UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Add-In Trust Level must be configured.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17566 DTOO236 SV-53919r1_rule ECSC-1 Medium
Description
Under normal circumstances the installed COM add-ins are applications that have been approved and intentionally deployed by the organization and therefore they should not pose a security threat. However, if malware has infected systems it is possible that the malware will use the COM add-in feature to perform unauthorized actions. This setting enforces the default configuration, and therefore is unlikely to cause significant usability issues for most users.
STIG Date
Microsoft Outlook 2013 STIG 2014-01-06

Details

Check Text ( C-47930r1_chk )
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Configure Add-In Trust Level" is set to "Enabled (Trust all loaded and installed COM addins)".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\outlook\security

Criteria: If the value AddinTrust is REG_DWORD = 1, this is not a finding.
Fix Text (F-46819r1_fix)
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2013 -> Security "Configure Add-In Trust Level" to "Enabled (Trust all loaded and installed COM addins)".