Hi All
NDES is mandatory role in Microsoft CA, without NDES i canot enroll certificates for the network devices?
any disadvantage if i not install NDES role and any advantage?
Hi All
NDES is mandatory role in Microsoft CA, without NDES i canot enroll certificates for the network devices?
any disadvantage if i not install NDES role and any advantage?
Hi every body
I am trying to issue digital certificates for people who work in different organizations. all people and organizations have their unique National IDs, and I want to include these national IDs in subject filed. I use serialnumber attribute for people IDs. what attribute do you suggest for organization National Id? By the way I currently use the organizationName and OrganizationalUnitName in my subject and they contain other information, and I want to use a unique attribute for Organization ID, not a repetitive one.
Hello,
I have been asked to help look at an issue with a Windows 2016 certificate server at work which is not issuing auto-enrollment user certificates. This is a new implementation of PKI which consists of a 2 tier setup utilising an offline root CA server and an online issuing CA server.
I have not been involved in the setup and apparently it has been working so something has changed to cause this issue.
When I log onto a Windows 10 client workstation, it should auto-enroll a user certificate but no error was appearing. I enabled a registry key in the User section of the registry to get verbose logging in the event log which now shows the following error.
Warning: CertificateServicesClient-CertEnroll
Event ID 47
Certificate enrollment for domain\username could not enrol for a UserCertificateNamecertificate. A valid certification authority cannot be found to issue this template.
If I use network monitor on the CA server during this process, I don't see any traffic hit the CA server from the client. If I then run the Certificates snap-in from an MMC on the workstation and go through the wizard to renew the certificate, it pops up and works. During this process I see a lot of activity in network monitor running on the server.
I think someone has made a change to the server that has casused this issue, but Certificate Authority Services is not my strong point on Windows Server 2016 and am struggling to figure out what the problem could be.
Any help or suggestions would be greatly appreciated.
Dave
Hi
we pushed Cumulative and service tack update on our server 2016 but we saw that some website (under chrome or IE) have a certificate issue (not our widows 10) linked to an invalid root certificate
In deed, certificates chain is different between windows server and windows 10
how can i update those trust root certificate
thanks
I have server 2008R2 CA which is running on the same server as the domain controller. I am looking for a microsoft article where it says supported operating system for destination server with 2016 is supported when migrating from Server 2008R2 , but I couldnt find it anywhere.
Below is one supporability link i found
I found below article which says it is not possible to migrate from Server 2008 to Server 2016 directly.
http://www.yshvili.com/migrate-windows-server-2008-r2-certification-authority-new-server-windows-2012-2012-r2-2016/
Does the same applies to Server 2008 R2 to server 2016. do i need to migrate first to Server 2012 R2 then to Server 2016 ??
ROBIN
I am running an elevated powershell script that installs an application on the local Windows machine. The script is being halted but the UAC prompt "Do you want to allow the following program to make changes to your computer?"
Is there a way to Programmatically answer 'yes' ?
The SendKeys seems to be disabled for the UAC window.
Hi,
Could anybody give me a hint on how to grant RPC permissions for specific group / service account ondomain controllers?
We are deploying lic. inventory tool and instead of installing agent in T0 (where DCs are) I decided to do an inventory of all DCs over a network from single probe server that is also placed in T0 - this provides me better security. But unfortunately, it requires some perms on such target netw. device to gather info about licenses; RPC specifically... and I don't want to delegate such through domain admins group since that would be way too much.
Any ideas, hints?
Hey I got a simple HA/AG SQL 2017 on the latest CU14.
I am trying to copy users from the primary to the secondary and it all works well on port 1433.
I can enable/disable the firewall and the script works as expected.
The problem is that when the 1433 TCP Port is changed to another port, the script fails whenever the firewall is enabled on the intended destination. If I disable the FW, it just works.
So i tried open ports 5022, and 49000-51000, same fail, multiple reboots, applying SQLAgent and ..CEIP.. to the firewall allowed communitaction - all fails. Process monitor does not tell me what is blocked and reports the expected ports and applications are responding as intended and succeded.
In Powershell I used the same script, zero modifications.
