22 KiB
title, description, keywords, ms.prod, ms.mktglfcycl, ms.sitesec, author, ms.localizationpriority, ms.author, ms.date
title | description | keywords | ms.prod | ms.mktglfcycl | ms.sitesec | author | ms.localizationpriority | ms.author | ms.date |
---|---|---|---|---|---|---|---|---|---|
Data Collection for Troubleshooting 802.1x Authentication | Data needed for reviewing 802.1x Authentication issues | troubleshooting, data collection, data, 802.1x authentication, authentication, data | w10 | library | kaushika-msft | medium | mikeblodge | 10/29/2018 |
Data Collection for Troubleshooting 802.1x Authentication
Capture wireless/wired functionality logs
Use the following steps to collect wireless and wired logs on Windows and Windows Server:
-
Create C:\MSLOG on the client machine to store captured logs.
-
Launch a command prompt as an administrator on the client machine, and run the following commands to start RAS trace log and Wireless/Wired scenario log.
Wireless Windows 8.1 and Windows 10:
netsh ras set tracing * enabled netsh trace start scenario=wlan,wlan\_wpp,wlan\_dbg,wireless\_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%\_wireless\_cli.etl
Wireless Windows 7 and Windows 8:
netsh ras set tracing * enabled netsh trace start scenario=wlan,wlan\_wpp,wlan\_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%\_wireless\_cli.etl
Wired client, regardless of version
netsh ras set tracing * enabled netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%\_wired\_cli.etl
-
Run the following command to enable CAPI2 logging:
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
-
Create C:\MSLOG on the NPS to store captured logs.
-
Launch a command prompt as an administrator on the NPS and run the following commands to start RAS trace log and Wireless/Wired scenario log:
Windows Server 2012 R2, Windows Server 2016 wireless network:
netsh ras set tracing * enabled netsh trace start scenario=wlan,wlan\_wpp,wlan\_dbg,wireless\_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%\_wireless\_nps.etl
Windows Server 2008 R2, Windows Server 2012 wireless network
netsh ras set tracing * enabled netsh trace start scenario=wlan,wlan\_wpp,wlan\_dbg globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%\_wireless\_nps.etl
Wired network
netsh ras set tracing * enabled netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%\_wired\_nps.etl
-
Run the following command to enable CAPI2 logging:
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
7. Run the following command from the command prompt on the client machine and start PSR to capture screen images:
> [!NOTE]
> When the mouse button is clicked, the cursor will blink in red while capturing a screen image.
psr /start /output c:\MSLOG\%computername%\_psr.zip /maxsc 100
8. Repro the issue.
9. Run the following command on the client PC to stop the PSR capturing:
psr /stop
10. Run the following commands from the command prompt on the NPS.
- To stop RAS trace log and wireless scenario log:
```
netsh trace stop
netsh ras set tracing * disabled
```
- To disable and copy CAPI2 log:
```
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:false
wevtutil.exe epl Microsoft-Windows-CAPI2/Operational C:\MSLOG\CAPI2\_%COMPUTERNAME%.evtx
```
11. Run the following commands on the client PC.
- To stop RAS trace log and wireless scenario log:
```
netsh trace stop
netsh ras set tracing * disabled
```
- To disable and copy the CAPI2 log:
```
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:false
wevtutil.exe epl Microsoft-Windows-CAPI2/Operational C:\MSLOG\CAPI2\_%COMPUTERNAME%.evtx
```
12. Save the following logs on the client and the NPS:
**Client**
- C:\MSLOG\%computername%_psr.zip
- C:\MSLOG\CAPI2_%COMPUTERNAME%.evtx
- C:\MSLOG\%COMPUTERNAME%_wireless_cli.etl
- C:\MSLOG\%COMPUTERNAME%_wireless_cli.cab
- All log files and folders in %Systemroot%\Tracing
**NPS**
- C:\MSLOG\%COMPUTERNAME%_CAPI2.evtx
- C:\MSLOG\%COMPUTERNAME%_wireless_nps.etl (%COMPUTERNAME%_wired_nps.etl for wired scenario)
- C:\MSLOG\%COMPUTERNAME%_wireless_nps.cab (%COMPUTERNAME%_wired_nps.cab for wired scenario)
- All log files and folders in %Systemroot%\Tracing
## Save environmental and configuration information
### On Windows client
1. Create C:\MSLOG to store captured logs.
2. Launch a command prompt as an administrator.
3. Run the following commands.
- Environmental information and Group Policies application status
gpresult /H C:\MSLOG%COMPUTERNAME%_gpresult.htm msinfo32 /report c:\MSLOG%COMPUTERNAME%_msinfo32.txt ipconfig /all > c:\MSLOG%COMPUTERNAME%_ipconfig.txt route print > c:\MSLOG%COMPUTERNAME%_route_print.txt
- Event logs
wevtutil epl Application c:\MSLOG%COMPUTERNAME%_Application.evtx wevtutil epl System c:\MSLOG%COMPUTERNAME%_System.evtx wevtutil epl Security c:\MSLOG%COMPUTERNAME%_Security.evtx wevtutil epl Microsoft-Windows-GroupPolicy/Operational C:\MSLOG%COMPUTERNAME%_GroupPolicy_Operational.evtx wevtutil epl "Microsoft-Windows-WLAN-AutoConfig/Operational" c:\MSLOG%COMPUTERNAME%_Microsoft-Windows-WLAN-AutoConfig-Operational.evtx wevtutil epl "Microsoft-Windows-Wired-AutoConfig/Operational" c:\MSLOG%COMPUTERNAME%_Microsoft-Windows-Wired-AutoConfig-Operational.evtx wevtutil epl Microsoft-Windows-CertificateServicesClient-CredentialRoaming/Operational c:\MSLOG%COMPUTERNAME%_CertificateServicesClient-CredentialRoaming_Operational.evtx wevtutil epl Microsoft-Windows-CertPoleEng/Operational c:\MSLOG%COMPUTERNAME%_CertPoleEng_Operational.evtx
- For Windows 8 and later, also run these commands for event logs:
wevtutil epl Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational c:\MSLOG%COMPUTERNAME%_CertificateServicesClient-Lifecycle-System_Operational.evtx wevtutil epl Microsoft-Windows-CertificateServicesClient-Lifecycle-User/Operational c:\MSLOG%COMPUTERNAME%_CertificateServicesClient-Lifecycle-User_Operational.evtx wevtutil epl Microsoft-Windows-CertificateServices-Deployment/Operational c:\MSLOG%COMPUTERNAME%_CertificateServices-Deployment_Operational.evtx
- Certificates Store information:
certutil.exe -v -silent -store MY > c:\MSLOG%COMPUTERNAME%_cert-Personal-Registry.txt certutil.exe -v -silent -store ROOT > c:\MSLOG%COMPUTERNAME%_cert-TrustedRootCA-Registry.txt certutil.exe -v -silent -store -grouppolicy ROOT > c:\MSLOG%COMPUTERNAME%_cert-TrustedRootCA-GroupPolicy.txt certutil.exe -v -silent -store -enterprise ROOT > c:\MSLOG%COMPUTERNAME%_TrustedRootCA-Enterprise.txt certutil.exe -v -silent -store TRUST > c:\MSLOG%COMPUTERNAME%_cert-EnterpriseTrust-Reg.txt certutil.exe -v -silent -store -grouppolicy TRUST > c:\MSLOG%COMPUTERNAME%_cert-EnterpriseTrust-GroupPolicy.txt certutil.exe -v -silent -store -enterprise TRUST > c:\MSLOG%COMPUTERNAME%_cert-EnterpriseTrust-Enterprise.txt certutil.exe -v -silent -store CA > c:\MSLOG%COMPUTERNAME%_cert-IntermediateCA-Registry.txt certutil.exe -v -silent -store -grouppolicy CA > c:\MSLOG%COMPUTERNAME%_cert-IntermediateCA-GroupPolicy.txt certutil.exe -v -silent -store -enterprise CA > c:\MSLOG%COMPUTERNAME%_cert-Intermediate-Enterprise.txt certutil.exe -v -silent -store AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-3rdPartyRootCA-Registry.txt certutil.exe -v -silent -store -grouppolicy AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-3rdPartyRootCA-GroupPolicy.txt certutil.exe -v -silent -store -enterprise AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-3rdPartyRootCA-Enterprise.txt certutil.exe -v -silent -store SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-SmartCardRoot-Registry.txt certutil.exe -v -silent -store -grouppolicy SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-SmartCardRoot-GroupPolicy.txt certutil.exe -v -silent -store -enterprise SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-SmartCardRoot-Enterprise.txt