Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
The certificate (#0) of Certificate Services KKK CA does not exist in the certificate store at CN=NTAuthCertificates,CN=Public Key Services,CN=Services in the Active Directory's configuration container. The directory replication may not be completed.
|English: Request a translation of the event description in plain English.|
From a newsgroup post: "Log on to the CA machine as a domain or enterprise admin. Browse to the %windir%\System32\CertSrv\CertEnroll directory. There should be one file with the .crt extension, but without any parenthesized index just before the .crt extension (for example: "foo.crt" -- not "foo(3).crt" and not "foo(1-3).crt"). Run the following command to manually publish it to the NtAuth store: certutil -dspublish foo.crt NtAuthCA".
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated