New Microsoft ACS requirements for endpoint protection solutions
News|by Leanne Bevan|2 May 2023
In late 2021, Microsoft introduced functionality in the various versions of the Windows Operating System for Azure Code Signing (ACS) requirements.
Microsoft is making ACS mandatory for endpoint protection vendors on Windows platforms. Many of our endpoint protection software vendors are updating their software in line with this requirement. For instance, the upcoming releases of Sophos Intercept X and Intercept X for Server will comply with the ACS requirements.
This change will not impact you if you regularly apply Windows Updates to your Endpoints and Servers. New installations and updates may fail if your Windows device is not running a Windows version that complies with ACS.
What is Azure Code Signing?
Azure Code Signing is a fully managed service for code signing. It leverages digest signing and is managed as an Azure resource. To initiate, you need only go to the Code Signing Accounts resource and enter your organisation’s information. All the keys and certificates are managed through Microsoft’s Certificate Authorities which are part of the Microsoft Trusted Root Program and meet the WebTrust Certification. The best part is that it is easily integrated with Visual Studio, GitHub, Windows SDK SignTool and more. You can implement a seamless signing workflow as part of your build and release pipeline.
Fill out the form below to find out more about endpoint protection or Microsoft Azure.
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Leanne Bevan
Related News
Firewall first: Blocking ransomware before it hits
Why blocking ransomware is important The average recovery cost following a ransomware attack has soared to over £2 million, according to Sophos’ latest State of Ransomware Report. More than a third of victimised businesses take longer than a month to...
Endpoint security essentials: What every business should know
How can you enhance your endpoint security layer? In episode four of our Seven Layers of Security miniseries, we unpack the critical role the endpoint security layer plays in modern layered defence strategies. From laptops to mobile devices, endpoints are...
Network security: The silent defender
It’s not just firewalls – your network security layer does more than you think In episode three of our seven layers of security podcast miniseries, we dive deep into the network security layer; the silent defender that underpins your entire...
[WEBINAR] Cyber curveball: What 2025 taught us about security
Thu 4 December 2025 3:00 pm - 4:00 pm GMT
Cyber security: 2025 in review, 2026 in focus What a year. 2025 delivered some of the most disruptive cyber security moments we’ve seen – AI-powered threats, headline-making breaches, and a fast-moving regulatory landscape. Join us for a high-impact panel webinar...