Policy
Manage Print Driver signature validation
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows10, Windows10RT, Windows11, Windows8, Windows81, WindowsRT, WindowsRT81, WindowsServer2012, WindowsServer2012R2, WindowsServer2016
This policy setting controls the print driver signature validation mechanism. This policy controls the type of digital signature that is required for a print driver to be considered valid and installed on the system. As part of this validation the catalog/embedded signature is verified and all files in the driver must be a part of the catalog or have their own embedded signature that can be used for validation. You can enable this setting to change the default signature validation method. To use this setting, select one of the options below from the "Select the driver signature mechanism for this computer" box. If you disable or do not configure this policy setting, the default method is "Allow all validly signed drivers". -- "Require inbox signed drivers" specifies only drivers that are shipped as part of a Windows image are allowed on this computer. -- "Allow inbox and PrintDrivers Trusted Store signed drivers" specifies only drivers that are shipped as part of a Windows image or drivers that are signed by certificates installed in the 'PrintDrivers' certificate store are allowed on this computer. -- "Allow inbox, PrintDrivers Trusted Store, and WHQL signed drivers" specifies the only drivers allowed on this computer are those that are: shipped as part of a Windows image, signed by certificates installed in the 'PrintDrivers' certificate store, or signed by the Windows Hardware Quality Lab (WHQL). -- "Allow inbox, PrintDrivers Trusted Store, WHQL, and Trusted Publishers Store signed drivers" specifies the only drivers allowed on this computer are those that are: shipped as part of a Windows image, signed by certificates installed in the 'PrintDrivers' certificate store, signed by the Windows Hardware Quality Lab (WHQL), or signed by certificates installed in the 'Trusted Publishers' certificate store. -- "Allow all validly signed drivers" specfies that any print driver that has a valid embedded signature or can be validated against the print driver catalog can be installed on this computer. The 'PrintDrivers' certificate store needs to be created by an administrator under the local machine store location. The 'Trusted Publishers' certificate store can contain certificates from sources that are not related to print drivers.
Registry values
How enabled and disabled states update the registry.
No explicit registry values are set for enabled or disabled states.
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
Select the driver signature mechanism for this computer: ID DriverValidationLevel_Enum | enum | HKLM\Software\Policies\Microsoft\Windows NT\Printers\Driver\ValidationLevel Type REG_DWORD | Options: Require inbox signed drivers (0), Allow inbox and Print Drivers Trusted Store signed drivers (1), Allow inbox, Print Drivers Trusted Store, and WHQL signed drivers (2), Allow inbox, Print Drivers Trusted Store, WHQL, and Trusted Publisher Store signed drivers (3), Allow all validly signed drivers (4) |
Other policies in this category
Explore related policies at the same level.
- ComputerActivate Internet printingWindows 2000 only
- ComputerAdd Printer wizard - Network scan page (Managed network)At least Windows Vista
- ComputerAdd Printer wizard - Network scan page (Unmanaged network)At least Windows Vista
- ComputerAllow job name in event logsAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerAllow Print Spooler to accept client connectionsAt least Windows Server 2003
- ComputerAllow printers to be publishedAt least Windows 2000
- ComputerAllow pruning of published printersAt least Windows 2000
- ComputerAlways rasterize content to be printed using a software rasterizerAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerAlways render print jobs on the serverAt least Windows Vista
- ComputerAlways send job page count information for IPP printersAt least Windows Server 2016, Windows 10
- ComputerAutomatically publish new printers in Active DirectoryWindows Server 2003, Windows XP, and Windows 2000 only
- ComputerChange Microsoft XPS Document Writer (MXDW) default output format to the legacy Microsoft XPS format (*.xps)At least Windows Server 2012, Windows 8 or Windows RT