Validating that the servers contain only signed drivers

For more information about how the Microsoft Exchange Transport service selects certificates for Transport Layer Security (TLS), see the following topics: This error is an informational status message.By default, the certificate that installed with Exchange Server 2010 is self-signed.

This status message indicates that the Microsoft Exchange Transport service was unable to validate the certificate chain, or that the public key that was used to validate the certificate signature is not the correct key.

It's generally a best practice to use certificates from trusted third-party certification authorities (CA).

For more information, see Using PKI on the Edge Transport Server for Domain Security.

Use the following sections for more information about how to manage the driver catalog in Configuration Manager: As part of the import process for the device driver, Configuration Manager reads the provider, class, version, signature, supported hardware, and supported platform information that is associated with the device.

By default, the driver is named after the first hardware device that it supports; however, you can rename the device driver later.

Please or register to post comments
If spammers comment on your content, only you can see and manage such comments Delete all
Validate All Drivers Signed This test validates that all tested servers contain only signed drivers. Prepare Hardware Before Validating a Failover Cluster. 
30-Oct-2018 04:55
Reply
Validate that tested servers contain only signed drivers. Validating that the servers contain only signed drivers. The node 'cluster1.domain.com'has unsigned drivers. 
30-Oct-2018 04:59
Reply
The replacement build addresses this issue only. These issues are documented in VMware Security Advisories and the release notes. Unable to get signed. 
30-Oct-2018 05:02
Reply

Validating that the servers contain only signed drivers introduction

Validating that the servers contain only signed drivers