The managed domain has detected usage of a deprecated TLS version, which is scheduled for retirement.

Michael Nelson 5 Reputation points
2025-05-05T13:00:59.87+00:00

We're getting "managed domain has detected usage of a deprecated TLS version, which is scheduled for retirement" alerts on two different tenants, but the alert does not tell where the old TLS is being used. and I don't know how to track down. See attached screenshot for alert.

Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
24,614 questions
0 comments No comments
{count} vote

1 answer

Sort by: Most helpful
  1. Goutam Pratti 5,225 Reputation points Microsoft External Staff Moderator
    2025-05-05T21:28:10.8133333+00:00

    Hello @Michael Nelson ,

    I understand that you are receiving alerts in two different tenants indicating that a managed domain has detected the use of a deprecated TLS version scheduled for retirement. To identify where the old TLS version is being used, you can follow the instructions below.

    Primarily check which protocal call is being used for that follow the below steps:

    1. Press Windows+R to open the Run box.
    2. Type inetcpl.cpl and then select OK. Then, the Internet Properties window is opened.
    3. In the Internet Properties window, select the Advanced tab and scroll down to check the settings related to TLS.

    To help you identify any clients or apps that still use legacy TLS in your environment, view the Microsoft Entra sign-in logs. For clients or apps that sign in over legacy TLS, Microsoft Entra ID marks the Legacy TLS field in Additional Details with True. The Legacy TLS field only appears if the sign-in occurred over legacy TLS. If you don't see any legacy TLS in your logs, you're ready to switch to TLS 1.2.

    To find the sign-in attempts that used legacy TLS protocols, an administrator can review the logs by:

    • Exporting and querying the logs in Azure Monitor.
    • Downloading the last seven days of logs in JavaScript Object Notation (JSON) format.
    • Filtering and exporting sign-in logs using PowerShell.

    You can follow this document: Telemetry in the sign-in logs

    After you obtain the logs, you can get more details about legacy TLS-based sign-in log entries in the Microsoft Entra admin center.

    Microsoft Entra Domain Services supports TLS versions 1.0 and 1.1, but they're disabled by default. Domain Services will use the following retirement path for TLS versions 1.0 and 1.1:

    1. Domain Services will remove the ability to disable the TLS 1.2 only mode. Customers who disable TLS 1.2 only mode can enable it.
    2. After Domain Services removes the ability to disable the TLS 1.2 only mode, customers can't enable or disable TLS 1.2 only mode.
    3. The Domain Services team will work with customers who need TLS versions 1.0 and 1.1.

    You can follow the document to migrate TLS 1.2 only mode in Domain Services: Domain Services TLS Enforcement

    For Detailed information follow the documents: Enable support for TLS 1.2 in your environment for Microsoft Entra TLS 1.1 and 1.0 deprecation , Transport Layer Security (TLS) 1.2 enforcement for Microsoft Entra Domain Services

    By following these steps, you can track down where the old TLS version is being used in your environment and take the necessary actions to update to a secure TLS version. If you need further assistance or have any specific questions, feel free to ask.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.