the initial Monitoring Agent Configuration for the Nodinite Windows Server Monitoring Agent. If you're a first-time user, start with the Remote Configuration.

Remote Configuration

As a Nodinite Administrator, click the 'Configuration' button to open a modal and configure the Windows Server Monitoring Agent:

Remote Configuration
Click the 'Configuration' button to open the configuration modal.

You can adjust configurations on each Resource using the Action button, provided your Monitor View has the Remote Actions feature enabled.

Nodinite groups Resources per Application using the value from the Description field. Learn more about Applications.

Add Certificate Monitoring Configuration

Enable certificate monitoring by checking the Enable Certificate monitoring checkbox, then configure options across the available tabs.

Certificate Monitoring Tabs
Certificate monitoring configuration tabs.

General Tab

The General tab contains global certificate monitoring settings including expiration thresholds and old certificate handling.

General Tab
General tab for expiration thresholds and certificate-specific overrides.

Ignore Old Expired Certificates

Certificates that expired MORE THAN this many days ago are IGNORED (no alerts, informational view only). Certificates that expired WITHIN this window (or are expiring in the future) will trigger alerts.

  • Default: 90 days
  • Range: 0–365 days
  • Recommended: 30-90 days to catch recent expirations while ignoring ancient certificates

Examples:

  • Set to 0 to ignore ALL already-expired certificates (only alert on today/future expirations)
  • Set to 30 to alert on certs expired within last 30 days, ignore certs expired 31+ days ago

Warning Time Span (days)

This indicates the allowed time span in days before a certificate expires. Once the specified value is breached, a Warning alert is triggered.

  • Default: 45 days
  • Range: 1–365 days

Error Time Span (days)

This indicates the allowed time span in days before a certificate expires. Once the specified value is breached, an Error alert is triggered.

  • Default: 30 days
  • Range: 1–365 days

Description

Specify a user-friendly short description about this configuration.

Specific Certificates

This list contains certificate-specific monitoring configurations that OVERRIDE the global thresholds above. Use the Edit action on a certificate Resource to add entries - this ensures accurate 'Issued By' and 'Issued To' matching.

Important

This list contains certificate-specific monitoring configurations that OVERRIDE the global thresholds above. Do NOT manually edit 'Issued By' or 'Issued To' values after creation as they are used to match certificates - incorrect values will prevent monitoring. Since this is a group configuration, all servers in the group are expected to have the same certificates with identical thresholds. If a server requires unique certificate monitoring settings, place it in a separate group.

Specific Certificates Entry
Specific certificate configuration entry with custom thresholds.

Field Description Notes
Issued By Certificate issuer name ⚠️ Do NOT modify after creation - used for matching
Issued To Certificate subject name ⚠️ Do NOT modify after creation - used for matching
Warning Time Span Override global warning threshold Range: 1–365 days
Error Time Span Override global error threshold Range: 1–365 days
Description User-friendly description ℹ️ Optional

Store Name (Folders) Tab

Select which Windows certificate stores to monitor.

Tip

For detailed information about certificate stores and monitoring, see Certificate Monitoring and Certificate Overview.

Store Name (Folders) Tab
Store Name (Folders) tab with available certificate store options.

Store Name Purpose Default Store Path
Monitor Local Machine Certificate Stores Enable monitoring for primary system-wide certificate location ✅ Enabled -
Personal (My) Server/service certificates with private keys (IIS SSL, service accounts, RDP) ✅ Enabled HKLM\...\MY
Trusted Root Certification Authorities (Root) Root CA certificates Windows trusts by default or manually installed ✅ Enabled HKLM\...\Root
Intermediate Certification Authorities (CA) Intermediate CA certificates for building chains and SSL/TLS validation ✅ Enabled HKLM\...\CA
Trusted Publishers Software publisher certificates for SmartScreen and code signing ❌ Disabled HKLM\...\TrustedPublisher
Trusted People Certificates for explicitly trusted individuals/entities (peer-to-peer) ❌ Disabled HKLM\...\TrustedPeople
Web Hosting (WebHosting) IIS HTTPS binding certificates (local/remote). May not exist on all systems ❌ Disabled Custom: WebHosting
Third-Party Root CA (AuthRoot) Root CA certificates auto-downloaded by Windows Certificate Trust List ❌ Disabled HKLM\...\AuthRoot
Untrusted Certificates (Disallowed) Explicitly untrusted certificates (revoked/malicious). Usually empty ❌ Disabled HKLM\...\Disallowed
Other People (AddressBook) S/MIME email encryption contact certificates. Rarely used in servers ❌ Disabled HKLM\...\AddressBook

