Skip to content

Commit 550da60

Browse files
authored
Merge pull request #108973 from TimShererWithAquent/us1679050ag
Change SSL to TLS per 1679050
2 parents 8ddbc97 + d318eb3 commit 550da60

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/storage/common/storage-explorer-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ There are several built-in RBAC roles which can provide the permissions needed t
7171
Certificate errors typically occur in one of the following situations:
7272

7373
- The app is connected through a _transparent proxy_, which means a server (such as your company server) is intercepting HTTPS traffic, decrypting it, and then encrypting it by using a self-signed certificate.
74-
- You're running an application that's injecting a self-signed SSL certificate into the HTTPS messages that you receive. Examples of applications that inject certificates include antivirus and network traffic inspection software.
74+
- You're running an application that's injecting a self-signed TLS/SSL certificate into the HTTPS messages that you receive. Examples of applications that inject certificates include antivirus and network traffic inspection software.
7575

7676
When Storage Explorer sees a self-signed or untrusted certificate, it no longer knows whether the received HTTPS message has been altered. If you have a copy of the self-signed certificate, you can instruct Storage Explorer to trust it by following these steps:
7777

articles/virtual-machines/troubleshooting/event-id-troubleshoot-vm-rdp-connecton.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ wevtutil qe system /c:1 /f:text /q:"Event[System[Provider[@Name='Microsoft-Windo
6161
**User:** N/A <br />
6262
**Computer:** *computer* <br />
6363
**Description:**
64-
The RD Session Host Server has failed to replace the expired self signed certificate used for RD Session Host Server authentication on SSL connections. The relevant status code was Access is denied.
64+
The RD Session Host Server has failed to replace the expired self signed certificate used for RD Session Host Server authentication on TLS connections. The relevant status code was Access is denied.
6565

6666
**Log Name:** System <br />
6767
**Source:** Microsoft-Windows-TerminalServices-RemoteConnectionManager <br />
@@ -73,7 +73,7 @@ The RD Session Host Server has failed to replace the expired self signed certifi
7373
**User:** N/A <br />
7474
**Computer:** *computer* <br />
7575
**Description:**
76-
RD Session host server has failed to create a new self-signed certificate to be used for RD Session host server authentication on SSL connections, the relevant status code was object already exists.
76+
RD Session host server has failed to create a new self-signed certificate to be used for RD Session host server authentication on TLS connections, the relevant status code was object already exists.
7777

7878
**Log Name:** System <br />
7979
**Source:** Microsoft-Windows-TerminalServices-RemoteConnectionManager <br />
@@ -85,7 +85,7 @@ RD Session host server has failed to create a new self-signed certificate to be
8585
**User:** N/A <br />
8686
**Computer:** *computer* <br />
8787
**Description:**
88-
The RD Session Host Server has failed to create a new self signed certificate to be used for RD Session Host Server authentication on SSL connections. The relevant status code was Keyset does not exist
88+
The RD Session Host Server has failed to create a new self signed certificate to be used for RD Session Host Server authentication on TLS connections. The relevant status code was Keyset does not exist
8989

9090
You can also check for SCHANNEL error events 36872 and 36870 by running the following commands:
9191

@@ -103,7 +103,7 @@ wevtutil qe system /c:1 /f:text /q:"Event[System[Provider[@Name='Schannel'] and
103103
**Keywords:** <br />
104104
**User:** SYSTEM <br />
105105
**Computer:** *computer* <br />
106-
**Description:** A fatal error occurred when attempting to access the SSL server credential private key. The error code returned from the cryptographic module is 0x8009030D. <br />
106+
**Description:** A fatal error occurred when attempting to access the TLS server credential private key. The error code returned from the cryptographic module is 0x8009030D. <br />
107107
The internal error state is 10001.
108108

109109
### Cause
@@ -186,9 +186,9 @@ If you can't renew the certificate, follow these steps to try to delete the cert
186186
187187
Try to access the VM by using RDP again.
188188

189-
#### Update Secure Sockets Layer (SSL) certificate
189+
#### Update TLS/SSL certificate
190190

191-
If you set up the VM to use an SSL certificate, run the following command to get the thumbprint. Then check whether it's the same as the certificate's thumbprint:
191+
If you set up the VM to use a TLS/SSL certificate, run the following command to get the thumbprint. Then check whether it's the same as the certificate's thumbprint:
192192

193193
```cmd
194194
reg query "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v SSLCertificateSHA1Hash

0 commit comments

Comments
 (0)