Should we have a method by which we can discover certificates in the Windows Certificate Console snap-ins through Discovery (or ACC).Issue <!-- /*NS Branding Styles*/ --> .ns-kb-css-body-editor-container { p { font-size: 12pt; font-family: Lato; color: #000000; } span { font-size: 12pt; font-family: Lato; color: #000000; } h2 { font-size: 24pt; font-family: Lato; color: black; } h3 { font-size: 18pt; font-family: Lato; color: black; } h4 { font-size: 14pt; font-family: Lato; color: black; } a { font-size: 12pt; font-family: Lato; color: #00718F; } a:hover { font-size: 12pt; color: #024F69; } a:target { font-size: 12pt; color: #032D42; } a:visited { font-size: 12pt; color: #00718f; } ul { font-size: 12pt; font-family: Lato; } li { font-size: 12pt; font-family: Lato; } img { display: ; max-width: ; width: ; height: ; } } Currently we are using 4 methods of certificate discovery:- Run Certificate Discovery via individual URL scans- Run IP-Based Certificate Discovery- Run Certificate Discovery via certificate file import- Run Certificate discovery via Certificate Authority queryCertificates in the Windows Certificate console snap-ins (such as certmgr.msc in MMC) are used to view and manage certificates, certificate trust lists (CTLs), and certificate revocation lists (CRLs) on a Windows system. These certificates are stored in the Windows certificate store, not as individual files, and are managed through the built-in certificate management utility or MMC snap-in. The snap-in does not store certificates in file formats like .cert, .pem, .txt, or .der; instead, certificates are stored in a protected system store and accessed via the Windows API or exported as files if neededhttps://learn.microsoft.com/en-us/windows/security/book/operating-system-security-system-security --- Currently there is no method by which we can discover certificates in the Windows Certificate Console snap-ins through Discovery (or ACC). Release<!-- /*NS Branding Styles*/ --> .ns-kb-css-body-editor-container { p { font-size: 12pt; font-family: Lato; color: #000000; } span { font-size: 12pt; font-family: Lato; color: #000000; } h2 { font-size: 24pt; font-family: Lato; color: black; } h3 { font-size: 18pt; font-family: Lato; color: black; } h4 { font-size: 14pt; font-family: Lato; color: black; } a { font-size: 12pt; font-family: Lato; color: #00718F; } a:hover { font-size: 12pt; color: #024F69; } a:target { font-size: 12pt; color: #032D42; } a:visited { font-size: 12pt; color: #00718f; } ul { font-size: 12pt; font-family: Lato; } li { font-size: 12pt; font-family: Lato; } img { display: ; max-width: ; width: ; height: ; } } Zurich Resolution<!-- /*NS Branding Styles*/ --> .ns-kb-css-body-editor-container { p { font-size: 12pt; font-family: Lato; color: #000000; } span { font-size: 12pt; font-family: Lato; color: #000000; } h2 { font-size: 24pt; font-family: Lato; color: black; } h3 { font-size: 18pt; font-family: Lato; color: black; } h4 { font-size: 14pt; font-family: Lato; color: black; } a { font-size: 12pt; font-family: Lato; color: #00718F; } a:hover { font-size: 12pt; color: #024F69; } a:target { font-size: 12pt; color: #032D42; } a:visited { font-size: 12pt; color: #00718f; } ul { font-size: 12pt; font-family: Lato; } li { font-size: 12pt; font-family: Lato; } img { display: ; max-width: ; width: ; height: ; } } If you want this feature, then please up-vote the enhancement request in the Ideas portal, and ideally comment giving your business requirements and pain points:https://support.servicenow.com/ideas?id=view_idea&sysparm_idea_id=448fd57d93e2fad4f538fb2d6cba1011&sysparm_idea_table=x_snc_com_ideation_idea&sysparm_module_id=enhancement_requests