Endpoint Security: Creating Certificates