My Script fails when it runs
Invoke-Sqlcmd -Query $Query -ServerInstance 10.10.15.204
The exact failure message is
Invoke-Sqlcmd : Connection Timeout Expired. The timeout period elapsed while attempting to consume the pre-login handshake acknowledgement. This could be because the pre-login handshake failed or the server was unable to respond back in time. The duration spent while attempting to connect to this server was - [Pre-Login] initialization=19286; handshake=16099;
At C:\scripts\powershell.ps1:344 char:17
+ ... Invoke-Sqlcmd -Query $Query -ServerInstance 10.10.15.204
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : InvalidOperation: (:) [Invoke-Sqlcmd], SqlException
+ FullyQualifiedErrorId : SqlExectionError,Microsoft.SqlServer.Management.PowerShell.GetScriptCommand
Invoke-Sqlcmd :
At C:\scripts\powershell.ps1:344 char:17
+ ... Invoke-Sqlcmd -Query $Query -ServerInstance 10.10.15.204
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : ParserError: (:) [Invoke-Sqlcmd], ParserException
+ FullyQualifiedErrorId : ExecutionFailureException,Microsoft.SqlServer.Management.PowerShell.GetScriptCommand
What firewall settings should I choose
Hi there,
I've looked through a wealth of information between these forums and other resources from both Microsoft and others to try and get an answer on an issue I'm having. I'm part of a security team (SOC) and I've been asked to create some rules in the SIEM to detect the use of interactive logons to service accounts through type 2 (Interactive) and type 10 (Remote desktop, assistance etc.) The idea is that users shouldn't be logging in with the service accounts and instead should only be using the service accounts for batch tasks, scripts etc. which are automated.
What I've found is that type 2 logons are shown with the logon process as 'Advapi' in a lot of cases, where the user performing the logon is the local SYSTEM account. Generally there are many of these at one time and it seems they must be automated, from the explanations I've seen I cannot grasp how they can be both automated and logon type 2 at the same time. Also, why would a logon that doesn't seem to be IIS or web services show the Advapi logon process? Regarding Advapi:
I understand the explanation I have seen where users have stated that:
"Logon’s through an KVM over IP component or a server’s proprietary “lights-out” remote KVM feature are still interactive logons from the standpoint of Windows and will be logged as such."
The above explanation does not seem to account for the payload below.
Here's a payload of a service account with a logon type 2 with the process of powershell:
<13>May 23 10:42:10 ComputerName1 AgentDevice=WindowsLog AgentLogFile=Security PluginVersion=7.2.5.27 Source=Microsoft-Windows-Security-Auditing Computer=ComputerName1.AD.INTRA OriginatingComputer=ComputerName1 User= Domain= EventID=4624 EventIDCode=4624 EventType=8 EventCategory=12544 RecordNumber=88259597 TimeGenerated=1558600930 TimeWritten=1558600930 Level=0 Keywords=0 Task=0 Opcode=0 Message=An account was successfully logged on. Subject: Security ID: NT AUTHORITY\SYSTEM Account Name: ComputerName1$ Account Domain: AD Logon ID: 0x3e7 Logon Type: 2 New Logon: Security ID: AD\Service_Account1 Account Name:Service_Account1 Account Domain: AD Logon ID: 0x161287e88 Logon GUID: {B5A094D8-A46A-7DCB-FD2D-65852AFFC359} Process Information: Process ID: 0x852cProcess Name: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Network Information: Workstation Name: ComputerName1 Source Network Address: - Source Port: - Detailed Authentication Information:Logon Process: Advapi Authentication Package: Negotiate Transited Services: - Package Name (NTLM only): - Key Length: 0
These events come in batches of 5-10 at once showing that these are obviously automated, the account itself's function pulls information from devices on the network to update a ticketing system, ServiceNow.
I know I could filter out any account initiating the logons which are computer accounts (End in $ or System) but I think this also runs the risk of users impersonating the System account.
Can anyone help in explaining my confusion? I want to only be detecting actual users misusing service accounts and any more information would be greatly appreciated. Many thanks in advance guys.
Hi
I am being told that a major global company can not differentiate if a recorded user Windows event is a file explorer search, a copy, viewing file metadata or opening a file.
This does not feel right s no company could ever tell which file were accessed in a data breach or just found in a search.
Can someone help clarify?
2 follow up questions,
If the company shares the raw log file is t possible to determine which files were opened or just came back as teh result of a search?
What is the significance of a file called desktop.ini showing up at various stages as "Read"
Thanks
Hello Microsoft community,
I'm thinking about creating Test environment as close as possible to the production environment on my LAN
I have 3 Servers: the first one is not in use Dell T420 - the second one is DL360 GEN9 main server with 4 VMs and the third is DELL 5820 pc that working with DL360 to replicate the machines..
Now I cant use DELL 5820 replicated machines for my test because they are for disaster recovery if something happens to my main server DL360..
How do I create full replica of my production environment and keep the test environment up to date with my production environment?
Hi,
I was wondering if someone could point me in the right direction.
I have recently migrated our ca server from 2008 to 2016.
The root certificate has a validity period of 999 years. I would like to update this to something more reasoanble. I have created the file CAPolicy.inf and placed it in the c:\windows folder and then restarted the certificate service.
Upon generating a new root certificate, the validity period is still set to 999 years. I have also searched through the registry for the setting but with no luck.
Is there another place I should be looking at to update the time period?
Thanks
Pete
Hello,
I spent a decent amount of time searching but could not find an answer to my question.
Is there a way to add 3rd party certs in the CA certs response CertSrv provides in https://<hostname>/certsrv/certcarc.asp ?
If this needs to be redirected to another forum please let me know.
Thank you,
PK