They problem still exists...
If youe prefer, or need, to use https, you can add the missing Intermediate CA Certificate to the java keystore wich comes with the IMC.
You can get the Intermediate CA Certificate at https://knowledge.symantec.com/support/ssl-certificates-support/index?page=content&actp=CROSSLINK&id=INFO2055
- Just copy the content of the grey box into an file on your IMC, for example to /tmp/Symantec_Class_3_Secure_Server_SHA256_SSL_CA.pem
Then use the java keytool to add the certificate to the IMCs java keystores:
/opt/iMC/common/jre/bin/keytool -keystore /opt/iMC/common/jre/lib/security/cacerts -importcert -alias SymantecClass3SecureServerSHA256SSLCA -file /tmp/Symantec_Class_3_Secure_Server_SHA256_SSL_CA.pem
/opt/iMC/deploy/jdk/jre/bin/keytool -keystore /opt/iMC/deploy/jdk/jre/lib/security/cacerts -importcert -alias SymantecClass3SecureServerSHA256SSLCA -file /tmp/Symantec_Class_3_Secure_Server_SHA256_SSL_CA.pem
The requested keystore password for adding the cert is the default: "changeit"
Pathes are from the linux version, but on windows it should work similar.
Im not sure if it is neccessary to add the cert to both keystores.
After that, liveupdate is woking with the default https adress.
But remember: You have to repeat this, after you update your IMC software, because the keystores will be overwritten.