Hi Anant Bera,
Tracking down certificate template changes can be a bit tricky at first because of how Windows distributes these roles, but you are definitely on the right track.
The most important concept to keep in mind here is that native Windows auditing does not emit a simple "Template Created" or "Template Deleted" event directly in the CA logs. This is because the actual templates live inside Active Directory (AD DS), not on the CA server itself. Therefore, if you want to capture when a template is explicitly created, modified, or deleted, you have to look at directory object changes. You will need to configure Directory Service / Object Access auditing directly on the CN=Certificate Templates container in your AD DS environment.
However, tracking when a template is published or unpublished (meaning it is added to or removed from the CA's active list) is indeed a CA configuration event. Since you mentioned auditing is already enabled on your CA, you just need to ensure the scope is correct. Through your GPO, verify under Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Object Access > Audit Certification Services that both Success and Failure are enabled. Additionally, right-click your CA in the Certification Authority MMC, go to Properties, and on the Auditing tab, ensure Change CA configuration is selected.
Once your logging is properly scoped, you can set your SIEM or monitoring tools to alert on:
Event ID 4891: This indicates a configuration entry changed in Certificate Services, which captures the exact moment templates are enabled or published on the CA.
Event ID 4898: This pairs perfectly with the above, as it tells you exactly which certificate template definition the CA just loaded.
I hope this helps clarify where to look for those specific actions! If these details helped point you in the right direction, please consider marking it as Accept Answer so this solution can help others in the community.
Tracy.