User Accounts Tab

Monitor certificates in service account and impersonated user personal stores.

Tip

For gMSA (Group Managed Service Accounts), see FAQ: Certificates for gMSA Accounts.

User Accounts Tab
User Accounts tab for service account and impersonated user credentials.

Monitor Agent Service Account Personal Store

Enable monitoring of the agent's service account personal store (CurrentUser\My only - NOT Local Machine stores).

  • Default: Disabled (unchecked)
  • Note: Heading displays actual service account name (e.g., DEV\Administrator) but is not editable

Display Name for Agent Service Account

User-friendly name shown in Monitor Views instead of technical account name. Used to build resource name as 'server\displayname'.

  • Example: NodiniteService instead of DEV\Administrator
  • Purpose: Hides technical service account identity in Monitor Views for cleaner presentation

Impersonated users

Enable monitoring of personal stores for each impersonated user configured below.

  • Default: Disabled (unchecked)
  • ⚠️ Important: Impersonation works ONLY on local agent machine. Groups with impersonation can only monitor ONE server.

Impersonated user accounts

List of user accounts to impersonate for monitoring their personal stores. Each user's store scanned using their credentials on local agent machine.

Field Description Notes
Display Name User-friendly name for Domain User Used for resource naming
Domain User Windows user account Format: DOMAIN\User
Password Password for domain user ℹ️ Encrypted when saved in configuration file

Revocation Tab

Configure certificate revocation status checking with CRL/OCSP validation.

Tip

For detailed information about revocation monitoring, see Revocation Monitoring. For testing scenarios with PowerShell scripts, see FAQ: Revocation Testing.

Revocation Tab
Revocation tab for CRL/OCSP validation settings.

Setting Description Default Options/Range
Revocation Mode Mode used to check X509 certificate revocation No Check No Check, Online, Offline
Revocation Flag Which X509 certificates in chain to check for revocation Entire Chain Entire Chain, End Certificate Only, Exclude Root
Enhanced Revocation Checking Enable advanced revocation monitoring with detailed CRL/OCSP diagnostics. Master switch controls all sub-options below ✅ Enabled -
Alert on Expired CRL Generate alerts when Certificate Revocation List (CRL) is past its NextUpdate date ✅ Enabled -
Alert on OCSP Responder Failure Generate alerts when Online Certificate Status Protocol (OCSP) responder unavailable or unreachable ✅ Enabled -
OCSP Timeout Threshold (ms) Alert if OCSP response takes longer than threshold in milliseconds 5000 ms (5 seconds) 1000-30000 ms

Private Key Health Tab

Monitor certificate private keys for presence, accessibility, and security risks.

Tip

For detailed information about private key monitoring, see Private Key Health. For testing scenarios with PowerShell scripts, see FAQ: Private Key Health Testing.

Private Key Health Tab
Private Key Health tab for key monitoring settings.

Setting Description Default Notes
Monitor Private Key Health Enable monitoring of private key presence, accessibility, and security posture ✅ Enabled -
Alert on Missing Private Key (Personal/My Store Only) Generate ERROR when certificate in Personal/My store lacks private key. Applies to: (1) Local Machine → Personal (My) if monitored, (2) Agent Service Account → Personal (My) if monitored, (3) Impersonated Users → Personal (My) if monitored. Root CA and intermediate CA certificates excluded ❌ Disabled At least one Personal/My store must be enabled in Store Name (Folders) or User Accounts tabs
Alert on Exportable Private Key (Security Risk) Generate WARNING when private key is marked as exportable (applies to all stores). Exportable keys can be stolen ❌ Disabled Security risk indicator
Minimum Private Key Length (bits) Generate WARNING when key length is below this value (applies to all stores). Recommended: 2048 for RSA, 256 for ECDSA 2048 bits Valid range: 1024-16384

Cryptography Tab

Detect certificates using deprecated or weak cryptographic algorithms.

