Monitoring of local certificate stores in an internal PKI
It occasionally happens that self-signed certificates in a private PKI expire and cannot be monitored "out of the box" by Paessler. While certificate monitoring on bound ports works well, I would be delighted if, in the future, I could select which certificates (days until expiration, revocation status) I want to monitor in my certificate store.

Hi there,
Thank you again for submitting your idea to Paessler. We truly appreciate you taking the time to share your feedback.
After careful consideration by our team, we've decided to decline this idea at this time. This decision was made based on several factors, which may include:
- It doesn't align with our current product roadmap or strategic priorities.
- The resources required for implementation outweigh the current projected benefits for our user base.
- There are technical limitations that prevent us from moving forward.
- A similar feature is already available or planned in a different way.
While this particular idea won't be moving forward, please don't be discouraged! Your input is incredibly valuable, and we encourage you to continue sharing your thoughts and ideas with us.
Thanks for your understanding and for helping us shape the future of Paessler.
Best regards,
The Paessler Product Team
-
This is too vague to action, typically private CAs or certificate stores (I assume private KPI means this) all have different APIs and methods to track validity if they are not enabled by X.509 standards which Paessler can already monitor.