|
1 | 1 | ---
|
2 | 2 | title: How to troubleshoot delivery of Extended Security Updates for Windows Server 2012 through Azure Arc
|
3 | 3 | description: Learn how to troubleshoot delivery of Extended Security Updates for Windows Server 2012 through Azure Arc.
|
4 |
| -ms.date: 05/22/2024 |
| 4 | +ms.date: 07/03/2024 |
5 | 5 | ms.topic: conceptual
|
6 | 6 | ---
|
7 | 7 |
|
@@ -79,20 +79,18 @@ Once the network changes are made to allow access to the PKI URL, try installing
|
79 | 79 | If you're unable to allow access to the PKI URL from your servers, you can manually download and install the certificates on each machine.
|
80 | 80 |
|
81 | 81 | 1. On any computer with internet access, download these intermediate CA certificates:
|
82 |
| - 1. [Microsoft Azure TLS Issuing CA 01](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2001%20-%20xsign.crt) |
83 |
| - 1. [Microsoft Azure TLS Issuing CA 02](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2002%20-%20xsign.crt) |
84 |
| - 1. [Microsoft Azure TLS Issuing CA 05](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2005%20-%20xsign.crt) |
85 |
| - 1. [Microsoft Azure TLS Issuing CA 06](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2006%20-%20xsign.crt) |
| 82 | + 1. [Microsoft Azure RSA TLS Issuing CA 03](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2003%20-%20xsign.crt) |
86 | 83 | 1. [Microsoft Azure RSA TLS Issuing CA 04](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2004%20-%20xsign.crt)
|
| 84 | + 1. [Microsoft Azure RSA TLS Issuing CA 07](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2007%20-%20xsign.crt) |
| 85 | + 1. [Microsoft Azure RSA TLS Issuing CA 08](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2008%20-%20xsign.crt) |
87 | 86 | 1. Copy the certificate files to your Windows Server 2012 (R2) machines.
|
88 | 87 | 1. Run any one set of the following commands in an elevated command prompt or PowerShell session to add the certificates to the "Intermediate Certificate Authorities" store for the local computer. The command should be run from the same directory as the certificate files. The commands are idempotent and won't make any changes if you've already imported the certificate:
|
89 | 88 |
|
90 | 89 | ```
|
91 |
| - certutil -addstore CA "Microsoft Azure TLS Issuing CA 01 - xsign.crt" |
92 |
| - certutil -addstore CA "Microsoft Azure TLS Issuing CA 02 - xsign.crt" |
93 |
| - certutil -addstore CA "Microsoft Azure TLS Issuing CA 05 - xsign.crt" |
94 |
| - certutil -addstore CA "Microsoft Azure TLS Issuing CA 06 - xsign.crt" |
| 90 | + certutil -addstore CA "Microsoft Azure RSA TLS Issuing CA 03 - xsign.crt" |
95 | 91 | certutil -addstore CA "Microsoft Azure RSA TLS Issuing CA 04 - xsign.crt"
|
| 92 | + certutil -addstore CA "Microsoft Azure RSA TLS Issuing CA 07 - xsign.crt" |
| 93 | + certutil -addstore CA "Microsoft Azure RSA TLS Issuing CA 08 - xsign.crt" |
96 | 94 | ```
|
97 | 95 |
|
98 | 96 | 1. Try installing the Windows updates again. You may need to reboot your computer for the validation logic to recognize the newly imported intermediate CA certificates.
|
|
0 commit comments