We use code signing certificates, that we distribute through an autoenrollment group policy. These certificates were used to sign excel macros and are issued by an internal CA.
Now, when try to revoke one of these certificates, they were listed in the certificate revocation list.
So far so good.
Problem is, that the code signed documents remain trustworthy. I assume the certificate chain is not verified "online" but in a local cache.
I've tried to set the GPO "Certificate Path Validation Settings" -- "Revocation" and selected the "Define these policy settings" check box.
Can somebody clarify how (long) revocation entries are stored on client machine? Our CA stores and publishes its CRL. Is it possible to force the clients to immediately check against this list each time an MS office application opens a signed document?