Use FIPS 140-2 compliance algorithms

Use the FIPS compliant algorithms for encryption, hashing and signing group policy to specify the use of FIPS 140-2-compliant cryptographic algorithms for authentication protocols.