?
Solved

Trusted Locations signed by CA

Posted on 2011-03-08
3
Medium Priority
?
394 Views
Last Modified: 2012-05-11
I have several resources on corpnet that run macros, spreadsheets and databases etc. Users are unable to remember to click to enable content and as resources are networked "allow trusted locations on my network" checkbox must be checked in the trust center for full functionality.  

I would prefer to have power users digitally sign the resources they create and use a GPO to apply the cert. I have a Root CA server already established for cert based OWA. I have a GPO created and the Certificate Trust List Wizard ready to point to the cert. I am unsure how to create/request a cert for this purpose.
0
Comment
Question by:jiggyfly
  • 2
3 Comments
 
LVL 40

Accepted Solution

by:
als315 earned 2000 total points
ID: 35079818
0
 
LVL 1

Assisted Solution

by:jiggyfly
jiggyfly earned 0 total points
ID: 35087523
Thanks. The workaround I employed was the one suggested. To have the trusted locations applied via policy. It required the download and install of an administrative template for office. Thanks
0
 
LVL 1

Author Closing Comment

by:jiggyfly
ID: 35126360
the solution required additional resources not found in the suggested atricles.
0

Featured Post

How to Use the Help Bell

Need to boost the visibility of your question for solutions? Use the Experts Exchange Help Bell to confirm priority levels and contact subject-matter experts for question attention.  Check out this how-to article for more information.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question