Tip

For detailed information about weak cryptography detection, see Weak Cryptography Detection. For testing scenarios with PowerShell scripts, see FAQ: Weak Cryptography Testing.

Cryptography Tab
Cryptography tab for weak algorithm detection.

Setting Description Default Notes
Detect Weak Cryptography Monitor certificate signature algorithms and public key strength to detect deprecated or insecure cryptographic standards ✅ Enabled -
Alert on MD5 Signatures Generate ERROR when certificate uses MD5 hash algorithm which is cryptographically broken and insecure (applies to all stores) ✅ Enabled -
Alert on SHA-1 Signatures Generate WARNING/ERROR when certificate uses deprecated SHA-1 hash algorithm. ERROR if issued after 2017-01-01, WARNING if issued before (applies to all stores) ✅ Enabled -
Alert on Weak RSA Keys Generate ERROR when RSA public key size is below minimum threshold. Modern browsers reject RSA keys < 2048 bits (applies to all stores) ✅ Enabled -
Minimum RSA Public Key Size (bits) Alert when RSA public key size is below this value (applies to all stores). NIST recommendation: 2048 bits minimum, 3072 bits recommended 2048 bits Valid range: 1024-16384
Minimum ECC Public Key Size (bits) Alert when ECC (Elliptic Curve) public key size is below this value (applies to all stores). NIST recommendation: 256 bits minimum 256 bits Valid range: 160-521

Enable detailed chain validation with 20+ specific error types.

Tip

For detailed information about chain validation, see Chain Validation.

Chain Validation Tab
Chain Validation tab for trust chain verification.

Note

Understanding Chain vs Revocation: Chain Validation verifies the trust path (root CA, intermediates, certificates) while Revocation Monitoring checks if certificates have been invalidated before expiration. Both work together but serve different purposes. Chain validation can detect revocation issues during chain building, while revocation monitoring provides proactive infrastructure health (CRL freshness, OCSP responder availability).

Setting Description Default Notes
Enhanced Chain Validation Perform detailed certificate chain validation with categorized error reporting and actionable recommendations. Master switch controls all sub-options below ✅ Enabled -
Alert on Untrusted Root Certificates Generate alerts when root CA certificate is not in Trusted Root Certification Authorities store ✅ Enabled -
Alert on Partial Chains (Missing Intermediates) Generate alerts when intermediate CA certificates are missing from chain. Most common configuration error ✅ Enabled -
Alert on Expired Intermediate Certificates Generate alerts when intermediate CA certificates in chain have expired ✅ Enabled Can be overridden per certificate for legacy chains
Alert on Revocation Check Failures Controls alert severity when chain validation encounters revocation errors. When enabled (default), revocation failures (RevocationStatusUnknown, OfflineRevocation) generate WARNING alerts. When disabled, revocation failures are ignored during chain validation ✅ Enabled Different from Revocation Tab Enhanced Revocation Checking which monitors CRL/OCSP infrastructure health
Allow Self-Signed Certificates (Dev/Test) Reduce alert severity for self-signed certificates. Treats UntrustedRoot as WARNING instead of ERROR - useful in development/test environments where self-signed certs are expected ❌ Disabled Not recommended for production environments

Purpose & EKU Tab

Validate that certificates match their intended purposes with Enhanced Key Usage (EKU) verification.

Tip

For detailed information about purpose validation, see Certificate Purpose and EKU.

Purpose & EKU Tab
Purpose & EKU tab for certificate usage validation.

