ADCS: Metrics on ADCS Database
What is the best way to collect metrics on ADCS database
For example, I want to know:
- Number of current Issued Certificates
- Number of current Revoked Certificates
- Number of certificates issued in a period of time
Is any MMC SnapIn or tool that collects this kind of information?
thanks in advance
BFC
August 31st, 2011 1:33pm
Hello,
use the enterprise PKI snap-in to obtain that. More here: http://technet.microsoft.com/en-us/library/cc732261(WS.10).aspx
It will be better to ask them here: http://social.technet.microsoft.com/Forums/en-US/winserversecurity/threads
This
posting is provided "AS IS" with no warranties or guarantees , and confers no rights.
Microsoft Student
Partner 2010 / 2011
Microsoft Certified Professional
Microsoft Certified Systems Administrator:
Security
Microsoft Certified Systems Engineer:
Security
Microsoft Certified Technology Specialist:
Windows Server 2008 Active Directory, Configuration
Microsoft Certified Technology Specialist:
Windows Server 2008 Network Infrastructure, Configuration
Microsoft Certified Technology Specialist:
Windows Server 2008 Applications Infrastructure, Configuration
Microsoft Certified Technology Specialist:
Windows 7, Configuring
Microsoft Certified IT Professional: Enterprise
Administrator
Microsoft Certified IT Professional: Server Administrator
Free Windows Admin Tool Kit Click here and download it now
August 31st, 2011 1:51pm
What is the best way to collect metrics on ADCS database
For example, I want to know:
- Number of current Issued Certificates
- Number of current Revoked Certificates
- Number of certificates issued in a period of time
Is any MMC SnapIn or tool that collects this kind of information?thanks
in advanceBFC
August 31st, 2011 2:07pm
Although I haven't used it, Forefront Identity Manager provides certificate management.
http://technet.microsoft.com/en-us/library/ff621363(WS.10).aspx
http://technet.microsoft.com/en-us/evalcenter/cc872861.aspx
Paul Bergson
MVP - Directory Services
MCITP: Enterprise Administrator
MCTS, MCT, MCSE, MCSA, Security+, BS CSci
2008, Vista, 2003, 2000 (Early Achiever), NT4
http://www.pbbergs.com Twitter @pbbergs
http://blogs.dirteam.com/blogs/paulbergson
Please no e-mails, any questions should be posted in the NewsGroup. This posting is provided "AS IS" with no warranties, and confers no rights.
Free Windows Admin Tool Kit Click here and download it now
August 31st, 2011 3:07pm
you can use certutil with '-restrict' parameter or you can use my PowerShell PKI module:
http://pspki.codeplex.com/
The following commands can be used to achieve your task:
(Get-CertificationAuthority -computer ca.company.com | Get-Issued-Request).lentgth
(Get-CertificationAuthority -computer ca.company.com | Get-RevokedRequest).lentgth
(Get-CertificationAuthority -computer ca.company.com | Get-Issued-Request -Filter "NotBefore -ge 01.08.2011","NotBefore -le 31.08.2011").lentgth
Last command will display certificates issued in august. Note that datetime format may differ depending from your regional settings.My weblog: http://en-us.sysadmins.lv
PowerShell PKI Module: http://pspki.codeplex.com
Windows PKI reference:
on TechNet wiki
August 31st, 2011 6:14pm


