@GuestGuivenchi, Thanks for posting in Q&A.
According to your description, I know that you are asking for a powershell script to remedy Vulnerability CVE-2016-2183.
Based on my researching, I found that device may affect Vulnerability CEV-2016-2183 when the 3DES and RC4 ciphers are enabled on TLS and you can disable 3DES and RC4 ciphers by removing them from registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography\Configuration\Local\SSL\00010002 to fix Vulnerability CVE-2016-2183. Please confirm with Windows support to see if the above understanding.
How to disable 3DES and RC4 on Windows Server 2019? - Microsoft Q&A
After that, you get the above confirmation, then you can consider the detection and remediation script. Currently there’s no such PowerShell script on the Internet. My thought is using "Get-TLSCiphersuite -NAme "3NDES" and "Get-TLSCiphersuite -NAme "RC4" to detect. Using “set-itemproperty” to change the registry value.
Set-ItemProperty (Microsoft.PowerShell.Management) - PowerShell | Microsoft Learn
You can refer the detection and remediation script templates in the following link to write the scripts:
PowerShell scripts for Remediations - Microsoft Intune | Microsoft Learn
Also you can also consider opening a premier case to help on the script.
Get support in the Microsoft Intune admin center - Microsoft Intune | Microsoft Learn
Thanks for your kind understanding.
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.