/
TLS IIS Weak Chiphers – Windows Server 2008r2-2016

TLS IIS Weak Chiphers – Windows Server 2008r2-2016

Written by: Spencer Malmad

Overview

Using Nexpose we have identified a number of vulnerabilities and this document will show out to remediate the TLS_IIS and deprecated ciphers.

For further information see

https://support.microsoft.com/en-us/help/3140245/update-to-enable-tls-1-1-and-tls-1-2-as-default-secure-protocols-in-wi

https://www.hass.de/content/setup-microsoft-windows-or-iis-ssl-perfect-forward-secrecy-and-tls-12

Running the script

From a Powershell window with local admin rights, run the script obtained from

https://www.hass.de/content/setup-microsoft-windows-or-iis-ssl-perfect-forward-secrecy-and-tls-12



Run the script and hit Y to reboot.

NB in order to run SQL Server 2012 TLS 1.0 must not be disabled:

Disabled these before running the script if you have SQL 2012 running on the server:

# Disable TLS 1.0 for client and server SCHANNEL communications

New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -Force | Out-Null

New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null

New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null

New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -Force | Out-Null

New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null

New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null

Write-Host 'TLS 1.0 has been disabled.'

Related content

Windows Web Servers Should be Configured to Use Secure Communication Protocols
Windows Web Servers Should be Configured to Use Secure Communication Protocols
More like this
TLS should be Updated to the Latest Version for Your App
TLS should be Updated to the Latest Version for Your App
More like this
IoT Devices - TLS Cipher Suite Upgrade Needed
IoT Devices - TLS Cipher Suite Upgrade Needed
More like this
Cipher Suites
Cipher Suites
More like this
HTTP OPTIONS Vulnerability – IIS
HTTP OPTIONS Vulnerability – IIS
More like this