Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I found this to be a workaround but it appears you will be setting the application to http instead of https so if it's secure data it wouldn't be a wise idea.
When SSL Decryption is enabled for a site like drive.google.com, the secure connection in the Google Drive app will break due to an invalid security certificate. Unfortunately, the app uses its own certificate instead of sharing the browser’s certificate store. This is known as certificate penning. There is no way to modify the certificate or add certificates in the app itself. The work around, however, is fairly simple. The invalid certificate can be ignored by adding a switch when running the app. The methods below have been tested and seem to be viable. Use any of the following three methods to activate the switch.
1. Edit the shortcut for the Google Drive and add the switch at the end: Change C:\Program Files\Google\Drive\googledrivesync.exe to C:\Program Files\Google\Drive\googledrivesync.exe" --unsafe_network 2. Open a command prompt and navigate to the folder where Google Drive is installed. At a prompt, run googledrivesync.exe --unsafe_network
3. You can also push out a registry entry change if Drive Sync is auto starting
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\GoogleDriveSync]. Add the value -unsafe_network after the quote as shown below. "C:\Program Files (x86)\Google\Drive\googledrivesync.exe" --unsafe_network /autostart
source = http://support.iboss.com/...ve-desktop-application
Jerry Paul White
Network Engineer/Tech Supervisor
" 01001000 01100001 01110110 01100101 00100000 01100001 00100000 01000111 01101111 01101111 01100100 00100000 01000100 01100001 01111001"
this is not a valid work around when I have 2000 devices on the network. I can not touch every company owned and privately owned device.
You must start Google Drive sync with
googledrivesync.exe --unsafe_network
Hello, this is fine, but I would like to understand why the SSL deep packet exemption for 'Google Drive' doesn't seem to work. If it did, then there would be no need to run the Google Drive app in 'HTTP' mode.
So, what actually is the purpose of the 'Google Drive' SSL deep packet exemption entry that I see there ? i.e. why are we forced to use HTTP mode ?
Thank you kindly.
fran1942 wrote:Hello, this is fine, but I would like to understand why the SSL deep packet exemption for 'Google Drive' doesn't seem to work. If it did, then there would be no need to run the Google Drive app in 'HTTP' mode.
So, what actually is the purpose of the 'Google Drive' SSL deep packet exemption entry that I see there ? i.e. why are we forced to use HTTP mode ?
Thank you kindly.
[ul]
Check references below:
https://kb.fortinet.com/kb/viewContent.do?externalId=FD36816
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1705 | |
1093 | |
752 | |
446 | |
230 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.