- Ask for a copy of the Cipher Suite Checker from Trend Micro Technical Support.
- Execute a checker via Command Prompt using Admin privileges.
This will check the machine’s Cipher Suites status. You will see a result Cipher checking, like the screenshot below:
You don’t need to install Cipher Suites unless it's listed for the machine’s requirements:
- Windows 10
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
- Windows XP
- TLS_RSA_WITH_RC4_128_MD5
- For Windows 7, Windows 8, Windows Server 2012
- KB3042058 from Microsoft Security Advisory 3042058
- TLS_RSA_WITH_AES_256_GCM_SHA384
- TLS_RSA_WITH_AES_128_GCM_SHA256
- For Windows 8.1, Windows Server 2012 R2
- Windows 10
- Go to Start > Run and type “mmc”.
- Click OK and the MMC window opens.
- Go to File > Add/Remove Snap-in.
- Add Certificates from left-panel to right-panel:
- Select "Certificates" and click Add.
- Select "Computer account" and choose Next.
- Select "Local computer" and click Finish.
- Choose OK.
- In the left panel, go to Console Root > Certificates (Local Computer).
- Click Trusted Root Certification Authorities > Certificates to verify if "AffirmTrust Commercial" Root Certificate is installed.
- In the left panel, go to Console Root > Certificates (Local Computer).
- Click Intermediate Certification Authorities > Certificates to verify if Trend Micro S2 CA is installed.
If the certificates are not installed, go to Trend Micro SSL Certificates to download.
- Right-click Trusted Root Certification Authorities.
- Click All tasks > Import.
- Choose Next and select the ROOT certificate file that you want to add.
- Click Next.
- Verify if the store location is in "Trusted Root Certification Authorities".
- Choose Next > Finish.
Repeat the steps for Trend Micro S2 CA intermediate certificate.
- Check the properties of the two certificates. Make sure "Client Authentication" and "Server Authentication" are checked.
- Unload and reload agent.
The root certificates should now be successfully installed.
Open Command Prompt and run:
wmic qfe list | findstr <KB number>
Platform | Hot Fix Release |
---|---|
Vista SP2 | KB2763674 |
Win Server 2008 SP2 | KB2763674 |
XP SP3 | KB968730 |
Win 7 SP1 | KB3033929 |
Win Server 2003 SP2 | KB968730 |
Win Server 2008 R2 SP1 | KB3033929 |
Win 8 | No Need |
Win 8.1 | No Need |
Win 10 | No Need |
Win Server 2012 & 2012 R2 | No Need |
If the Security Agent still could not be activated, gather Wireshark logs while accessing the magic link.