Prevent users from trusting third-party root certification authorities with a Group Policy

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

To prevent users from trusting third-party root certification authorities with a Group Policy

  1. Open the Group Policy object (GPO) that you want to edit.

  2. In the console tree, right-click Trusted Root Certification Authorities, and click Properties.

    Where?

    • Policy Object Name/Computer Configuration/Windows Settings/Security Settings/Public Key Policies/Trusted Root Certification Authorities
  3. In Client computers can trust the following certificate stores, click Enterprise Root Certification Authorities.

Notes

  • To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure. For more information, see Default local groups, Default groups, and Using Run as.

  • To open a GPO, see Group Policy (pre-GPMC).

  • This procedure does not apply to Local Policy objects.

Information about functional differences

  • Your server might function differently based on the version and edition of the operating system that is installed, your account permissions, and your menu settings. For more information, see Viewing Help on the Web.

See Also

Concepts

Public Key Policies How To ...
Automatic certificate request settings
Automatic certificate request policy
Working with MMC console files
Deploying a Public Key Infrastructure