Since I'm not experienced with installing Root Certificate in that manner, can you be more specific with the steps to use to complete the entire process? I want to go through it myself before I update the guide.
I just discovered there's now a different and larger file (1 MB instead of 656 KB) and only 2 files appear during the extraction process instead of 12 files. I assume rootsupd.exe is run first and rvkroots.exe is run second.
Thanks for confirming how to install it. As soon as I test it in my Windows Vista Business SP2 64-bit test machine, I will make the appropriate change to step #5 in my guide.
MilkChan: I tried to run that root certificate yesterday in my test laptop which is running Windows Vista SP2 64-bit (is fully up to date with Windows Server 2008 64-bit updates). rootsupd.exe and rvkroots.exe both failed to load and do anything. It may work after a clean install of Windows Vista SP2 64-bit (dated April 2009) is done, but I don't plan to do that again anytime soon, so I'm not able to test it further right now.
It would be great if someone could create a Win32 Cabinet Self-Extractor installer, as don't know enough about the previous owner's installation.
Doing a clean install of Windows Vista SP2 64-bit and testing all 30+ steps of my guide takes about 5 to 6 hours, so I don't do it often. If I'm correct, Windows Server 2008 64-bit updates will be available for it for 9 more months. I'll probably test all 30+ steps 2 to 3 more times during that period. I'll make sure to test your February 2025 root certificate during the next test.
I still don't know how fix problems with MSE. I don't like Avasts or Pandas to much. Someone gave link to some MSE for enterprise for Vista/7 and how told it is free. Still work updates and have better protection. I can't find that link. I want test. But
Thank you for help. I try that. It install only English language or is and multi like in my Polish too?
Windows Vista will work with SCEP 4.10 ? Mean support and automatic update databases? Or like with MSE, SCEP will not work?
Those .exe files seem to be silent installers, they don't show any UI or confirmation that the Roots or Revoked Certificates have been updated. I tested them on a new install today and they did update them. I have created updated Roots and Revoked certs following that guide and neither showed a UI or confirmation, but they did both install. If you want these to show an install UI then change the Rootsupd SFX comment to: TempMode Silent=0 Overwrite=1 Setup=Rundll32.exe advpack.dll,LaunchINFSection rootsupd.inf,DefaultInstall And for Revoked: TempMode Silent=0 Overwrite=1 Setup=Rundll32.exe advpack.dll,LaunchINFSection rvkroots.inf,DefaultInstall
It interesting, because I turned TLS 1.2 before go in Server 2008 updates and don't work to me. Maybe KB some need. I check then.
I started to working on some offline collection and DISM integration script that can run on Windows 8.1 host so we can create fully updated image. And we can also use NTLite to remove updates backup as from v2.1.0.7862 is silently added support for Clean Update backup on Vista too. I tested in now only on Windows Vista x64. So all editions needs to be integrated and tested before we can get perfectly updated Vista image. What I want to achieve. 1. Integrate all updates 2. Integrate MRT + Defender definitions 3. Integrate .NET 4.6.2 with port fix from MSDN, VisualC++ and DirectX addons too 4. Auto-Sysprep to get all updates in installed status 5. Integrate USB and MassStorage drivers 6. Pack into ESD and install it from Windows 7 PE with Windows 10 setup engine, On Vista PE we can run Windows 8.0 setup engine, but into this PE cannot be integrated updates so there will be lack of HW support even with USB3.x driver All these steps I have prepared on my Windows 8.1 project, so only small adaptions are needed.
Since I'm not really sure if the February 2025 root certificate is installing, I've decided to leave the May 2024 root certificate in step #5 of the guide.