Splunk Search

i am seeing this entry over 30000 times a minute - KLM\software\policies\microsoft\systemcertificates\disallowed\crls

rmcmillin
New Member

this is one of the events i am seeing and we are trying to figure our why only 20-30 servers are doing this

08/20/2019 08:18:42.730
event_status="(0)The operation completed successfully."
pid=7352
process_image="c:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
registry_type="CreateKey"
key_path="HKLM\software\policies\microsoft\systemcertificates\disallowed\crls"
data_type="REG_NONE"
data=""

any help on how to lessen this would be great

thank you

Tags (1)
0 Karma
Get Updates on the Splunk Community!

Observability Highlights | January 2023 Newsletter

 January 2023New Product Releases Splunk Network Explorer for Infrastructure MonitoringSplunk unveils Network ...

Security Highlights | January 2023 Newsletter

January 2023 Splunk Security Essentials (SSE) 3.7.0 ReleaseThe free Splunk Security Essentials (SSE) 3.7.0 app ...

Platform Highlights | January 2023 Newsletter

 January 2023Peace on Earth and Peace of Mind With Business ResilienceAll organizations can start the new year ...