Try our new Certificate Revocation List Check Tool
CRLcheck.exe is a tool developed to verify digital signatures of executable files. It collects files from known paths on your client, checks their signature, and checks Certificate Revocation Lists (CRL) and OCSP download. This helps avoid delays in launching files.

Category: Deployment

Proxy settings der Cryptography API bei Zertifikatswiderrufslisten (CRL) von einem CRL-Verteilungspunkt

  Dieser Artikel zielt darauf ab, den Prozess zu erläutern, den die Crypto API durchläuft, um erfolgreich eine HTTP-basierte URL für den CRL-Verteilungspunkt herunterzuladen. Er dient auch der Fehlerbehebung in Situationen, die mit der Netzwerkrückgewinnung von CRLs verbunden sind. Zusätzlich wird unser kostenloses Tool, crlcheck.exe, erwähnt, das dazu beitragen soll, komplexe Probleme effektiver zu lösen. […]

Certutil.exe –url –urlcache how to use and freeware GUI crl check to automate CRL verify

  How to use Microsoft certutil.exe –url or –urlcache to find CRL and OCSP on Windows manually, or utilize our freeware tool crlcheck.exe, which performs the same function fully automatically for all EXE files on your system. crlcheck.exe https://www.butsch.ch/post/crlcheck-exe-certificate-revocation-list-check-tool-to-verify-all-crl-and-ocsp-on-windows-client/   What is a CRL Certificate Revocation List file?   Each certificate authority (CA) periodically issues […]

CRL check, Zertifikatsperrlisten Software, Certificate Revocation List Check Tool zum suchen aller geblockten CRL in Firmenumgebungen, crlcheck.exe

Mit diesem Tool findet man schnell und einfach alle verwendeten CRL eines clients und kann prüfen ob der client diese erreicht.   In den vergangenen Jahren habe ich persönlich miterlebt, wie die Zertifikatssperrung auf Windows-Systemen oft unterschätzt wird, selbst in großen Unternehmen. Dieses Problem beeinträchtigt sowohl Client- als auch Server-Systeme erheblich, wenn es nicht korrekt […]

Problematic W11 preview patch KB5035942 do not install rollback HP laptop seen

  Patch: 2024-03 Cumulative Update Preview for Windows 11 Version 23H2 for x64-based Systems (KB5035942) OS Builds : 22621.3374 22631.3374 Patch details: March 26, 2024—KB5035942 (OS Builds 22621.3374 and 22631.3374) Preview – Microsoft Support https://support.microsoft.com/en-us/topic/march-26-2024-kb5035942-os-builds-22621-3374-and-22631-3374-preview-3ad9affc-1a91-4fcb-8f98-1fe3be91d8df   The KB5035942 preview patch seems to make some problem on different brands of systems. Some customer reported bluescreen or […]

CRLcheck.exe Certificate Revocation List Check Tool to verify all CRL and OCSP on Windows client

CRLcheck.exe Certificate Revocation List Check Tool to automatic verify CRL and OCSP internet reachability of all your EXE files that your client runs.     Over the past 20 years, I have personally witnessed how Certificate Revocation on Windows systems is often underestimated, even within large enterprises. This issue significantly affects both client and server […]

Mastering Firewalls for Intunes and Autopilot Success, FQDN, IP, CRL to get Intunes running

Mastering Firewalls for Intunes and Autopilot Success In the realm of IT, especially with the advent of cloud-based systems like M365 and Intune, managing firewalls has evolved into a complex challenge. Gone are the days of a handful of external ports; now, it’s like navigating a digital maze of ports and IP ranges. Enter the […]

Missing entry in Fortigate Application Filter ROOT.CERTIFICATE.URL and OCSP source of W10 Setup failing

FortiGate Application Filter Certificate wrong/missing Entry sample for an important laptop driver (W10 Deployment fails because of signed Driver Revocation Lookup) Missing entry in Fortigate Application Filter “ROOT.CERTIFICATE.URL” and “OCSP” source of failing Windows 10 Deployment with commercial Deployment Products (This includes HP client hardware, Microsoft SCCM, Landesk or Ivanti Frontrange). During the Unattend phase […]

VMWare vCenter Lücke, CVE-2023-34048 and CVE-2023-34056 Rating 9.8/10 DRINGEND, Angriff Public verfuegbar

  CVE-2023-34048 and CVE-2023-34056 Rating 9.8/10 DRINGEND, Angriff Information Public verfügbar Sämtliche VCENTER von neuer Lücke betroffen EXPLOIT code im Umlauf. Patche für aktuelle und alte VCENTER Versionen ab sofort https://www.vmware.com/security/advisories/VMSA-2023-0023.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-34048 https://docs.vmware.com/en/VMware-vSphere/8.0/rn/vsphere-vcenter-server-80u1d-release-notes/index.html Betroffene Produkte – VMware vCenter Server – VMware Cloud Foundation Einführung Ein Out-of-Bounds Write (CVE-2023-34048) und eine teilweise Informationsfreigabe (CVE-2023-34056) im vCenter […]

Mcafee/Trellix: ATP/TIE Threat Intelligence Exchange im Einsatz

Ransomware in der Schweiz Lösungsansätze für mehr Cybersicherheit Die Bedrohung durch Ransomware in der Schweiz erfordert intelligente Lösungen. Eine effektive Methode, die sich bewährt hat, ist der Einsatz von “Black/White-Listing” Technologien, wie sie beispielsweise von McAfee TIE bereitgestellt werden. Diese fortschrittliche Technologie, die auf intelligenter Listenführung basiert, stellt derzeit die einzige wirksame Lösung dar, um […]

Intunes / M365, Deploy Company portal in 2023 via APPX and Line of Business (0x87D1041C)

Microsoft Intune Company Portal for Windows, APPX Version via Intune and Line of Business App (Avoid 0x87D1041C if you deploy the APP Store version) Problem: Intune users (customers) report that they encounter an issue: the application was not detected after a successful installation (0x87D1041C). You see success rated of 75-80%. That is simply not usable […]

Microsoft SCCM Configmanager latest version tryout and look | Why you still need MDT or SCCM and not only Autopilot

  If you take a closer look at some Autopilot deployment workflow for modern workplace you get unsure how this should be more simple over long strategy? If you compare the workflow to some SCCM version? Well Autopilot already needs two pages correct? 😉   In the past Microsoft has supplied the endcustomer free tools […]