certutil.exe -v -silent -store -enterprise NTAUTH > c:\MSLOG%COMPUTERNAME%_cert-NtAuth-Enterprise.txt certutil.exe -v -silent -user -store MY > c:\MSLOG%COMPUTERNAME%_cert-User-Personal-Registry.txt certutil.exe -v -silent -user -store ROOT > c:\MSLOG%COMPUTERNAME%_cert-User-TrustedRootCA-Registry.txt certutil.exe -v -silent -user -store -enterprise ROOT > c:\MSLOG%COMPUTERNAME%_cert-User-TrustedRootCA-Enterprise.txt certutil.exe -v -silent -user -store TRUST > c:\MSLOG%COMPUTERNAME%_cert-User-EnterpriseTrust-Registry.txt certutil.exe -v -silent -user -store -grouppolicy TRUST > c:\MSLOG%COMPUTERNAME%_cert-User-EnterpriseTrust-GroupPolicy.txt certutil.exe -v -silent -user -store CA > c:\MSLOG%COMPUTERNAME%_cert-User-IntermediateCA-Registry.txt certutil.exe -v -silent -user -store -grouppolicy CA > c:\MSLOG%COMPUTERNAME%_cert-User-IntermediateCA-GroupPolicy.txt certutil.exe -v -silent -user -store Disallowed > c:\MSLOG%COMPUTERNAME%_cert-User-UntrustedCertificates-Registry.txt certutil.exe -v -silent -user -store -grouppolicy Disallowed > c:\MSLOG%COMPUTERNAME%_cert-User-UntrustedCertificates-GroupPolicy.txt certutil.exe -v -silent -user -store AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-User-3rdPartyRootCA-Registry.txt certutil.exe -v -silent -user -store -grouppolicy AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-User-3rdPartyRootCA-GroupPolicy.txt certutil.exe -v -silent -user -store SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-User-SmartCardRoot-Registry.txt certutil.exe -v -silent -user -store -grouppolicy SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-User-SmartCardRoot-GroupPolicy.txt certutil.exe -v -silent -user -store UserDS > c:\MSLOG%COMPUTERNAME%_cert-User-UserDS.txt
- Wireless LAN client information:
netsh wlan show all > c:\MSLOG%COMPUTERNAME%_wlan_show_all.txt netsh wlan export profile folder=c:\MSLOG\
- Wired LAN Client information
netsh lan show all > c:\MSLOG%COMPUTERNAME%_lan_show_all.txt netsh lan export profile folder=c:\MSLOG\
4. Save the logs stored in C:\MSLOG.
### On NPS
1. Create C:\MSLOG to store captured logs.
2. Launch a command prompt as an administrator.
3. Run the following commands.
- Environmental information and Group Policies application status:
gpresult /H C:\MSLOG%COMPUTERNAME%_gpresult.txt msinfo32 /report c:\MSLOG%COMPUTERNAME%_msinfo32.txt ipconfig /all > c:\MSLOG%COMPUTERNAME%_ipconfig.txt route print > c:\MSLOG%COMPUTERNAME%_route_print.txt
- Event logs:
wevtutil epl Application c:\MSLOG%COMPUTERNAME%_Application.evtx wevtutil epl System c:\MSLOG%COMPUTERNAME%_System.evtx wevtutil epl Security c:\MSLOG%COMPUTERNAME%_Security.evtx wevtutil epl Microsoft-Windows-GroupPolicy/Operational c:\MSLOG%COMPUTERNAME%_GroupPolicy_Operational.evtx wevtutil epl Microsoft-Windows-CertificateServicesClient-CredentialRoaming/Operational c:\MSLOG%COMPUTERNAME%_CertificateServicesClient-CredentialRoaming_Operational.evtx wevtutil epl Microsoft-Windows-CertPoleEng/Operational c:\MSLOG%COMPUTERNAME%_CertPoleEng_Operational.evtx
- Run the following 3 commands on Windows Server 2012 and later:
wevtutil epl Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational c:\MSLOG%COMPUTERNAME%_CertificateServicesClient-Lifecycle-System_Operational.evtx wevtutil epl Microsoft-Windows-CertificateServicesClient-Lifecycle-User/Operational c:\MSLOG%COMPUTERNAME%_CertificateServicesClient-Lifecycle-User_Operational.evtx wevtutil epl Microsoft-Windows-CertificateServices-Deployment/Operational c:\MSLOG%COMPUTERNAME%_CertificateServices-Deployment_Operational.evtx
- Certificates store information
