Trusted certificates allow you to verify the allowed browser domains that were added in the information protection settings. If a trusted certificate is missing and the allowed domain is used in a policy, it will trigger an exfiltration event. For more information on allowed domains, see Add allowed and trusted domains.
In the management console, on the menu bar, click Settings > Information Protection.
Click the Trusted Certificates tab.
Click Add Certificate.
Upload a root or intermediate certificate file (.pem). Click Browse Files to search for a local .pem file on your device, then click Add.
Aurora Endpoint DefenseAurora Endpoint SecurityInstallation or ConfigurationPublic