Event Id | 104 |
Source | Microsoft-Windows-CertificationAuthority |
Description | Active Directory Certificate Services published certificate %1 to %2. |
Event Information | According to Microsoft : Cause This event is logged when Active Directory Certificate Services published certificate. Resolution : AD CS published a CA certificate to Active Directory Domain Services This behavior is by design. Active Directory Certificate Services (AD CS) published the specified certification authority (CA) certificate to Active Directory Domain Services (AD DS). This warning indicates that AD CS republished the CA certificate to AD DS because the certificate was not found in the AIA container (CN=AIA,CN=Public Key Services,CN=Services,DC=contoso,DC=com) in AD DS. Verify To perform this procedure, you must have Manage CA permission, or you must have been delegated the appropriate authority. To confirm that the certification authority (CA) certificate and chain are valid: 1.On the computer hosting the CA, click Start, type mmc, and then press ENTER. 2.If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue. 3. On the File menu, click Add/Remove Snap-in, click CertificatesAdd. 4.Click Computer account, and click ,Next. 5. Click Finish, and then click OK. 6. In the console tree, click Certificates (Local Computer), and then click Personal. 7.Confirm that a CA certificate that has not expired exists in this store. 8.Right-click this certificate and select 9.Export the certificate to a file named Cert.cer. 10.Type Start, 11.Type certutil -urlfetch -verify 12.If no validation, chain building, or revocation checking errors are reported, the chain is valid. |
Reference Links | Event ID 104 from Source Microsoft-Windows-CertificationAuthority |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.