Did you disable the protocols using IISCrypto
and reboot your server? Once you do that then those protocols are no longer available and the scan tool shouldn't find them anymore.
How to confirm IIS stops using TLS 1.0 and 1.1?
I have a new Windows Server 2022, and I just installed IIS.
I have followed the steps on https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/disable-tls-1-1dot1-mbam-servers and https://learn.microsoft.com/en-us/answers/questions/1093730/how-to-disable-in-os-and-iis-from-tls-and-ssl-1-0 to disable old versions of TLS, enable new versions, and "SchUseStrongCrypto".
But the "sslscan" tool still shows TLS 1.0 and 1.1 as enabled (https://github.com/rbsec/sslscan).
How do I know for sure that TLS 1.0 and 1.1 are disabled? And is there another step to stop IIS on Windows Server 2022 from using old versions of TLS?
Windows for business | Windows Server | User experience | Other
Windows for business | Windows Server | Devices and deployment | Configure application groups
2 answers
Sort by: Most helpful
-
Michael Taylor 60,326 Reputation points
2024-01-23T20:36:01.9433333+00:00 -
Seekell, Roger 66 Reputation points
2024-02-01T20:14:36.9466667+00:00 After further testing, it seems that my PowerShell script to create the 1 or 0 registry keys for TLS was creating them in the wrong way. Instead, I used a good old-fashioned .reg file and "reg import", and after that (and a reboot), the servers correctly disabled old TLS protocols! Seems the issue was on my end. Thanks for the conversation, Michael Taylor!