The integration can monitor the expiration of all certificates in a given store or selectively monitor specific certificates from a given list of strings matching with the certificate subjects. The store names that are available for monitoring are listed in HKEY_LOCAL_MACHINE\Software\Microsoft\SystemCertificates.
This example configuration monitors all certificates in the local machine’s ROOT store:
instances:- certificate_store:ROOT
This example configuration monitors certificates in ROOT that have microsoft or verisign in the subject:
The parameters days_warning and days_critical are used to specify the number of days before certificate expiration from which the service check windows_certificate.cert_expiration begins emitting WARNING/CRITICAL alerts. In the below example the service check emits a WARNING alert when a certificate is 10 days from expiring and CRITICAL when it is 5 days away from expiring:
The windows_certificate integration does not include any events.
Service Checks
windows_certificate.cert_expiration Returns CRITICAL if the certificate has expired or expires in less than days_critical, returns WARNING if the certificate expires in less than days_warning, otherwise returns OK. Statuses: ok, critical, warning