Microsoft Introduces Powerful Enhancements to Active Directory Certificate Services (ADCS) in 2025

Microsoft has unveiled substantial updates to Active Directory Certificate Services (ADCS), delivering critical improvements in scalability, performance, auditability, and security. These enhancements mark a significant evolution in enterprise certificate management, especially vital for organizations that rely on ADCS to support identity assurance, secure communications, and protect sensitive data through Public Key Infrastructure (PKI) services.
Our blog explores the major features introduced in recent releases, offering a technical breakdown of their capabilities and implications for enterprise environments.
Traditionally, managing Certificate Revocation Lists (CRLs) in large-scale environments has been inefficient and bandwidth-heavy. Clients validating a certificate were forced to download the entire CRL, even when only one revoked certificate needed verification. This legacy design posed scalability challenges for environments with high certificate turnover or limited network resources.
Microsoft addresses this with CRL Partitioning, a long-requested feature that introduces smarter, more granular revocation handling:
CRL Partitioning is backward compatible and designed to coexist with existing mechanisms like Online Certificate Status Protocol (OCSP). Microsoft enables dual publishing, where both the monolithic CRL and its partitions are simultaneously available, ensuring seamless transition and operational continuity.
To enable CRL partition refer to the following steps:
certutil -setreg ca\CRLFlags +0x00400000
certutil -setreg ca\CRLMaxPartitions 10
net stop certsvc
net start certsvc
The following image presents the properties of a partitioned CRL, showing the configured CRL distribution point for a specific partition, validating that clients can locate and download the appropriate CRL files.
The following image displays the Certification Authority management console, highlighting how issued certificates are now assigned to different CRL partition indexes, confirming the CRL partitioning feature is active.
Earlier versions of ADCS imposed a 4KB size limit on certificate extensions, restricting the complexity of certificate metadata and policy information that could be embedded within the certificate.
With the removal of this limitation, organizations can now:
This enhancement brings ADCS in line with the capabilities of modern Certificate Authorities and paves the way for increased adoption in hybrid, cloud-native, and IoT-driven infrastructures.
Run the following commands to add 0x1000 to the DBFlags registry key value and then restart ADCS:
certutil -setreg DBFlags +0x1000
net stop certsvc && net start certsvc
Now, to verify the limit settings, run the following commands and check the MaxLength property of ExtensionRawValue in the output:
Security teams require detailed audit trails for digital certificate operations to support compliance, incident response, and forensic investigations. Recognizing this need, Microsoft has introduced enhanced audit logging in Windows Server 2025 for ADCS.
Event ID | Event Summary |
4886 | Certificate Services received a certificate request. Request ID: %1 Requester: %2 Attributes: %3 |
4887 | Certificate Services approved a certificate request and issued a certificate. Request ID: %1 Requester: %2 Attributes: %3 Disposition: %4 SKI: %5 Subject: %6 |
4888 | Certificate Services denied a certificate request. Request ID: %1 Requester: %2 Attributes: %3 Disposition: %4 SKI: %5 Subject: %6 |
4889 | Certificate Services set the status of a certificate request to pending. Request ID: %1 Requester: %2 Attributes: %3 Disposition: %4 SKI: %5 Subject: %6 |
Field Name | Description |
Subject (from CSR) | Represents the subject value extracted from the Certificate Signing Request (CSR), if available. |
SAN (from CSR) | Refers to the Subject Alternative Name (SAN) extension obtained from the CSR, if present. |
Requested Template | Specifies the certificate template name as provided in the request—either as a version 2 template extension or a version 1 template property/attribute. |
RequestOSVersion | Indicates the client’s operating system version using the szOID_OS_VERSION attribute. Refer to Section 2.2.2.7.1 of [MS-WCCE] for details. Note: Provided by the client; not used for making security decisions. |
RequestCSPProvider | Details the Cryptographic Service Provider (CSP) used to generate the key pair, identified via the szOID_ENROLLMENT_CSP_PROVIDER attribute. Refer to Section 2.2.2.7.2 of [MS-WCCE]. Note: Client-provided; not intended for security decision-making. |
RequestClientInfo | Captures supplementary client details through the szOID_REQUEST_CLIENT_INFO attribute. Refer to Section 2.2.2.7.4 of [MS-WCCE]. Note: Provided by the client; not used for security decisions. |
Field | Description |
Subject Alternative Name | Contains the SAN extension values in the issued certificate, if present. |
Certificate Template | Indicates the name of the certificate template used during issuance. |
Serial Number | Shows the unique serial number assigned to the issued certificate. |
Field | Description |
Authentication Service | Specifies the authentication service used in the request. Values may include “NTLM”, “Kerberos”, and “Schannel”, as defined by RPC authentication service constants. |
Authentication Level | Represents the level of authentication applied in the request. Logged values can be “Default”, “None”, “Connect”, “Call”, “Packet”, “Integrity”, or “Privacy”, based on RPC standards. |
DCOM or RPC | Indicates whether the request was made using “DCOM” or “RPC”. “RPC” is used for requests via protocols like [MS-ICPR]; otherwise, “DCOM” is recorded. |
These expanded logs significantly boost visibility and enable:
Security teams can now proactively monitor and build baselines for certificate issuance patterns, helping detect insider threats and misconfigurations early.
Certificate Authorities (CAs) represent Tier 0 assets within an enterprise network, making their protection a top priority. Microsoft’s hardening guidelines for ADCS have been updated to reflect modern threat vectors and attack techniques.
Even minor missteps such as over-permissive templates or unmonitored role access can lead to privilege escalation or compromise of the CA.
Overly permissive certificate templates act as one of the easiest ways to move laterally in a domain and exploit. This is because templates that allow ‘any authenticated user or domain user’ to enroll can be misused to gain higher privileges. Therefore, the following points should be implemented:
Some certificate templates created for old projects or tests tend to pile up over time as they are never used. But every published certificate template acts as a potential attack vector. This is because unused templates may have outdated settings or weak permissions, providing attackers an entry. Therefore, the following practices are recommended:
The “supply in request” option allows users to mention the subject name they want on their certificate. However, it may also allow an attacker to provide any name, resulting in them requesting a certificate for someone like a domain admin or a domain controller and then using it to impersonate the identity. Therefore, to prevent this, the following settings must be implemented:
Organizations should begin planning now to adopt these enhancements. Key steps include:
Upgrading and hardening ADCS is complex but essential. At Encryption Consulting, we specialize in helping organizations like yours identify and mitigate security risks through tailored PKI Assessments. Our team of experts can provide a customized strategy to protect your PKI architecture from emerging threats, ensuring your data and infrastructure remain secure. Our full range of Public Key Infrastructure (PKI) services helps you safeguard your digital assets and enhance your organization’s overall security posture.
For those seeking a hands-off solution, our PKI as a Service (PKIaaS) delivers all the benefits of PKI without the burden of in-house management. We ensure to provide four parameters:
With Encryption Consulting’s PKIaaS, you can focus on your core business while we handle the complexities of PKI management.
Let us provide the peace of mind that comes from knowing your digital trust and security needs are in expert hands. Reach out today at [email protected] to explore how we can help your organization stay secure against cyber threats.
Let us help you take full advantage of the latest ADCS advancements. Reach out to encryption consulting by dropping an email at [email protected] to explore how we can elevate your certificate infrastructure to meet the demands of today’s zero-trust world.