Event ID 36885

Anonymous
2025-01-21T01:44:11+00:00

Hello All,

We have server at work with a few things on it, it's an SQL server, a file server, a print server, and has some other small things.

My boss noticed it has around 355 Trusted Root Certificates and is getting an ID of 36885 in the System event viewer.

It's related to having to many Trusted Root Certificates.

Is it common to have this many trusted root certificates and should I act on shorting the list?

I understand in this scenario it would totally rely on what the server is actually doing but either way I find it weird I can't find any recent information on this ID, as you'd think someone else would come into this ID / issue if it seems so common.

I've already tried deleting the registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates with no success.

Again, Is it common to have this many trusted root certificates and should I act on shorting the list?

Windows for business | Windows Server | Directory services | Other

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question. To protect privacy, user profiles for migrated questions are anonymized.

0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Anonymous
    2025-01-21T08:28:38+00:00

    Hello

    Thanks for posting in Microsoft Community.

    Event ID 36885: "A fatal error occurred while creating a TLS client connection"

    Event ID 36885 is related to a TLS (Transport Layer Security) error, and specifically, it indicates that there was an issue with establishing a secure connection due to certificate problems. It can occur when there are too many certificates in the trusted root certificate store, causing issues in the verification process.

    Why is this happening?

    Too many Trusted Root Certificates: The system relies on the list of trusted root certificates to verify the authenticity of SSL/TLS connections. Having too many certificates in the store can lead to performance degradation, errors in certificate validation, and even memory issues, particularly in environments where the server has many services (like SQL Server, File Server, Print Server, etc.) that rely on TLS connections.

    Expired or Duplicate Certificates: Over time, the certificate store can accumulate old, expired, or duplicate certificates, contributing to the error.

    Is it common to have 355 Trusted Root Certificates?

    While the number of certificates can vary depending on the server’s role, it's not common to have such a high number of trusted root certificates. In most environments, a more manageable number of trusted certificates is usually expected. For example, Windows typically has between 100 and 200 trusted root certificates by default, but this number can increase due to additional software, third-party certificates, or organizations adding their own trusted roots.

    However, 355 certificates is an unusually high number and may indicate that the server has accumulated unnecessary or outdated certificates. These could be the result of:

    Legacy software

    Poor certificate management practices

    Automatic updates from multiple third-party providers

    Should you shorten the list of Trusted Root Certificates?

    Yes, it's a good idea to shorten the list of trusted root certificates, but with caution. Removing trusted root certificates manually can have unintended side effects, so you'll need to be selective. Here's what you can do:

    Steps to Resolve Event ID 36885

    Review the Certificate Store:

    Open Manage Computer Certificates by typing certmgr.msc in the Run dialog (press Win + R).

    Navigate to Trusted Root Certification Authorities > Certificates.

    Look for expired or duplicate certificates that aren't necessary for your server’s roles. If you're unsure about whether to delete a certificate, research its source first. You can also export a certificate to verify its purpose before removing it.

    Check for Unnecessary Certificates:

    Remove duplicate certificates or certificates that are no longer in use. Be careful about Microsoft or root CA certificates that are still actively used by your system and applications.

    If you're unsure whether to remove a certificate, it's better to leave it than to remove it and cause potential issues with TLS connections.

    Automate Certificate Cleanup (Optional):

    You can use tools like PowerShell to clean up certificates. For example, the following PowerShell script can help identify and remove expired certificates:

    Get-ChildItem -Path Cert:\LocalMachine\Root | Where-Object { $_.NotAfter -lt (Get-Date) } | Remove-Item

    Check for Third-Party Software Adding Certificates:

    Some software (especially security software or VPN clients) can add root certificates. Check if there is any third-party software installed that might be adding unnecessary certificates.

    Consider updating or reinstalling these applications if they are adding excessive certificates.

    I hope the above information is helpful to you.

    Best regards

    Runjie Zhai

    0 comments No comments
  2. Anonymous
    2025-01-21T16:42:42+00:00

    Hello,

    Thank you so much for the reply,

    How would one determine if its still in use? I know you said research but for example the cert "Hongkong post root CA 1". When I research that nothing regarding applications or services come up. So I'm still wondering what uses it.

    0 comments No comments