Created on 12-08-2015 12:50 AM Edited on 01-12-2023 10:18 PM By Anthony_E
Windows Powershell can use 'get-filehash' to accomplish the task, and by changing the windows registry manually it's possible to add a 'right-click' option to simplify the task.
Copy and paste the output below into a new file and save it as 'checksum_menu.reg'.
It is important that the file extension is .reg to allow it to be easily imported into your registry.
Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\*\shell\GetFileHash] "MUIVerb"="Hash" "SubCommands"="" [HKEY_CLASSES_ROOT\*\shell\GetFileHash\shell\01SHA512] "MUIVerb"="SHA512" [HKEY_CLASSES_ROOT\*\shell\GetFileHash\shell\01SHA512\command] @="powershell.exe -noexit get-filehash -literalpath '%1' -algorithm SHA512 | format-list" [HKEY_CLASSES_ROOT\*\shell\GetFileHash\shell\02MD5] "MUIVerb"="MD5" [HKEY_CLASSES_ROOT\*\shell\GetFileHash\shell\02MD5\command] @="powershell.exe -noexit get-filehash -literalpath '%1' -algorithm MD5 | format-list"
Then 'right-click' on the .reg file and select 'merge'. This would import the above keys into the registry.
After that, it is possible to 'right-click' any file and select the 'Hash' menu.
By selecting the SHA512 for example, the PowerShell output will be visible.
The SHA512 Hash above can be compared with the firmware download hashes verifying that the file is exactly the same and no download errors happened.
If there is 7-Zip software installed, it is possible to disable the overlapping right-click option in the options below.
The registry instructions above are provided as it is. Feel free to use them with risk.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.