Splunk Search

i am seeing this entry over 30000 times a minute - KLM\software\policies\microsoft\systemcertificates\disallowed\crls

rmcmillin
New Member

this is one of the events i am seeing and we are trying to figure our why only 20-30 servers are doing this

08/20/2019 08:18:42.730
event_status="(0)The operation completed successfully."
pid=7352
process_image="c:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
registry_type="CreateKey"
key_path="HKLM\software\policies\microsoft\systemcertificates\disallowed\crls"
data_type="REG_NONE"
data=""

any help on how to lessen this would be great

thank you

Tags (1)
0 Karma
Get Updates on the Splunk Community!

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...