How do I disable TLS 1.0 and enable TLS 1.2 on Windows Server?
- Press Windows key + R and enter regedit. ...
- Navigate to the following key: HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols.
- Right-click the right pane, expand the New section and select Key.
- Name the new key TLS 1.0 and move to it.
- Start the registry editor by clicking on Start and Run. ...
- Highlight Computer at the top of the registry tree. ...
- Browse to the following registry key: ...
- Right click on the Protocols folder and select New and then Key from the drop-down menu. ...
- Right click on the TLS 1.2 key and add two new keys underneath it.
Click on: Start -> Control Panel -> Internet Options 2. Click on the Advanced tab 3. Scroll to the bottom and check the TLS version described in steps 3 and 4: 4. If Use SSL 2.0 is enabled, you must have TLS 1.2 enabled (checked) 5.
How to check if TLS 1.2 is enabled? If the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client\DisabledByDefault is present, the value should be 0.
- Open Microsoft Edge.
- Click on Settings.
- Click on System.
- Click on Open your computer's proxy settings.
- In the search bar, type Internet options and press Enter.
- Select the Advanced tab.
- Scroll down to Security category and tick the box for Use TLS 1.2.
- Click OK.
Disable TLS 1.0 and TLS 1.1
To do that, press Windows key + R and enter regedit. Select Protocols and in the right pane, right-click the empty space. Now choose New and select DWORD (32-bit) Value. Create a new key as already explained, and name it TLS 1.1.
To enable the TLS 1.1 protocol, create an Enabled entry (in the Client or Server subkey) and change the value to 1 . To disable it, change the value to 0 . To disable TLS 1.1 by default, create a DisabledByDefault entry and change the value to 1 .
- Determine . NET version. First, determine the installed . ...
- Install . NET updates. Install the . ...
- Configure for strong cryptography. Configure . NET Framework to support strong cryptography. ...
- SQL Server Native Client. Note.
- Different ways to check TLS version your instance is using:
- 1) Curl command:
- A) TLS1.0 --> curl -v -s --tlsv1.0 https://<instance-name>.service-now.com/stats.do -o /dev/null/ 2>&1.
- B) TLS1.1 --> curl -v -s --tlsv1.1 https://<instance-name>.service-now.com/stats.do -o /dev/null/ 2>&1.
To check for TLS 1.0 you could run Wireshark, on the server, and filter for that kind of traffic ( ssl. handshake. version==0x0301 ). If there is not much then disable TLS 1.0 with IISCrypto, as Alpharius suggested, and test all applications function normally.
How do I set TLS 1.2 as default?
- Create a registry entry DefaultSecureProtocols on the following location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp.
- Set the DWORD value to 800 for TLS 1.2.
- Click the padlock icon in the address bar for the website.
- Click on Certificate (Valid) in the pop-up.
- Check the Valid from dates to validate the SSL certificate is current.

- In the Windows start menu, type regedit and open it.
- We strongly recommend backing up your current registry before making any changes. ...
- Go to the following path: Computer\HKEY_LOCAL_MACHINE\SYSTEM\
TLS 1.2 is enabled by default. Therefore, no change to these keys is needed to enable it. You can make changes under Protocols to disable TLS 1.0 and TLS 1.1 after you've followed the rest of the guidance in these articles and you've verified that the environment works when only TLS 1.2 enabled.
However, due to evolving regulatory requirements as well as new security vulnerabilities in TLS 1.0, Microsoft recommends that customers remove TLS 1.0/1.1 dependencies in their environments and disable TLS 1.0 and 1.1 at the operating system level where possible.
0, 1.1 and 1.2 both enabled on server by default. You can get this information from Microsoft docs. You can check it from control panel. If you still want to check it from the registry, it may difficult to check because the registry is more used to disable a certain TLS version.
- Update Windows and WinHTTP on Windows 8.0, Windows Server 2012 (non-R2) and earlier.
- Ensure that TLS 1.2 is enabled as a protocol for SChannel at the OS level.
- Update and configure the .NET Framework to support TLS 1.2.
Almost every single article under the sun tells me to check the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\ and check the keys within it.
- In the Windows start menu, type regedit and open it.
- We strongly recommend backing up your current registry before making any changes. ...
- Go to the following path: Computer\HKEY_LOCAL_MACHINE\SYSTEM\
- Determine . NET version. First, determine the installed . ...
- Install . NET updates. Install the . ...
- Configure for strong cryptography. Configure . NET Framework to support strong cryptography. ...
- SQL Server Native Client. Note.
What is the command to check TLS version in Windows?
- Different ways to check TLS version your instance is using:
- 1) Curl command:
- A) TLS1.0 --> curl -v -s --tlsv1.0 https://<instance-name>.service-now.com/stats.do -o /dev/null/ 2>&1.
- B) TLS1.1 --> curl -v -s --tlsv1.1 https://<instance-name>.service-now.com/stats.do -o /dev/null/ 2>&1.
To check for TLS 1.0 you could run Wireshark, on the server, and filter for that kind of traffic ( ssl. handshake. version==0x0301 ). If there is not much then disable TLS 1.0 with IISCrypto, as Alpharius suggested, and test all applications function normally.