The consequence of not renewing ATA certificate in time

A customer who uses Microsoft Advanced Threat Analytics (ATA) recently had severe issues with their ATA implementation. At first, the portal started to behave strangely, not showing all information in alerts and some configuration settings were missing. After a restart of the ATA servers, the services failed to start at all.

The Microsoft.Tri.Center-Errors.log file contained many errors like this:

2020-01-09 12:34:27.9920 1140 98 Error [CertificateExtension] Microsoft.Tri.Infrastructure.Utils.ExtendedException: There are no matching certificates [StoreLocation=LocalMachine StoreName=My thumbprint=89E1C9790B175D2E6B716CFDDABA3D9F444829F6]

It turned out that their internal PKI had automatically renewed the certificate that ATA was configured to use. In general, this is what you want from a PKI (auto-renewed certificates), but unfortunately, ATA does not support renewing an existing certificate.

The reason is that some ATA data is encrypted using the configured certificate, and during certificate renewal, the old certificate is removed, so you lose the ability to decrypt that data.

So you need to create a new certificate before the old one expires and manually configure ATA to use the new certificate.

This requirement is clearly stated in the Microsoft ATA-documentation:

clip_image001

Source: https://docs.microsoft.com/en-us/advanced-threat-analytics/modifying-ata-center-configuration#the-ata-center-certificate

You will even get alerts in ATA Health Center about upcoming certificate expiration:

clip_image003

Source: https://docs.microsoft.com/en-us/advanced-threat-analytics/monitoring-alerts

Replacing the certificate is not really that difficult or time-consuming. But if you do not replace the certificate before it expires you will get this alert:

clip_image005

Source: https://docs.microsoft.com/en-us/advanced-threat-analytics/monitoring-alerts

You can see that that when this happens, the only resolution is to redeploy your ATA, and you will lose all your configuration, alerts, and behavior analysis history.

Other services that use certificates can usually be recovered really easy from issues caused by expired certificates by simply getting a new certificate and pointing the service to the new certificate, but since the “certificate pointing” in ATA is done in the ATA Configuration, which is encrypted by the previous certificate, there is a catch 22 situation here.

Some people have tried to manually add the thumbprint of a new certificate in the SystemProfile_date.json configuration file, and they have gotten the ATA up and running again. However, they could not edit all ATA settings after that, so they eventually ended up redeploying from scratch.

Restoring from backup after redeployment will not work either since the backup still points to the old removed certificate. You can still use that backup configuration file as a manual reference on how to configure ATA again , since it is in cleartext.

So go ahead and make sure that your ATA implementation does not use a certificate that will be automatically renewed, and/or put a reminder in your calendar to renew it before it expires. And monitor those health alerts!

Update 2020-09-14

In the newly released ATA version 1.9.3, Microsoft has updated the functionality around certificate renewal notifications:

Increased advance notice for Center certificate expiration to three months prior to expiration (previously three weeks). Additionally, the notice now provides a clearer description of the severity of failing to renew the certificate.

You can get the new version by using Windows Update or downloading it here::
https://www.microsoft.com/download/details.aspx?id=56725

About Tom Aafloen

IT Security Advisor @ Onevinn
This entry was posted in ATA, Certificates, PKI, SSL and tagged , . Bookmark the permalink.

2 Responses to The consequence of not renewing ATA certificate in time

  1. ITexperience.net says:

    Thnx! You have a very informative blog with indepth articles. I came here because of rdp 😀

  2. Martin B says:

    Working solution for exspired self-signed certificate (example: vlaid from 10.1.2019-10.1.2022) on ATA center:

    change system time on ATAcenter VM to date 1 day before exspiration (5.1.2022)
    create new certificate (by clonning old certificate)
    Set-Location -Path “cert:\LocalMachine\My”
    $OldCert = (Get-ChildItem -Path 36ef7b96cbb3126bca9c7300f4adfb8aff4f0d56)
    New-SelfSignedCertificate -CloneCert $OldCert
    #use your certificate thumbprint, not my: 36ef7b96cbb3126bca9c7300f4adfb8aff4f0d56
    #run as admin
    start ATAcenter service
    delete all ATA gateways from ATA center config
    Change certificate from exspired to new in ATA console
    Save setting (even ATA gateways are not synced)
    Restart ATA center service – to make sure, change was saved
    Download ATA gateway install package
    Stop service ATA center
    Restart VM with ATA center, time is changed back to real. Wait if ATA center service starts (it has Delayed starting)
    Uninstall ATA gateway from AD DC server
    Restart DC
    Install ATA gateway from new ATA gateway install package
    In ATA center console enable Domain sync candidate for all/some DCs.
    Reinstall ATA gateway on all AD DCs.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s