About 46,400 results
Open links in new tab
  1. SHA-1 Windows content to be retired August 3, 2020 | Microsoft ...

    Jul 28, 2020 · To support evolving industry security standards, and continue to keep you protected and productive, Microsoft will retire content that is Windows-signed for Secure Hash Algorithm 1 (SHA-1) …

  2. Windows Server 2025, security baseline | Microsoft Community Hub

    Jan 31, 2025 · We are pleased to announce the release of the recommended security configuration baseline settings for Windows Server 2025.

  3. SHA1 Key Migration to SHA256 for a two tier PKI hierarchy

    Sep 24, 2025 · First published on TechNet on Oct 26, 2015 Hello. Jim Tierney here again to take you through the migration steps for moving your two-tier PKI hierarchy from SHA1 to SHA256. I will not …

  4. Title: Expose SHA-256 or SHA-1 for Mail Attachments in Microsoft …

    Nov 5, 2025 · Title: Expose SHA-256 or SHA-1 for Mail Attachments in Microsoft Graph Problem Email attachments in Graph don’t include a content hash. To identify or match attachments, developers …

  5. X.509 Certificate SHA1 Signature Collision Vulnerability

    Jan 16, 2025 · Issue: X.509 Certificate SHA1 Signature Collision Vulnerability  Cause: Whenever you are not using a certificate to connect to SQL Server, it will...

  6. Migrating your Certification Authority Hashing Algorithm from SHA1 to ...

    Apr 22, 2025 · First published on TechNet on Apr 01, 2015  Hey all, Rob Greene here again.

  7. Using best modern security with Outlook SMIME secure email

    Jul 14, 2022 · Since Windows and Outlook still allow you to use older, less secure algorithms, this article explains how to configure an Outlook security profile to use the...

  8. Decrypting the Selection of Supported Kerberos Encryption Types ...

    Sep 2, 2020 ·   In response to the current threat landscape, security departments are beginning to require AES for Kerberos ticket encryption.  In this blog we...

  9. Hardware OATH tokens in Azure MFA in the cloud are now available

    May 1, 2017 · the old (proven to be insecure) sha-1 for hardware tokens. blob63 , with TOTP SHA-1 is used only for generating a secret key and is not really a pure SHA-1, it is HMAC-SHA1. Here is a …

  10. SHA-1 Deprecation and Changing the Root CA’s Hash …

    Sep 20, 2018 · The CA’s certificate is SHA-1 signed. Figure 2 Now, here’s where things get a little counter-intuitive. The signing algorithm of the root CA is, well, largely unimportant. There is zero …