Tool: SecureSchool
Category: Website Filtering / Firewall / SSL Intercept
Updated: 2025
Overview #
Schools using WIDA ACCESS, WIDA Screener, and other assessments through DRC INSIGHT must ensure SecureSchool does not block required sites or interfere with encrypted traffic.
This article replaces the old “WIDA DRC eDIRECT” instructions and includes the updated DRC system-status link.
Required Domains #
Allow the following base domains (all subdomains included automatically):
- drcedirect.com
- wida-ams.us
Additional wildcard entries (e.g., *.drcedirect.com) are not needed in SecureSchool.
Website Access Configuration #
- Go to Website Filtering → Website Access
- Add:
- drcedirect.com
- wida-ams.us
- Set Access = Unfiltered
- Save and Commit Changes
Firewall Rule Configuration #
Because a Protocol Rule can only accept one Host Name per rule, you must create two separate rules.
Create Rule #1 — Allow DRC INSIGHT #
- Go to: Firewall → Protocol Rules → Add a Rule
- Enter:
| Field | Value |
|---|---|
| Rule Name | WIDA – drcedirect.com |
| Reason | Required for WIDA / DRC INSIGHT testing |
| Type | Allow |
| Protocol | TCP |
| Arriving Through | All Inside Interfaces |
| Source Address | Any |
| Destination Address Type | Host Name |
| Destination Address | drcedirect.com |
| Destination Port | (Leave blank — allow all ports) |
- Click Add Protocol Rule
- Commit Changes
Create Rule #2 — Allow WIDA AMS #
Repeat the same steps:
| Field | Value |
|---|---|
| Rule Name | WIDA – wida-ams.us |
| Reason | Required for WIDA AMS administrative portal |
| Type | Allow |
| Protocol | TCP |
| Arriving Through | All Inside Interfaces |
| Source Address | Any |
| Destination Address Type | Host Name |
| Destination Address | wida-ams.us |
| Destination Port | (Leave blank) |
Add rule → Commit Changes.
Notes About Firewall Rules #
- Protocol Rules in SecureSchool do NOT support “ALL protocols” — use TCP for HTTPS.
- Leaving ports blank allows the rule to match all needed communication.
- Rules with lower sequence numbers are evaluated first, so after creation, ensure these rules are above any restrictive deny rules.
SSL Intercept Exceptions #
If using Advanced SSL Intercept:
- Go to SSL Intercept → Exceptions
- Add:
- drcedirect.com
- wida-ams.us
- Set both to Do Not Intercept
- Commit Changes
This ensures encrypted traffic isn’t modified, which otherwise breaks DRC systems.
System Status (Updated Link) #
To check if DRC or WIDA systems are experiencing issues:
This replaces the retired Google Sites link.
Testing Access #
After changes:
- Visit https://www.drcedirect.com
- Visit https://www.wida-ams.us
- Launch a practice test in DRC INSIGHT
- Review SecureSchool logs if pages partially load or hang
Troubleshooting #
Page freezes or only partially loads
- Confirm SSL Intercept is disabled for these domains
- Confirm both Website Access entries are set to Unfiltered
- Inspect filtering logs for blocked CDN hosts
Unexpected blocks appear
- Add additional DRC-controlled hostnames if needed (rare)
- Recheck firewall logs for blocked outbound traffic
Summary #
To ensure stable WIDA / DRC INSIGHT test delivery:
- Add domains as Unfiltered
- Create two Protocol Rules (one per hostname)
- Add SSL Intercept exceptions
- Test access and monitor the updated status page
