Dear Team,
This is my answer:
Since the issue stems from auto-enrolled certs taking precedence, this workaround is effective:
Block domain-based auto-enrollment via Group Policy.
Keep only the wildcard cert you want for TLS authentication.
This works, but you lose the ability to use the machine cert for other purposes.
Windows' built-in SMTP service doesn't support SNI (Server Name Indication) or reliable certificate binding.
Alternative: Use a modern SMTP server that supports:
Explicit certificate binding,
SNI (if applicable),
Reliable TLS authentication.
Examples:
- hMailServer (free, but less maintained),
- Postfix on Windows Subsystem for Linux (WSL),
- 3rd-party commercial SMTP relay apps.Windows' built-in SMTP service doesn't support SNI (Server Name Indication) or reliable certificate binding. Alternative: Use a modern SMTP server that supports:
- Explicit certificate binding,
- SNI (if applicable),
- Reliable TLS authentication.
- hMailServer (free, but less maintained),
- Postfix on Windows Subsystem for Linux (WSL),
- 3rd-party commercial SMTP relay apps.
You could try using PowerShell or certutil
to manage which certificates are available in the Computer\Personal store.
Example (PowerShell):
# Export or backup the wildcard cert first
$cert = Get-ChildItem -Path Cert:\LocalMachine\My | Where-Object { $_.Subject -like "*.yourdomain.com" }
$cert | Remove-Item
Then re-import only the desired cert.
This is manual and not permanent; cert renewal or domain policy updates will reset it.
Best Regards,