The Certificate Reports provides comprehensive visibility into the SSL, code signing and system-level certificates deployed across your devices. These reports help IT admins identify weak configurations, expired or soon-to-expire certificates and audit certificate usage across platforms.
Monitoring certificate health is critical for preventing service disruptions, ensuring secure communication and maintaining compliance with internal and industry standards.
1. Certificates by Key Size
This report categorizes certificates based on their key size, providing an overview of cryptographic strength across all managed devices.
Use Cases:
Helps identify certificates using insufficient key lengths (e.g., less than 2048 bits), which are vulnerable to brute-force attacks. Useful for maintaining cryptographic best practices.
Key Fields:
- Device Name
- Certificate Name
- Key Size
- Issuer
- Algorithm
- Status
- Expiry Date
- Platform
2. Certificates Grouped by Issuer
This report organizes certificates based on their issuing authority to simplify auditing and trust chain validation.
Use Cases:
Useful to identify certificates issued by non-trusted or internal Certificate Authorities. Enables auditing of CA dependencies in the organization.
Key Fields:
- Issuer
- Certificate Name
- Device Name
- Algorithm
- Status (Active/Revoked)
- Key Size
- Expiry Date
- Platform
3. Certificates with Weak Algorithms
This report identifies certificates that use outdated or insecure cryptographic algorithms.
Use Cases:
Detects certificates using deprecated encryption standards such as SHA-1 or MD5, which may fail compliance checks and pose security risks.
Key Fields:
- Certificate Name
- Issuer
- Algorithm
- Signature Hash Algorithm
- Key Size
- Device Name
- Status (Active/Revoked)
- Expiry Date
- Subject
- Validation Start Date
- Username
- Platform
4. Certificates Used for Code Signing
Lists certificates designated for code signing on each device, helping admins manage and monitor developer-issued or third-party signing certs.
Use Cases:
Essential for organizations that develop internal tools or sign executables. Helps track valid or misused signing certificates.
Key Fields:
- Certificate Name
- Store Name
- Device Name
- Issuer
- Algorithm
- Status
- Key Size
- Platform
5. Expired Certificates
Shows certificates that have already expired, indicating potential risks in authentication, encryption or software trust.
Use Cases:
Used to detect and clean up expired certificates that could impact application or service availability.
Key Fields:
- Device Name
- Certificate Name
- Expiry Date
- Days Since Expired
- Issuer
- Algorithm
- Subject
- Status
- Key Size
- Validation Start Date
- Username
- Platform
6. Self-Signed Certificates
Lists certificates that are self-signed commonly used for internal testing or local encryption.
Use Cases:
Identifies risky or non-standard certificate configurations that may not be trusted by browsers or external systems.
Key Fields:
- Certificate Name
- Issuer
- Algorithm
- Status
- Subject
- Key Size
- Device Name
- Expiry Date
- Validation Start Date
- Username
- Platform
7. Soon-to-Expire Certificates
Highlights certificates nearing their expiry date, allowing IT teams to renew or replace them before services are disrupted.
Use Cases:
Critical for proactive maintenance helps prevent outages caused by expired certificates and ensures seamless application functionality.
Key Fields:
- Device Name
- Certificate Name
- Expiry Date
- Days Until Expiry
- Issuer
- Algorithm
- Status (Active/Revoked)
- Key Size
- Subject
- Valid Start Date
- Username
- Platform