Collection Rule for event with source OnlineResponder and ID 23

Microsoft.Windows.CertificateServices.CARole.2016.OCSPEvents.23 (Rule)

An Online Responder service signing certificate cannot be found.

Knowledge Base article:

Summary

The status and functioning of the Microsoft Online Responder service has dependencies on numerous features and components, including the ability to access timely certificate revocation data, the validity of the certification authority (CA) certificate and chain, and overall system response and availability.

Resolutions

Enroll for a properly configured OCSP Response Signing certificate

In order to function, an Online Responder needs to have a valid OCSP Response Signing certificate.

If you are able to locate a valid OCSP Response Signing certificate in the appropriate Personal certificate store of the computer hosting the Online Responder, you can correct this problem by assigning the certificate to a revocation configuration and refreshing the revocation data.

However, if you do not have an OCSP Response Signing certificate, how you resolve problems with OCSP Response Signing certificates depends on whether certificate enrollment is configured to take place automatically or manually.

For revocation configurations using manual enrollment for signing certificates, do the following:

For revocation configurations using automatic enrollment for signing certificates, enrollment should take place without user intervention. Therefore, if the certificate does not exist, enrollment is probably blocked for some reason. Check the event log for additional errors or warnings that may be related to this error. If no other information is available, take the following actions:

To perform these procedures, you must be a member of local Administrators on every computer hosting the Online Responder and have Manage CA permissions on the computer hosting the CA, or you must have been delegated the appropriate authority.

Manually enroll for an OCSP Response Signing certificate

To manually enroll for an OCSP Response Signing certificate:

Assign a certificate to a revocation configuration

To assign a certificate to a revocation configuration:

Refresh revocation data

To refresh revocation information for an Online Responder by using the Online Responder snap-in:

Revocation configurations configured for automatic enrollment of signing certificates

The previous procedure assumes that the OCSP Response Signing certificate was configured for manual enrollment. If the OCSP Response Signing certificate template was configured for autoenrollment, you need to confirm that no other issues are blocking the renewal process.

To perform these procedures, you must have membership in local Administrators, or you must have been delegated the appropriate authority.

Confirm that a CA is accessible

To confirm that a CA is accessible by a client:

Note:  If you use -config -, the operation is processed by using the default CA. You must specify the computer or user with permission to enroll for certificates from the CA when you use the -config option. Otherwise, the Select Certification Authority dialog box appears and displays a list of all CAs that are available.

Confirm that a certificate template is properly configured

To confirm that an OCSP Response Signing certificate template is properly configured:

Confirm that a certificate template is available to a CA

To publish a certificate template:

Element properties:

TargetMicrosoft.Windows.CertificateServices.CARole.2016
CategoryEventCollection
EnabledTrue
Event_ID23
Event SourceMicrosoft-Windows-OnlineResponder
Alert GenerateFalse
RemotableTrue
Event LogApplication

Member Modules:

ID Module Type TypeId RunAs 
DS DataSource Microsoft.Windows.EventProvider Default
WriteToDB WriteAction Microsoft.SystemCenter.CollectEvent Default
WriteToOCSPEvents WriteAction Microsoft.Windows.CertificateServices.CARole.OCSPEvents.Publisher Default

Source Code:

<Rule ID="Microsoft.Windows.CertificateServices.CARole.2016.OCSPEvents.23" Enabled="true" Target="CSDisc!Microsoft.Windows.CertificateServices.CARole.2016" ConfirmDelivery="true" Remotable="true" Priority="Normal" DiscardLevel="100">
<Category>EventCollection</Category>
<DataSources>
<DataSource ID="DS" TypeID="Windows!Microsoft.Windows.EventProvider">
<ComputerName>$Target/Host/Property[Type="Windows!Microsoft.Windows.Computer"]/NetworkName$</ComputerName>
<LogName>Application</LogName>
<Expression>
<And>
<Expression>
<SimpleExpression>
<ValueExpression>
<XPathQuery Type="UnsignedInteger">EventDisplayNumber</XPathQuery>
</ValueExpression>
<Operator>Equal</Operator>
<ValueExpression>
<Value Type="UnsignedInteger">23</Value>
</ValueExpression>
</SimpleExpression>
</Expression>
<Expression>
<SimpleExpression>
<ValueExpression>
<XPathQuery Type="String">PublisherName</XPathQuery>
</ValueExpression>
<Operator>Equal</Operator>
<ValueExpression>
<Value Type="String">Microsoft-Windows-OnlineResponder</Value>
</ValueExpression>
</SimpleExpression>
</Expression>
</And>
</Expression>
</DataSource>
</DataSources>
<WriteActions>
<WriteAction ID="WriteToDB" TypeID="SC!Microsoft.SystemCenter.CollectEvent"/>
<WriteAction ID="WriteToOCSPEvents" TypeID="Microsoft.Windows.CertificateServices.CARole.OCSPEvents.Publisher"/>
</WriteActions>
</Rule>