UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Add-ins to Office applications must be signed by a Trusted Publisher.


Overview

Finding ID Version Rule ID IA Controls Severity
V-40736 DTOO127 SV-52794r1_rule Medium
Description
Office 2013 applications do not check the digital signature on application add-ins before opening them. Disabling or not configuring this setting may allow an application to load a dangerous add-in. As a result, malicious code could become active on user computers or the network.
STIG Date
Microsoft Visio 2013 STIG 2013-12-12

Details

Check Text ( C-47123r1_chk )
Verify the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2013 -> Visio Options -> Security -> Trust Center -> "Require that application add-ins are signed by Trusted Publisher" is set to "Enabled".

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKCU\software\policies\Microsoft\office\15.0\Visio\security

Criteria: If the value requireaddinsig is REG_DWORD = 1, this is not a finding.
Fix Text (F-45720r1_fix)
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Visio 2013 -> Visio Options -> Security -> Trust Center -> "Require that application add-ins are signed by Trusted Publisher" to "Enabled".