Hello there,
Basically the message is saying that the NPS server cannot check the CRL or OCSP (depending on how the CA is setup) to validate whether the client is valid or not. In this case, the entire chain needs to be trusted and their CRLs accessible.
Typically CRLs or OCSP are http or ldap paths that are accessible. However, consider if your PKI design has an offline Root CA; if so, the CRL would need to be imported for full trust. This is typically imported into AD, thus all AD clients typically trust and know of the CRL; but you may need to import it into the NPS server.
In order to import CRL into the NPS server,
I would suggest that you can have a try to import the CRL right into the Certificates MMC, or try the following command:
certutil -addstore CA "name-of-file.crl"
Hope this resolves your Query !!
--If the reply is helpful, please Upvote and Accept it as an answer--