How to confirm IIS stops using TLS 1.0 and 1.1?

Seekell, Roger 66 Reputation points
2024-01-23T20:13:54.13+00:00

I have a new Windows Server 2022, and I just installed IIS.

I have followed the steps on https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/disable-tls-1-1dot1-mbam-servers and https://learn.microsoft.com/en-us/answers/questions/1093730/how-to-disable-in-os-and-iis-from-tls-and-ssl-1-0 to disable old versions of TLS, enable new versions, and "SchUseStrongCrypto".

But the "sslscan" tool still shows TLS 1.0 and 1.1 as enabled (https://github.com/rbsec/sslscan).

How do I know for sure that TLS 1.0 and 1.1 are disabled? And is there another step to stop IIS on Windows Server 2022 from using old versions of TLS?

Windows for business | Windows Server | User experience | Other
Windows for business | Windows Server | Devices and deployment | Configure application groups
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Michael Taylor 60,326 Reputation points
    2024-01-23T20:36:01.9433333+00:00

    Did you disable the protocols using IISCrypto and reboot your server? Once you do that then those protocols are no longer available and the scan tool shouldn't find them anymore.

    1 person found this answer helpful.

  2. Seekell, Roger 66 Reputation points
    2024-02-01T20:14:36.9466667+00:00

    After further testing, it seems that my PowerShell script to create the 1 or 0 registry keys for TLS was creating them in the wrong way. Instead, I used a good old-fashioned .reg file and "reg import", and after that (and a reboot), the servers correctly disabled old TLS protocols! Seems the issue was on my end. Thanks for the conversation, Michael Taylor!

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.