Collection Rule for event with source CertificationAuthority and ID 58 Rule

  • ID:  Microsoft.Windows.CertificateServices.CARole.6.3.CertSvcEvents.58_Error
  • Description:  A certificate in the chain for the CA certificate has expired.
  • Target:  Certificate Service (2012 R2)
  • Enabled:  On Essential Monitoring

Overridable Parameters

Parameter Name Default Value Description Override
Priority 2  
Severity 2  

Run As Profiles

Name
Default

Alert Details

Message Priority Severity
AD CS Certification Authority Certificate and Chain Validation High Critical

Rule Knowledgebase

Summary

Chain or path validation is the process by which end-entity (user or computer) certificates and all certification authority (CA) certificates are processed hierarchically until the certificate chain terminates at a trusted, self-signed certificate. Typically, this is a root CA certificate. Active Directory Certificate Services (AD CS) startup can fail if there are problems with availability, validity, and chain validation for the CA certificate.

Causes
This rule does not contain any causes.
Resolutions

Reissue certificates in the chain for an expired CA certificate

The certification authority (CA) certificate that has expired will be identified in the event log. To resolve this issue:

  • Check whether the certificate has expired.

  • Confirm the certificate chain.

  • If the problem persists, enable CryptoAPI 2.0 Diagnostics, resolve any errors found, and then reissue and reinstall the expired certificates.

To perform these procedures, you must have Manage CA permission, or you must have been delegated the appropriate authority.

Check CA certificate expiration

To check whether a specific CA certificate has expired:

  • On the computer hosting the CA, click Start, point to Administrative Tools, and click Certification Authority.

  • Right-click the CA node, and click Properties.

  • Expired certificates will be listed with the word (expired) in the list of CA certificates. If all CA certificates are expired, you will have to renew the CA certificate and reissue any certificates below the expired CA certificate.

  • To renew the CA certificate, right-click the CA node, point to All Tasks, and click Renew CA Certificate.

  • After the CA certificate has been renewed, restart the CA.

  • If there are unexpired certificates in the list, find the certificate whose CA Version number matches the key ID in the error message. For example, if the key ID is 2, the certificate with CA Version 2.1 or 2.2 would be the correct certificate.

  • If this certificate has not expired, check for problems with the certificate chain. Export the certificate to a file, and then open a command prompt window, type certutil -urlfetch -verify<CAcert.cer> and press ENTER. (Replace CAcert.cer with the name of the certificate file.)

Enable CryptoAPI 2.0 Diagnostics

To enable CryptoAPI 2.0 Diagnostics:

  • On the computer hosting the CA, click Start, point to Administrative Tools, and click Event Viewer.

  • In the console tree, expand Event Viewer, Applications and Services Logs, Microsoft, Windows, and CAPI2.

  • Right-click Operational, and click Enable Log.

  • Click Start, point to Administrative Tools, and click Services.

  • Right-click Active Directory Certificate Services, and click Restart.

External References
This rule does not contain any external references.

See Also for Active Directory Certificate Services Management Pack


Downloads for Active Directory Certificate Services Management Pack

AZURE OPTIMIZATION ASSESSMENT GET STARTED
MIGRATION TO AZURE GET STARTED
SYSTEM CENTER MIGRATION TO AZURE GET STARTED
MIGRATION TO AZURE FOR SQL AND WINDOWS 2008 GET STARTED