UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Add-ins to Office applications must be signed by a Trusted Publisher.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26589 DTOO127 SV-53241r2_rule Medium
Description
Office 2013 applications do not check the digital signature on application add-ins before opening them. Disabling or not configuring this setting may allow an application to load a dangerous add-in. As a result, malicious code could become active on the user's computer or the network.
STIG Date
Microsoft Publisher 2013 STIG 2016-08-09

Details

Check Text ( C-47548r2_chk )
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\Software\Policies\Microsoft\Office\15.0\publisher\security

Criteria: If the value RequireAddinSig is REG_DWORD = 1, this is not a finding.
Fix Text (F-46168r1_fix)
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2013 -> Security -> Trust Center "Require that application add-ins are signed by Trusted Publisher" to "Enabled".