Monitoring with PowerShell: Monitor SSL certificates

A friend of mine recently asked if I had a solution for monitoring ADFS and exchange certificates. Funnily this was actually a challenge I’ve struggled with in the past. The problem is that each of these systems has their own way of getting the currently installed certificates.

So when I was playing around creating a list of all commands that we could use to collect the certificates, I remembered an earlier trick I used to check the bindings for SSTP certificates. Using netsh is an easy way to grab all the current bindings, independent of all cmdlets supplied by products directly.

The only problem with the netsh commands that we need to use is that these are not converted to a Powershell native command yet. That means it’s pretty much up to us to play with the strings to get the results we want. Using the script below, you can monitor all the current certificate bindings on a server. Be it Exchange, ADFS, SSTP, or whatever else.

Change the $days variable to how many days before expiry you want to get alerted on.

$days = (Get-Date).AddDays(14)
$TxtBindings = (& netsh http show sslcert) | select-object -skip 3 | out-string
$nl = [System.Environment]::NewLine
$Txtbindings = $TxtBindings -split "$nl$nl"
$BindingsList = foreach ($Binding in $Txtbindings) {
    if ($Binding -ne "") {
        $Binding = $Binding -replace "  ", "" -split ": "
        [pscustomobject]@{
            IPPort          = ($Binding[1] -split "`n")[0]
            CertificateHash = ($Binding[2] -split "`n" -replace '[^a-zA-Z0-9]', '')[0]
            AppID           = ($Binding[3] -split "`n")[0]
            CertStore       = ($Binding[4] -split "`n")[0]
        }
    }
}

if ($BindingsList.Count -eq 0) {
$CertState = "Healthy - No certificate bindings found."
exit 0
}

$CertState = foreach ($bind in $bindingslist) {
    $CertFile = Get-ChildItem -path "CERT:LocalMachine\MY" | Where-Object -Property ThumbPrint -eq $bind.CertificateHash
    if ($certfile.NotAfter -lt $Days) { "$($certfile.FriendlyName) / $($certfile.thumbprint) will expire on $($certfile.NotAfter)" }
}

You might want to alert on other things, so feel free to customize the script of course. And that’s it. As always, Happy PowerShelling!

Recent Articles

The return of CyberDrain CTF

CyberDrain CTF returns! (and so do I!)

It’s been since september that I actually picked up a digital pen equivalent and wrote anything down. This was due to me being busy with life but also my side projects like CIPP. I’m trying to get back into the game of scripting and blogging about these scripts. There’s still so much to automate and so little time, right? ;)

Monitoring with PowerShell: Monitoring Acronis Backups

Intro

This is a monitoring script requested via Reddit, One of the reddit r/msp users wondered how they can monitor Acronis a little bit easier. I jumped on this because it happened pretty much at the same time that I was asked to speak at the Acronis CyberSummit so it kinda made sense to script this so I have something to demonstrate at my session there.

Monitoring with PowerShell: Monitoring VSS Snapshots

Intro

Wow! It’s been a while since I’ve blogged. I’ve just been so swamped with CIPP that I’ve just let the blogging go entirely. It’s a shame because I think out of all my hobbies it’s one I enjoy the most. It’s always nice helping others achieve their scripting target. I even got a couple of LinkedIn questions asking if I was done with blogging but I’m not. Writing always gives me some more piece of mind so I’ll try to catch up again. I know I’ve said that before but this time I’ll follow through. I’m sitting down right now and scheduling the release of 5 blogs in one go. No more whining and no more waiting.