UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Add-ins to Office applications must be signed by a Trusted Publisher.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26589 DTOO127 SV-53328r1_rule ECSC-1 Medium
Description
Office 2013 applications do not check the digital signature on application add-ins before opening them. Disabling or not configuring this setting may allow an application to load a dangerous add-in. As a result, malicious code could become active on user computers or the network.
STIG Date
Microsoft InfoPath 2013 STIG 2014-01-06

Details

Check Text ( C-47610r1_chk )
The policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" must be set to "Enabled".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\InfoPath\security

Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix Text (F-46258r1_fix)
Set the policy value for User Configuration -> Administrative Templates -> Microsoft InfoPath 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".