Hi Anil,
I understand your concerns about vulnerabilities on Active Directory servers. Here are some suggestions that may help:
Issue 1: TLS 1.0 and 1.1 protocols are deprecated Even after disabling TLS 1.0 and 1.1 in the registry, they are still detected on the server. This may be due to some services or applications still using these deprecated protocols. You may want to check your server configuration and make sure all services and applications have been updated to use more secure protocols, such as TLS 1.2 or TLS 1.3.
Issue 2: SSL certificate signed with a weak hash algorithm You have tried moving the AD certificate protocol from SHA-1 to SHA-512, but the problem persists. This may be due to the fact that the certificates in your chain are still using SHA-1. Make sure all certificates, including root and intermediate certificates, use strong hashing algorithms. Also, make sure your server is configured correctly to use the new certificate chain.
Please note that these are general recommendations and the exact solutions may vary based on your specific situation. I hope this information is useful to you!
reference document:
(1) How to disable TLS 1.0 in Windows Server 2012R2
https://serverfault.com/questions/1010635/how-to-disable-tls-1-0-in-windows-server-2012r2.
(2)How to disable TLS 1.0 in Windows 2012 RDP
https://serverfault.com/questions/733994/how-to-disable-tls-1-0-in-windows-2012-rdp.
(3) SSL certificate signed using weak hash algorithm
Best regards
Qiuyang