Policy
Do not check e-mail address against address of certificates being used
Microsoft Office 5532.1000
Policy overview
Key metadata and intent for this policy.
This policy setting controls whether Outlook verifies the user's e-mail address with the address associated with the certificate used for signing. If you enable this policy setting, users can send messages signed with certificates that do not match their e-mail addresses. If you disable or do not configure this policy setting, Outlook verifies that the user's e-mail address matches the certificate being used for signing.
Internal name
L_Donotcheckemailaddressagainstaddressofcertificatesbeingusing
Policy ID
277cfca3b00a
Elements
0
Registry values
How enabled and disabled states update the registry.
| Registry location | Type | Enabled value | Disabled value |
|---|---|---|---|
| HKCU\software\policies\microsoft\office\16.0\outlook\security\supressnamechecks | REG_DWORD | 1 | 0 |
Policy elements
Inputs and configuration options exposed by this policy.
This policy has no additional user input fields.
Other policies in this category
Explore related policies at the same level.
- UserAlways use TNEF formatting in S/MIME messagesWindows7
- UserCheck for the user's private key when the user sends an encrypted email that includes the user as a recipientWindows7
- UserDo not display 'Publish to GAL' buttonWindows7
- UserDo not provide Continue option on Encryption warning dialog boxesWindows7
- UserEnable Cryptography IconsWindows7
- UserEnable Retrieval of Remote Certificate Authority InformationWindows7
- UserEncrypt all e-mail messagesWindows7
- UserEnsure all S/MIME signed messages have a labelWindows7
- UserFortezza certificate policiesWindows7
- UserMessage FormatsWindows7
- UserMessage when Outlook cannot find the digital ID to decode a messageWindows7
- UserMinimum encryption settingsWindows7