Hi,
This is an unsupported field developed utility, therefore, any support ticket won't be assisted to a great extent. However, we can try our best to assist here in the communities
What this blueprint does is run a VBS script with first running a query against a WMI Class to get all file names with extensions of:
'cer','crt','csr','der','p7b','p7r','spc','pfx','p12','crl','ssl','stl','sto','pem','p12','key','jks','ser'
If you have a cert file with a different extension, you can add it to the list within the Configuration --> Configuration Executables --> Get Certificate Expired Data --> Command (Windows)
Next, for each cert found, it will lookup the "NotAfter" value, which is when the certificate will expire
Those results will be displayed
Keep in mind, this blueprint will get the expired dates, not get the expired certificates, meaning it will get any and all expired dates of a cert instead of checking if something is expired as of today. The reason for this is, you may want to be proactive to renew the cert before it expires. everyone's process has a different timeline to do that so by displaying all, it covered the basis
You are free to modify the script to either display expired ones or about to expire in N days if needed.
Also, this does not just get the CA Products certificates, ti does any cert existing on the system, The difference between this script and other products that inspect certificates is the other products usually look for (installed \ added \ registered) certificates to the OS, versus any certificate file existing on the system, regardless of it being used or not
Last thing to keep in mind is that it will check all drives, so the more files existing, the longer it will take,
If any of the above does not help finding the the certificate in question (as you menaiton a few only fouynd, what was not found?), please let us know some details about the file and we can look at it more