At the company we never really bothered with the root certificates and were under the impression this is something that's managed along with Windows Updates (and there's WSUS for that) and all was well.
However, today, I've noticed that a fresh Windows Server 2016 install, with all the updates, seems to have only very VERY basic root certificates, to the point where I can't even open Google (on account of not trusting their certificate).
(I haven't checked a fresh Windows 10 installation yet...)
I'm a bit confused by this, as this didn't happen before. Either we've made some poor changes in our GPOs (tho I can't think of anything that would have this effect), or this is something that was recently changed? How should I proceed so that things like Google can be accessed without issues? Do I need to manually add trusted certificates via GPOs now?
Here are some screenshots of what the situation looks like on a fresh server install.
It is ok and expected behavior. By default, only few required certificates are visible in trusted root store. The rest (there are about 300 roots) are installed on demand, when you face them for the first time. There is a hidden copy of root certificates in
Crypt32.dll
and on Windows Update. There is nothing to worry about.update:
I've made internal check and found that requested root is embedded in
crypt32.dll
file. Here is the PowerShell code you can extract embedded certificates from this dll and find expected root:just copy-paste this code to PS console and check if any object is returned/
The Trusted Root CAs are updated automatically, if the system has Internet access and the feature is not disabled. You can also use certutil to download the trusted root certificates, publish them in a share, and create a group policy to direct systems where to obtain them.
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn265983(v%3Dws.11)
http://woshub.com/updating-trusted-root-certificates-in-windows-10/