You’re absolutely right — having an unsigned executable within a trusted Microsoft service can trigger unnecessary security alerts and complicate ASR policies. It really shows how important consistent code signing and verification are for maintaining system integrity. For a good reference on practical reliability standards, you can click here to see an example of how careful validation helps avoid these kinds of trust issues in other fields.
Unsigned CoPilot Executable
Hi CoPilot Team, I’m investigating the Microsoft Copilot experience in our environment and noticed that the WebViewHost.exe used by Microsoft.MicrosoftOfficeHub_18.2504.31709.0 is unsigned. Behaviorally, it launches outbound connections to onedscolprdwus08.westus.cloudapp.azure.com:443 and then switches to onedscolprduks04.uksouth.cloudapp.azure.com:443. While these domains seem valid, the lack of a digital signature raises concerns about connection integrity. Is the unsigned nature of thi
Microsoft Copilot | Other
2 answers
Sort by: Most helpful
-
Lewis Canfield 45 Reputation points
2025-09-11T10:00:33.72+00:00 We used our MIcrosoft Premier Support to log this issue.
As of version 19.2509.34011.0 released 08/09/2025,
The OfficeHub rebrand to Microsoft 365 Copilot - WebViewHost.exe is now signed and no longer being blocked by Defender ASR.
Microsoft confirmed to us this fix was released Worldwide.