Event ID - 100

Event Id100
SourceMicrosoft-Windows-CertificationAuthority
DescriptionActive Directory Certificate Services did not start: Could not load or verify the current CA certificate. %1 %2.
Event InformationAccording to Microsoft :
Cause
This event is logged when Active Directory Certificate Services did not start and could not load or verify the current CA certificate.
Resolution
Load and confirm a valid CA certificate and chain
You need to confirm that a valid certification authority (CA) certificate is accessible in order for certificate chain validation to take place. You can resolve problems associated with locating a valid CA certificate by confirming that:
A valid CA certificate is available on the computer hosting the CA.
A valid CA certificate exists in the AIA container.
The CA certificate chain can be validated.
If a certificate revocation list (CRL) for a CA in the chain has expired, a new CRL is generated.
To perform these procedures, you must have Manage CA permission, or you must have been delegated the appropriate authority.
Confirm that a valid CA certificate exists on the computer hosting the CA
To confirm that a valid CA certificate is available on the computer hosting the CA:
1.Click , type mmc, and then press ENTER.
2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click .
3.On the File menu, click Add/Remove Snap-in, click Certificates, and then click .
4. Click Computer account, and click .
5. Click Finish, and then click
OK.
6.In the console tree, click Certificates (Local Computer), and then click Personal.
7 Confirm that a CA certificate that has not expired exists in this store.
Confirm that a valid CA certificate exists in the AIA container
To confirm that a valid CA certificate exists in the AIA container:
1.Click Start, point to Administrative Tools, and click Active Directory Sites and Services.
2.Click Active Directory Sites and Services [domainname].
3.On the menu, click Show Services Node.
4.Double-click Services, double-click , and click AIA.
5.Confirm that a CA certificate that has not expired exists in the AIA container.
Validate the CA certificate chain
To validate a CA certificate chain:
1.Open a command prompt window.
2.Type certutil -urlfetch -verify on the CA certificate, and press ENTER.
3.Confirm that the AIA container and CRL distribution point network locations are available, that all certificates in the chain are valid and not revoked, and that valid CRLs are available
4.If the AIA or CRL distribution point locations are not available, identify and resolve the problem that is preventing them from being accessed.
5.If any certificates in the chain have expired or been revoked, renew these certificates. If a CA certificate needs to be reissued, all certificates under this certificate in the chain will need to be reissued.
6If a CRL for a CA in the chain has expired, generate new base and delta CRLs on this CA and copy them to the required locations.
7. If the CA is offline, you may need to restart it.
Check and publish CRLs
To check and, if necessary, publish new CRLs:

1.On the CA that is the source of the problem, check the current published CRL, which by default is created in the folder %windir%\System32\CertSrv\CertEnroll.
2. If the CRLs currently in this location have expired or are invalid, open a command prompt window, type certutil -CRL and press ENTER to publish a new CRL.
To generate new base and delta CRLs:
1.On the computer hosting the CA, click Start, point to Administrative Tools, and select Certification Authority.
2.In the console tree, click Revoked Certificates.
3.On the Action menu, point to All Tasks, and click Publish.
4.Select New CRL to overwrite the previously published CRL, or select Delta CRL only to publish a current delta CRL.
To create a CRL by using the Certutil command-line tool:
1.On the computer hosting the CA, click Start, type cmd and press ENTER.certutil -CRL and press ENTER.
To publish CRLs to AD DS by using the Certutil command-line tool:
1.Open a command prompt window.
2.Type certutil -dspublish "" ldap:///CN=,CN=,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=,DC=?certificateRevocationList?base?objectClass=cRLDistributionPoint and press ENTER. Replace crlname.crl with the name of your CRL file, CA name and CA hostname with your CA name and the name of the host on which that CA runs, and contoso and com with the namespace of your Active Directory domain.
Verify
To perform this procedure, you must have Manage CA permission, or you must have been delegated the appropriate authority.
To confirm that the certification authority (CA) certificate and chain are valid:
1.On the computer hosting the CA, click Start, type mmc, and then press ENTER.
2.If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
3.On the File menu, click Add/Remove Snap-in, click Certificates, and then click Add.
4.Click Computer account, and click Next.
5.Click , and then click OK.
6. In the console tree, click Certificates (Local Computer), and then click Personal.
7. Confirm that a CA certificate that has not expired exists in this store.
8.Right-click this certificate and select Export to launch the Certificate Export Wizard.
9.Export the certificate to a file named Cert.cer.
10.Type Start, and press ENTER.
11.Type certutil -urlfetch -verify and press ENTER.
12 If no validation, chain building, or revocation checking errors are reported, the chain is valid.
Reference LinksEvent ID 100 from Source Microsoft-Windows-CertificationAuthority

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.