Solved

What is the best method to determine if a Certificate Authority is (still) in use?

Posted on 2016-07-21
1
64 Views
Last Modified: 2016-07-25
I need to know if I can turn down an Active Directory/Windows CA - determine if it is a root/intermediate/sub etc.
3 x Windows 2003 Servers that also happen to be Domain Controllers also.

Thank you.
0
Comment
Question by:K B
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 5

Accepted Solution

by:
Mdlinnett earned 500 total points
ID: 41723694
From the Certificate Authority MMC Snap-in, select your Certificate Server and expand the folders beneath, look at the 'Issued Certificates' folder... is there anything in there that isn't using the Certificate Template 'Domain Controller'?

I only have access to 2012 so I apologise if the steps are different.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question