Policy
Configure legacy hashing algorithm
Microsoft Office 5532.1000
Policy overview
Key metadata and intent for this policy.
This policy setting allows you to configure whether Office displays a digital signature as legacy when it contains specific hash algorithms. If you enable this policy setting, you can specify the weakest hash algorithm that Office treats as legacy. You can specify any of the following algorithms: - MD5 - SHA1 - SHA256 - SHA384 If you don’t configure this policy setting, Office treats digital signatures containing SHA1 or better as valid. For example, if you set SHA256 as the legacy hashing algorithm, Office treats SHA384 signatures as valid.
Registry values
How enabled and disabled states update the registry.
No explicit registry values are set for enabled or disabled states.
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
L_SelectDigitalSignatureHashingAlgorithmDropID ID L_SelectDigitalSignatureHashingAlgorithmDropID | enum | HKCU\software\policies\microsoft\office\16.0\common\signatures\legacyhashalg Type REG_SZ | Options: MD5 (md5), SHA1 (sha1), SHA256 (sha256), SHA384 (sha384) |
Other policies in this category
Explore related policies at the same level.
- UserCheck the XAdES portions of a digital signatureWindows7
- UserConfigure invalid DSA public key sizeWindows7
- UserConfigure invalid hashing algorithmWindows7
- UserConfigure invalid RSA public key sizeWindows7
- UserConfigure legacy DSA public key sizeWindows7
- UserConfigure legacy RSA public key sizeWindows7
- UserConfigure minimum DSA public key sizeWindows7
- UserConfigure minimum RSA public key sizeWindows7
- UserConfigure time stamping hashing algorithmWindows7
- UserDisplay alternative certificate providersWindows7
- UserDo not allow expired certificates when validating signaturesWindows7
- UserRequested XAdES level for signature generationWindows7