Hello, we have a Windows Server 2012 R2 as a domain controller and we receive several event id 64 messages.... Certificate for local system with Thumbprint "xx....xx" is about to expire or already expired.
This has been appearing for sevarl months and does not appear to be affecting anything. I understand that this can be ignored but wanted to clean this up. These thumbprints do not seem to appear in the Certificates MMC program. How can I find them and remove?
Thank you
Thank you for your update and marking my reply as answer. I am very glad that the information is helpful.
As always, if there is any question in future, we warmly welcome you to post in this forum again. We are happy to assist you!
Hello
@Computer Gladiator
,
Thank you for posting here.
From the error message you provided, it seems some cert in user store or computer store is about to expire or already expired. We can try to find it as below.
1.Click
Start
, type
mmc
, and then press
ENTER
.
2.If the
User Account Control
dialog box appears, confirm that the action it displays is what you want, and then click
Continue
.
3.On the
File
menu, click
Add/Remove Snap-in
, click
Certificates
, and then click
Add
.** **
4.Select the user or computer account that logged the error, and click
Next
.
5.Click
Finish
, and then click
OK
.
6.In the console tree, click
Certificates - Current User or Certificates (Local Computer)
, and then click
Personal
.
7.In the console tree, double-click
Certificates
, double-click
Personal
, and then click
Certificates
.
8.Locate the certificate with the thumbprint listed in the event log message.
For example:
Hope the information above is helpful.
Should you have any question or concern, please feel free to let us know.
Best Regards,
Daisy Zhou
Can you explain more how to stop this warning message from appearing in the event log.
I don't think your answer goes far enough in explaining why this is happening.
Thanks
Firstly, why do MS people insist on using the snap-in for certs? Just hit start and type Cert, gives the option of Computer and User certs.
Secondly, to find a cert via thumbprint use powershell:
Get-ChildItem -path 'Cert:\*5b1fd0c0be45f22c868048f08939a132d532b11f' -Recurse | Format-List