Overview of the audit events generated by the online responder (OCSP)

The following is an overview of the audit events generated by the online responder in the Windows Event Viewer.

In contrast to operational events, which are often understood under the term "monitoring", auditing for the certification authority is the configuration of logging of security-relevant events.

The Online Responder (Online Certificate Status Protocol, OCSP) is an alternative way of providing revocation status information for certificates. Entities that want to check the revocation status of a certificate do not have to download the complete list of all revoked certificates thanks to OCSP, but can make a specific request for the certificate in question to the online responder. For a more detailed description, see the article "Basics Online Responder (Online Certificate Status Protocol, OCSP)„.

Event Sources

Audit events are always written to the security log. They always come from the Microsoft Windows Security Auditing source. The events relevant for the certification authority have the ID numbers 5120 to 5127.

Activate auditing

Auditing must be activated at various points:

  • At responder level
  • At operating system level

Enable responder-level auditing

Auditing at the responder level is configured via the management console for the online responder. To do this, right-click in the tree view on the left and select "Responder Properties".

The desired audit events can now be selected in the "Audit" tab.

The audit settings are stored in the registry as a bitmask in the "Audit filter" value under the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\OcspSvc\Responder

The individual values here mean the following:

ValueMeaning
1Start/Stop the Online Responder Service
2Changes to the Online Responder configuration
4Requests submitted to the Online Responder
8Changes to the Online Responder security settings

Enable auditing at operating system level

Analogous to the Audit configuration for certification authorities the audit configuration for Certification Services must be enabled at the operating system level. Preferably, this should be done via a group policy that is applied to all online responders.

Events

IDEvent text
5120OCSP Responder Service Started.
5121OCSP Responder Service Stopped.
5122A Configuration entry changed in the OCSP Responder Service. CA Configuration ID: %1 New Value: %2
5123A configuration entry changed in the OCSP Responder Service. Property Name: %1 New Value: %2
5124A security setting was updated on OCSP Responder Service. New Value: %1
5125A request was submitted to OCSP Responder Service.
5126Signing Certificate was automatically updated by the OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate Hash: %2
5127The OCSP Revocation Provider successfully updated the revocation information. CA Configuration ID: %1 Base CRL Number: %2 Base CRL This Update: %3 Base CRL Hash: %4 Delta CRL Number: %5 Delta CRL Indicator: %6 Delta CRL This Update: %7 Delta CRL Hash: %8
IDEvent text
5058Key file operation. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Cryptographic Parameters: Provider Name: %5 Algorithm Name: %6 Key Name: %7 Key Type: %8 Key File Operation Information: File Path: %9 Operation: Return Code:
5059Key migration operation. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Cryptographic Parameters: Provider Name: %5 Algorithm Name: %6 Key Name: %7 Key Type: %8 Additional Information: Operation: %9 Return Code:

Related links

External sources

en_USEnglish