How can i test 'certutil -dcinfo deleteBad'
Hello, in an AD environment i found old Windows CA entries from a test system (the test system don't exist any more) I removed the AD entries as explained here http://support.microsoft.com/kb/555151/en-us Now i still see on the DC with 'certutil -dcinfo' both certs (the old one and the new one). And the KDC entry from the new CA I probably have to remove the old CA entry with "certutil -dcinfo deleteBad" But how can i test before, which entry will be deleted. I Want to be sure, that the command will delete the old CA entry and not the new one The output from certutil -dcinfo verbose was not helpful for me Thanks in advance Boris
July 7th, 2011 12:15pm

the command will delete invalid certificates (which cannot pass certificate chaining engine checking). Therefore if new certificate is marked as valid, it will remains after command completion.My weblog: http://en-us.sysadmins.lv PowerShell PKI Module: http://pspki.codeplex.com
Free Windows Admin Tool Kit Click here and download it now
July 7th, 2011 12:38pm

Bute where can i see (before using this command) which certificates are valid for the computer? in the certficate-mmc-snapin both look valid
July 8th, 2011 4:05am

The problem has been solved by itself. The old cert no longer exist. Probably in the night an automatic internal AD job has cleaned the cert-database thanks borris
Free Windows Admin Tool Kit Click here and download it now
July 8th, 2011 7:31am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics