Event ID - 89

Event Id89
SourceMicrosoft-Windows-CertificationAuthority
DescriptionActive Directory Certificate Services detected an exception during startup at address %1. The exception is %2.
Event InformationAccording to Microsoft :
Cause
This event is logged when Active Directory Certificate Services detected an exception during startup at address.
Resolution
Correct general problems that prevent Active Directory Certificate Services from starting
To perform these procedures, you must have Manage CA permission, or you must have been delegated the appropriate authority.
Fix general problems that can prevent Active Directory Certificate Services from starting
To fix general problems that can prevent Active Directory Certificate Services (AD CS) from starting:
1.On the computer hosting the CA, click Start, point to Administrative Tools, and click Services.
2.Check the status of the AD CS service. If the service is not running, attempt to restart it and observe if the error recurs or if other errors or warnings appear.
3.Restart the computer and try steps 1 and 2 again.
4.Check the event log message for a code that describes the specific reason that startup failed. If not, check the event log for additional errors and warnings preceding or following this error message and correct these errors.
5.If the problem persists and can reproduce the issue, use the following procedure, Create a CA debug log, to obtain additional information.
Create a debug log
To create a debug log:
1.On the computer hosting the CA, click Start, type cmd and press ENTER.
2.Type certutil -setreg ca\debug 0xffffffe3 and press ENTER.
3.Click Start, point to Administrative Tools, and click B>Services.
4.Select the Active Directory Certificate Services service, and click Start.
5.When you have reproduced the issue, locate the certsrv.log file containing advanced diagnostic information in the %windir% directory.
6.When you have finished generating the diagnostics, disable debugging by opening a command prompt window.
7.Type certutil -delreg ca\debug and press ENTER.
Enable CryptoAPI 2.0 Diagnostics
To enable CryptoAPI 2.0 Diagnostics:
1.On the computer hosting the CA, click Start, point to Administrative Tools, and click Event Viewer.
2.In the console tree, expand Event Viewer, Applications and Services Logs, Microsoft, Windows, and CAPI2.
3.Right-click Operational, and click Enable Log.
4.Click Start, point to Administrative Tools, and click Services.
5.Right-click Active Directory Certificate Services, and click Restart.
Verify
To perform this procedure, you must have membership in local Administrators on the computer hosting the certification authority (CA), or you must have been delegated the appropriate authority.
To confirm that the CA service is available:
1.On the computer hosting the CA, click Start, type cmd and press ENTER.
2.Type certutil -config -ping and press ENTER.CAconfig is the CA configuration string, in the form CAhostname\CAname.
Reference LinksEvent ID 89 from Source Microsoft-Windows-CertificationAuthority

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.