Windows Server 2008 RDP-TCP Certificate keeps going back to Auto generated

rdpssl-certificatewindows-server-2008windows-terminal-services

Our servers undergo periodic PCI compliance scans and we have a Windows 2008 server machine that we have port 3389 open for RDP. It is secured with SSL, but it is failing the scan because their test says:

 SOLUTION:
 Please install a server certificate signed by a trusted third-party Certificate Authority.
 RESULT:
 Certificate #0 unable to get local issuer certificate

As far as I can tell, the reason its failing is because in the Terminal Services Configuration tool it is using a locally created certificate instead of the one we got from GeoTrust. So, I open the wizard and it says the certificate is "Auto Generated." I click the SELECT button, change to the one we were issued from GeoTrust and hit OK to save everything (screen shot). However, then I disconnect my RDP session and reconnect and its back to "Auto Generated." I've even tried deleting the certificate from the MMC Local Computer Certificate snap-in and it just keeps recreating itself every time we reconnect through RDP. I can "pass" the scan by going through those motions and re-running the scan before I log in again with RDP, but that's hardly a permanent solution as these scans run every month.

Can anyone help me figure out how to get the trusted CA SSL cert to stick around permanently?

Thanks in advance.

Best Answer

Well, unfortunately no one was able to help and it came time where I had to deal with it so I played with it a little bit more and ultimately found something that seems to work, so I'll post it here in case it helps someone else.

My remote connection was connecting directly to the IP address of my server instead of the name in the trusted SSL certificate. So, when I changed my remote connection settings to connect to the trusted name instead of the IP address it worked fine. My assumption is that when you connect directly to the IP address, the RDP-TCP manager looks for a certificate that matches and if it doesn't find one, then it defaults back to the auto-generated one (and if that doesn't exist, then it re-creates it). So, now when I set it to the 3rd party trusted certificate and then connect using the FQDN of that certificate, it stays put.

So, now the scan passes without any flags and I'm good to go.