certutil.exe -v -silent -store MY > c:\MSLOG%COMPUTERNAME%_cert-Personal-Registry.txt certutil.exe -v -silent -store ROOT > c:\MSLOG%COMPUTERNAME%_cert-TrustedRootCA-Registry.txt certutil.exe -v -silent -store -grouppolicy ROOT > c:\MSLOG%COMPUTERNAME%_cert-TrustedRootCA-GroupPolicy.txt certutil.exe -v -silent -store -enterprise ROOT > c:\MSLOG%COMPUTERNAME%_TrustedRootCA-Enterprise.txt certutil.exe -v -silent -store TRUST > c:\MSLOG%COMPUTERNAME%_cert-EnterpriseTrust-Reg.txt certutil.exe -v -silent -store -grouppolicy TRUST > c:\MSLOG%COMPUTERNAME%_cert-EnterpriseTrust-GroupPolicy.txt certutil.exe -v -silent -store -enterprise TRUST > c:\MSLOG%COMPUTERNAME%_cert-EnterpriseTrust-Enterprise.txt certutil.exe -v -silent -store CA > c:\MSLOG%COMPUTERNAME%_cert-IntermediateCA-Registry.txt certutil.exe -v -silent -store -grouppolicy CA > c:\MSLOG%COMPUTERNAME%_cert-IntermediateCA-GroupPolicy.txt certutil.exe -v -silent -store -enterprise CA > c:\MSLOG%COMPUTERNAME%_cert-Intermediate-Enterprise.txt certutil.exe -v -silent -store AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-3rdPartyRootCA-Registry.txt certutil.exe -v -silent -store -grouppolicy AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-3rdPartyRootCA-GroupPolicy.txt certutil.exe -v -silent -store -enterprise AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-3rdPartyRootCA-Enterprise.txt certutil.exe -v -silent -store SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-SmartCardRoot-Registry.txt certutil.exe -v -silent -store -grouppolicy SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-SmartCardRoot-GroupPolicy.txt certutil.exe -v -silent -store -enterprise SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-SmartCardRoot-Enterprise.txt certutil.exe -v -silent -store -enterprise NTAUTH > c:\MSLOG%COMPUTERNAME%_cert-NtAuth-Enterprise.txt certutil.exe -v -silent -user -store MY > c:\MSLOG%COMPUTERNAME%_cert-User-Personal-Registry.txt certutil.exe -v -silent -user -store ROOT > c:\MSLOG%COMPUTERNAME%_cert-User-TrustedRootCA-Registry.txt certutil.exe -v -silent -user -store -enterprise ROOT > c:\MSLOG%COMPUTERNAME%_cert-User-TrustedRootCA-Enterprise.txt certutil.exe -v -silent -user -store TRUST > c:\MSLOG%COMPUTERNAME%_cert-User-EnterpriseTrust-Registry.txt certutil.exe -v -silent -user -store -grouppolicy TRUST > c:\MSLOG%COMPUTERNAME%_cert-User-EnterpriseTrust-GroupPolicy.txt certutil.exe -v -silent -user -store CA > c:\MSLOG%COMPUTERNAME%_cert-User-IntermediateCA-Registry.txt certutil.exe -v -silent -user -store -grouppolicy CA > c:\MSLOG%COMPUTERNAME%_cert-User-IntermediateCA-GroupPolicy.txt certutil.exe -v -silent -user -store Disallowed > c:\MSLOG%COMPUTERNAME%_cert-User-UntrustedCertificates-Registry.txt certutil.exe -v -silent -user -store -grouppolicy Disallowed > c:\MSLOG%COMPUTERNAME%_cert-User-UntrustedCertificates-GroupPolicy.txt certutil.exe -v -silent -user -store AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-User-3rdPartyRootCA-Registry.txt certutil.exe -v -silent -user -store -grouppolicy AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-User-3rdPartyRootCA-GroupPolicy.txt certutil.exe -v -silent -user -store SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-User-SmartCardRoot-Registry.txt certutil.exe -v -silent -user -store -grouppolicy SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-User-SmartCardRoot-GroupPolicy.txt certutil.exe -v -silent -user -store UserDS > c:\MSLOG%COMPUTERNAME%_cert-User-UserDS.txt
- NPS configuration information:
netsh nps show config > C:\MSLOG%COMPUTERNAME%_nps_show_config.txt netsh nps export filename=C:\MSLOG%COMPUTERNAME%_nps_export.xml exportPSK=YES
