Skip to content

Restricting Transport Layer Security to TLS 1.2

HTTPS can use different versions of Transport Layer Security (TLS) to encrypt the data.

To determine the specific version of Transport Layer Security (TLS) to be used for communication via HTTPS, you have to configure additional settings in the operating system.

We recommend always using the latest version of TLS supported by Windows and Servicetrace. This is currently TLS 1.2.

Configuration via IIS Crypto (GUI)

We recommend using the IIS Crypto application to set the necessary registry parameters.

If you do not have permission to install software on your system, follow the link to the Microsoft documentation in the section Configuration via the registry.

First download the IIS Crypto GUI application from NARTAC Software > Downloads and run the installer.

conf_TLS_1_2_Restriction_IIS_CryptoGUI_BestPractices

In the Schannel view, click the Best Practises button to select only secure layer security. Confirm with OK.

conf_TLS_1_2_Restriction_IIS_CryptoGUI_BestPractices_FurtherRestrictions

Deselect all the checkboxes aside from

Server Protocols

TLS 1.2

Client Protocols

TLS 1.2

Ciphers

AES 256/256

Hashes

SHA 256
SHA 384
SHA 512

Key Exchanges

Diffie-Hellman
PKCS
ECDH

Click Apply and restart your computer so that the changes to the registry take effect.

Configuration via the registry

You will find the registration settings for Transport Layer Security (TLS) in the Windows registry under

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL

Refer to the Microsoft documentation Transport Layer Security (TLS) registry settings for information on how to proceed.

conf_TLS_1_2_Restriction_Registry

After correct configuration, only the Enabled key under Server and Client under TLS 1.2 should have a value other than zero. All other values of all other SChannels contained in the registry should have 0x00000000 (0) as the value of the Enabled key.