Setting Description Default Notes
Validate Certificate Purpose & EKU Validate certificates have appropriate Enhanced Key Usage (EKU) extensions and Key Usage flags. Master switch controls all sub-options below ✅ Enabled -
Alert on Missing Key Usage Extension Generate WARNING when certificate lacks Key Usage extension. May cause compatibility issues with some applications ✅ Enabled -
Alert on 'Any Purpose' EKU (Security Risk) Generate WARNING when certificate uses 'Any Purpose' EKU (2.5.29.37.0) which is overly permissive and violates least privilege principle ✅ Enabled -
Require Server Auth EKU for Detected Web Certificates When enabled, alerts if certificate appears to be for web/SSL use (Personal store + private key + web naming patterns) but lacks Server Authentication EKU (1.3.6.1.5.5.7.3.1). Auto-detects based on store location and naming ✅ Enabled -
Require Code Signing EKU for Detected Code Signing Certificates When enabled, alerts if certificate appears to be for code signing (contains 'Code Signing' in name) but lacks Code Signing EKU (1.3.6.1.5.5.7.3.3). Auto-detects based on naming patterns ✅ Enabled -
Skip EKU Validation for CA Certificates (Root/Intermediate) When enabled, skips Key Usage extension checks for certificates in Root or CA stores. CA certificates don't typically have end-entity EKUs and this prevents false warnings ✅ Enabled -

IIS Bindings Tab

Monitor IIS certificate bindings and detect mismatches, missing certificates, and binding issues.

Tip

For detailed information about IIS binding monitoring, see IIS Binding and SAN Monitoring. For testing scenarios with PowerShell scripts, see FAQ: IIS Binding and SAN Monitoring.

Note

Opt-In Feature: Disabled by default. Only enable if server runs IIS. Gracefully degrades if IIS not installed.

IIS Bindings Tab
IIS Bindings tab for HTTPS binding validation.

Setting Description Default Notes
Monitor IIS Certificate Bindings Cross-reference IIS HTTPS bindings with installed certificates. Requires IIS installed on monitored server. Gracefully skips if IIS not detected. Uses existing Warning/Error TimeSpan thresholds for expiration alerts ❌ Disabled Opt-in feature
Alert on Missing Bound Certificate (Orphaned Binding) Generate ERROR when IIS HTTPS binding references certificate that does not exist in certificate store. Indicates broken HTTPS configuration that will fail at runtime ✅ Enabled Can be overridden per certificate
Alert on Expired Bound Certificate Generate ERROR/WARNING when certificate bound to IIS HTTPS site is expired or expiring soon. Uses existing Warning/Error TimeSpan thresholds configured in General tab ✅ Enabled Can be overridden per certificate
Alert on Hostname Mismatch Generate WARNING when IIS binding hostname does not match certificate's Subject or Subject Alternative Names (SAN). Supports wildcard certificates (*.example.com) ✅ Enabled Can be overridden per certificate

Duplicates Tab

Detect multiple certificates with identical Subject and SAN combinations.

Tip

For detailed information about duplicate detection, see Duplicate Certificate Detection.

Duplicates Tab
Duplicates tab for duplicate certificate detection.

Setting Description Default Notes
Detect Duplicate Certificates Detect multiple certificates with identical Subject + SAN combination (different thumbprints). Helps identify renewal confusion or misconfigurations ✅ Enabled -
Alert on Duplicates with Private Keys (Higher Severity) Generate ERROR when multiple certificates with same Subject+SAN both have private keys. More serious as it creates ambiguous certificate selection for applications ✅ Enabled -
Alert on Duplicates Across Different Stores Generate WARNING when duplicate certificates found in different certificate stores (e.g., LocalMachine\My and CurrentUser\My). Can cause confusion about which certificate is being used ✅ Enabled -
Maximum Allowed Duplicates Alert when number of certificates with same Subject+SAN exceeds this threshold. Default: 1 (alert when more than 1 certificate exists). Set to 2 to allow old+new during renewal overlap 1 Range: 1-10

For information about saving configuration changes and adding the Windows Server Monitoring Agent Configuration, see:


Next Step

Add or manage a Monitoring Agent Configuration
Add or manage Monitor View
Certificate Remote Actions