Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Active Directory Web Services could not find a server certificate with the specified certificate name. A certificate is required to use SSL/TLS connections. To use SSL/TLS connections verify that a valid server authentication certificate from a trusted Certificate Authority (CA) is installed on the machine.
Certificate name: <host name>
|English: Request a translation of the event description in plain English.|
EV100590 (Ask the Directory Services Team) provides some answer for an instance when this event was recorded (even though ADWS was working fine).
In many situations, this event is recorded along with event id 1202 from ADWS so you may want to check the comments for that event (see the link below).
|Private comment: Subscribers only. See example of private comment|
|Links: Event id 1202 from ADWS|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated