Hey @soulasylum,
What is your confidence level that your hypothesis is correct?
These are the reasons why I ask:
1.) The bad certificate has plagued symamsi.dll for at least two years. I can assert this to be true because it started filling my logues sometime in late 2018.
This I know for sure - remove and reinstall WILL NOT WORK. I tried it three times - three long and agonizing iterations of late nights and resentments stemming from the lack of any knowledge in the Norton community. All of my trials are documented in the Norton Community. I knew after the first round it would fail again, but I was reassured by a guru that I could log the data and send it to Symantec for evaluation. For three weeks I called and wrote emails trying to find someone who I could discuss the matter from a technical standpoint; well, that never happened. Even a little.
2.) It is not Device Guard that is the problem. I believe that the reason is Microsoft's increased security criteria for internal and external root certificates. As you most likely know, evil blackhats know how to inject bogus certificates into an encrypted transaction, thus stealing the session in a MITM attack. Many were generated from Microsoft, Thawte, and Comodo (now known as Sectigo, because Comodo really blew it). You are also aware of the certificate "Trust" store. Trust is the only thing between a MITM and Bob and Alice. You will see untrusted certificates in any PC's certificate store. Another story...and for reference, the external CA root, the Universal root, the trusted network CA, the class 2 CA, the RSA CA, the class 3 PP CA, the high assurance EV root CA and 150 others - are not part of the symamsi.dll problem.
3.)The offending certificate causing the symamsi.dll rejection is not from the Symantec cert shown. It can't be !
3A.) First, every signed MS driver binary has its own certificate - with the name of the binary embedded in the cert. How else could you possibly determine that any given binary is signed?
3B.) The offending certificate is embedded in the symamsi.dll binary code. I actually already knew this before I had seen it which is why it was so frustrating that none of the gurus knew anything about this.
3C.) I challenge anyone to go look at the strings in symamsi.dll. There you will find embedded Microsoft certs, not one, but potentially two or three. And guess what? IT'S NOT THE DATE ! ! ! without knowing the exact failure mode, I would guess three things. One is an archaic encryption method such as DES, two is an improper key length, and three is absolutely the most common - It's just misconfigured !
With Microsoft trying to do damage control on their public trust hammering, they raised the bar for third-party software vendors to get compliant certs so the binaries can join the ranks of code that sit in the System32 level signed trust. And get this - FTLOG - Microsoft will deploy certificates for you ! ! ! You don't really have to even think about it. Microsoft flew into action to reset cert requirements to a much higher standard - they did the right thing for the wrong reason - the "optics."
I have to say that I was extremely disappointed that Symantec, or anyone else for that matter, would assist me. Sitting behind my PC for several hours, doing the same thing and expecting different results really killed me. I will not light the guru who told me to "keep trying" on fire, but I had, once again to prove to myself, through a series of epic, reliable failures, that I actually knew what I was saying.
The fact this this sideshow is still going on, and there is still no clarity whatsoever from the Community, and people taking basic concepts out of context and spinning their own theories on how to solve this problem, does not speak well of Symantec, or the users who blindly trust root CA's - simply because they just don't know what the hell it is.
Anyway, I hope that you are able to wade through some of this; it's pretty straightforward and the logic is sound.
There needs to be one guru who knows certs well - that guru should be you. You could change your pseudonym to "CertAsylum." (LOL)
Anyway - I wish Peace to you and everyone at Symantec.
<>