Use FIPS 140-2 compliance algorithms
Use the FIPS compliant algorithms for encryption, hashing and signing group policy to specify the use of FIPS 140-2-compliant cryptographic algorithms for authentication protocols.