Event Id | 105 |
Source | Microsoft-Windows-CertificationAuthority |
Description | Active Directory Certificate Services deleted invalid certificate %1 from %2. |
Event Information | According to Microsoft : Cause This event is logged when Active Directory Certificate Services deleted invalid ceritificates. Resolution AD CS deleted an invalid certificate in Active Directory Domain Services Active Directory Certificate Services (AD CS) deleted an invalid certificate from Active Directory Domain Services (AD DS). The certificate that was deleted is specified in the event log description. AD CS will delete a certificate if it determines that certificates in the AIA container in AD DS are not consistent with the certificates in the local store of the certification authority (CA). Verify To perform this procedure, you must have Manage CA permission, or you must have been delegated the appropriate authority. To confirm that the certification authority (CA) certificate and chain are valid: 1.On the computer hosting the CA, click Start, type mmc, and then press ENTER. 2.If the 3. On the File menu, click Add/Remove Snap-in, click Certificates, and then click Add. 4.Click Computer account, and click Next. 5.Click Finish, and then click OK. 6. In the console tree, click Certificates (Local Computer), and then click Personal. 7. Confirm that a CA certificate that has not expired exists in this store. 8.Right-click this certificate and select Export to launch the Certificate Export Wizard. 9.Export the certificate to a file named Cert.cer. 10.Type Start, cmd and press ENTER. 11.Type certutil -urlfetch -verify 12. If no validation, chain building, or revocation checking errors are reported, the chain is valid. |
Reference Links | Event ID 105 from Source Microsoft-Windows-CertificationAuthority |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.