3. Take the following steps to save an NPS accounting log.
1. Open **Administrative tools > Network Policy Server**.
2. On the Network Policy Server administration tool, select **Accounting** in the left pane.
3. Click **Change Log File Properties**.
4. On the **Log File** tab, note the log file naming convention shown as **Name** and the log file location shown in **Directory** box.
5. Copy the log file to C:\MSLOG.
4. Save the logs stored in C:\MSLOG.
### Certificate Authority (CA) (OPTIONAL)
1. On a CA, launch a command prompt as an administrator. Create C:\MSLOG to store captured logs.
2. Run the following commands.
- Environmental information and Group Policies application status
gpresult /H C:\MSLOG%COMPUTERNAME%_gpresult.txt msinfo32 /report c:\MSLOG%COMPUTERNAME%_msinfo32.txt ipconfig /all > c:\MSLOG%COMPUTERNAME%_ipconfig.txt route print > c:\MSLOG%COMPUTERNAME%_route_print.txt
- Event logs
wevtutil epl Application c:\MSLOG%COMPUTERNAME%_Application.evtx wevtutil epl System c:\MSLOG%COMPUTERNAME%_System.evtx wevtutil epl Security c:\MSLOG%COMPUTERNAME%_Security.evtx wevtutil epl Microsoft-Windows-GroupPolicy/Operational c:\MSLOG%COMPUTERNAME%_GroupPolicy_Operational.evtx wevtutil epl Microsoft-Windows-CertificateServicesClient-CredentialRoaming/Operational c:\MSLOG%COMPUTERNAME%_CertificateServicesClient-CredentialRoaming_Operational.evtx wevtutil epl Microsoft-Windows-CertPoleEng/Operational c:\MSLOG%COMPUTERNAME%_CertPoleEng_Operational.evtx
- Run the following 3 lines on Windows 2012 and up
wevtutil epl Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational c:\MSLOG%COMPUTERNAME%_CertificateServicesClient-Lifecycle-System_Operational.evtx wevtutil epl Microsoft-Windows-CertificateServicesClient-Lifecycle-User/Operational c:\MSLOG%COMPUTERNAME%_CertificateServicesClient-Lifecycle-User_Operational.evtx wevtutil epl Microsoft-Windows-CertificateServices-Deployment/Operational c:\MSLOG%COMPUTERNAME%_CertificateServices-Deployment_Operational.evtx
- Certificates store information
certutil.exe -v -silent -store MY > c:\MSLOG%COMPUTERNAME%_cert-Personal-Registry.txt certutil.exe -v -silent -store ROOT > c:\MSLOG%COMPUTERNAME%_cert-TrustedRootCA-Registry.txt certutil.exe -v -silent -store -grouppolicy ROOT > c:\MSLOG%COMPUTERNAME%_cert-TrustedRootCA-GroupPolicy.txt certutil.exe -v -silent -store -enterprise ROOT > c:\MSLOG%COMPUTERNAME%_TrustedRootCA-Enterprise.txt certutil.exe -v -silent -store TRUST > c:\MSLOG%COMPUTERNAME%_cert-EnterpriseTrust-Reg.txt certutil.exe -v -silent -store -grouppolicy TRUST > c:\MSLOG%COMPUTERNAME%_cert-EnterpriseTrust-GroupPolicy.txt certutil.exe -v -silent -store -enterprise TRUST > c:\MSLOG%COMPUTERNAME%_cert-EnterpriseTrust-Enterprise.txt certutil.exe -v -silent -store CA > c:\MSLOG%COMPUTERNAME%_cert-IntermediateCA-Registry.txt certutil.exe -v -silent -store -grouppolicy CA > c:\MSLOG%COMPUTERNAME%_cert-IntermediateCA-GroupPolicy.txt certutil.exe -v -silent -store -enterprise CA > c:\MSLOG%COMPUTERNAME%_cert-Intermediate-Enterprise.txt certutil.exe -v -silent -store AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-3rdPartyRootCA-Registry.txt certutil.exe -v -silent -store -grouppolicy AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-3rdPartyRootCA-GroupPolicy.txt certutil.exe -v -silent -store -enterprise AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-3rdPartyRootCA-Enterprise.txt certutil.exe -v -silent -store SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-SmartCardRoot-Registry.txt certutil.exe -v -silent -store -grouppolicy SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-SmartCardRoot-GroupPolicy.txt certutil.exe -v -silent -store -enterprise SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-SmartCardRoot-Enterprise.txt certutil.exe -v -silent -store -enterprise NTAUTH > c:\MSLOG%COMPUTERNAME%_cert-NtAuth-Enterprise.txt certutil.exe -v -silent -user -store MY > c:\MSLOG%COMPUTERNAME%_cert-User-Personal-Registry.txt certutil.exe -v -silent -user -store ROOT > c:\MSLOG%COMPUTERNAME%_cert-User-TrustedRootCA-Registry.txt certutil.exe -v -silent -user -store -enterprise ROOT > c:\MSLOG%COMPUTERNAME%_cert-User-TrustedRootCA-Enterprise.txt certutil.exe -v -silent -user -store TRUST > c:\MSLOG%COMPUTERNAME%_cert-User-EnterpriseTrust-Registry.txt certutil.exe -v -silent -user -store -grouppolicy TRUST > c:\MSLOG%COMPUTERNAME%_cert-User-EnterpriseTrust-GroupPolicy.txt certutil.exe -v -silent -user -store CA > c:\MSLOG%COMPUTERNAME%_cert-User-IntermediateCA-Registry.txt certutil.exe -v -silent -user -store -grouppolicy CA > c:\MSLOG%COMPUTERNAME%_cert-User-IntermediateCA-GroupPolicy.txt certutil.exe -v -silent -user -store Disallowed > c:\MSLOG%COMPUTERNAME%_cert-User-UntrustedCertificates-Registry.txt certutil.exe -v -silent -user -store -grouppolicy Disallowed > c:\MSLOG%COMPUTERNAME%_cert-User-UntrustedCertificates-GroupPolicy.txt certutil.exe -v -silent -user -store AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-User-3rdPartyRootCA-Registry.txt certutil.exe -v -silent -user -store -grouppolicy AuthRoot > c:\MSLOG%COMPUTERNAME%_cert-User-3rdPartyRootCA-GroupPolicy.txt certutil.exe -v -silent -user -store SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-User-SmartCardRoot-Registry.txt certutil.exe -v -silent -user -store -grouppolicy SmartCardRoot > c:\MSLOG%COMPUTERNAME%_cert-User-SmartCardRoot-GroupPolicy.txt certutil.exe -v -silent -user -store UserDS > c:\MSLOG%COMPUTERNAME%_cert-User-UserDS.txt
- CA configuration information
reg save HKLM\System\CurrentControlSet\Services\CertSvc c:\MSLOG%COMPUTERNAME%_CertSvc.hiv reg export HKLM\System\CurrentControlSet\Services\CertSvc c:\MSLOG%COMPUTERNAME%_CertSvc.txt reg save HKLM\SOFTWARE\Microsoft\Cryptography c:\MSLOG%COMPUTERNAME%_Cryptography.hiv reg export HKLM\SOFTWARE\Microsoft\Cryptography c:\MSLOG%COMPUTERNAME%_Cryptography.tx
3. Copy the following files, if exist, to C:\MSLOG: %windir%\CAPolicy.inf
4. Log on to a domain controller and create C:\MSLOG to store captured logs.
5. Launch Windows PowerShell as an administrator.
6. Run the following PowerShell cmdlets. Replace the domain name in ";.. ,DC=test,DC=local"; with appropriate domain name. The example shows commands for ";test.local"; domain.
```powershell
Import-Module ActiveDirectory
Get-ADObject -SearchBase ";CN=Public Key Services,CN=Services,CN=Configuration,DC=test,DC=local"; -Filter \* -Properties \* | fl \* > C:\MSLOG\Get-ADObject\_$Env:COMPUTERNAME.txt
- Save the following logs.
- All files in C:\MSLOG on the CA
- All files in C:\MSLOG on the domain controller