How to push the Securly SSL certificate with Active Directory GPO?

The Securly SSL certificate is essential to filter HTTPS sites correctly. You can push the Securly SSL certificate using a Microsoft Active Directory GPO by adding the SSL certificate to the Trusted Root Certification Authorities store on your Active Directory server for all clients in a Microsoft domain. (Note that this is not a user-based setting.)

Manual Process

  1. Download the Securly certificate. (securly_ca_2034.crt
  2. Open Administrative Tools, and then click "Group Policy Management".
  3. In the console tree, under the top level of the domain, right-click and create a new policy and title it Securly Certificate. Creating_GPO_Objects.00_00_38_36.Still002.pngCreating_GPO_Objects.00_00_39_30.Still001.png
  4. Double-click Group Policy Objects in the domain containing the Securly Certificate Group Policy object (GPO) that you want to edit.  Creating_GPO_Objects.00_00_50_20.Still003.png
  5. In the Group Policy Management Console (GPMC), go to "Computer Configuration > Windows Settings > Security Settings > Public Key Policies". Creating_GPO_Objects.00_00_56_12.Still005.png
  6. Right-click on the Trusted Root Certification Authorities store.
  7. Click on "Import" and follow the steps in the Certificate Import Wizard to import the downloaded certificate. Creating_GPO_Objects.00_01_04_36.Still004.png


Was this article helpful?
40 out of 75 found this helpful
Have more questions?
Submit a request



Article is closed for comments.

Articles in this section

See more