Hi Hardwick, Lewis,
As far as I know, removing CREATOR OWNER from the ACL is not catastrophic in your scenario. CREATOR OWNER is a placeholder that grants the creator of an object special rights, but since your certificate private key is owned by SYSTEM (with Full Control), the absence of CREATOR OWNER does not break functionality. The NETWORK SERVICE account simply needs read access to the private key, and that’s what matters for your Windows Event Collector to work over HTTPS.
When you use icacls or Set‑ACL, the tool rewrites the ACL and sometimes drops CREATOR OWNER because it’s not a standard SID like SYSTEM or NETWORK SERVICE. This is expected behavior and not a sign of corruption. As long as SYSTEM retains ownership and Full Control, and NETWORK SERVICE has read rights, your configuration is safe. You won’t see catastrophic failures just because CREATOR OWNER is missing.
For scaling to thousands of endpoints, scripting with PowerShell and certutil is the recommended approach. You can automate granting NETWORK SERVICE read access without worrying about CREATOR OWNER. If you want to preserve the ACL exactly as it was, you can export the ACL before modification and re‑apply it after adding NETWORK SERVICE, but in practice this is not necessary.
In short, you’re not doing anything wrong. The removal of CREATOR OWNER is normal, and your setup will continue to function correctly.
I hope the response provided some helpful insight. If it addressed your issue, please consider marking it as Accept Answer so others facing the same problem can easily find the solution. If you need any further assistance, feel free to leave a comment.
Jason.