Event Id | 60 |
Source | Microsoft-Windows-CertificationAuthority |
Description | Active Directory Certificate Services refused to process an extremely long request from %1. This may indicate a denial-of-service attack. If the request was rejected in error, modify the MaxIncomingMessageSize registry parameter via
certutil -setreg CA\MaxIncomingMessageSize |
Event Information | According to Microsoft : Cause This event is logged when Active Directory Certificate Services Active Directory Certificate Services refused to process an extremely long request . Resolution Address an attempt to submit a long certificate request. Extremely long certificate requests can represent an attempt to launch a denial-of-service attack. The source should be identified in the event log message. You should also review information about all failed certificate requests to detect whether there have been other unusual certificate requests. To address this potential problem:
Review failed certificate requests To review failed certificate requests:
The default maximum message size setting is 10,000 bytes. If during your review of failed certificate requests in the previous procedure you detect legitimate certificate requests that were rejected because they exceeded this value, consider increasing this registry setting to a value that will allow similar requests to succeed. To modify the maximum message size: Caution: Incorrectly editing the registry might severely damage your system. Before making changes to the registry, you should back up any valued data.
To perform this procedure, you must have membership in local Administrators on the computer hosting the certification authority (CA), or you must have been delegated the appropriate authority. To confirm that the CA logon context is correct:
|
Reference Links | Event ID 60 from Source Microsoft-Windows-CertificationAuthority |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.