<!DOCTYPE html>
<html lang="zh-Hans">
<head>
    <meta charset="UTF-8">
    <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
    <meta name="renderer" content="webkit">
    <meta name="viewport" content="width=device-width,initial-scale=1,maximum-scale=5">
    <title>How to Disable TLS 1.0 and TLS 1.1 on Windows Server | 云图网</title>
    <meta name="description" content="Growing trends in cyber attacks made system administrators implement more secured communication protocols to protect their assets and network from attacks. TLS …">
<meta property="og:type" content="article">
<meta property="og:url" content="https://blog.ytso.com/tech/aiops/290305.html">
<meta property="og:site_name" content="云图网">
<meta property="og:title" content="How to Disable TLS 1.0 and TLS 1.1 on Windows Server">
<meta property="og:image" content="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222849315.png">
<meta property="og:description" content="Growing trends in cyber attacks made system administrators implement more secured communication protocols to protect their assets and network from attacks. TLS …">
<link rel="canonical" href="https://blog.ytso.com/tech/aiops/290305.html">
<meta name="applicable-device" content="pc,mobile">
<meta http-equiv="Cache-Control" content="no-transform">
<link rel="shortcut icon" href="https://imgcdn.ytso.com/wp-content/uploads/2024/10/20241015181503433.jpg">
<link rel='dns-prefetch' href='//cdnjs.cloudflare.com' />
<style id='wp-img-auto-sizes-contain-inline-css' type='text/css'>
img:is([sizes=auto i],[sizes^="auto," i]){contain-intrinsic-size:3000px 1500px}
/*# sourceURL=wp-img-auto-sizes-contain-inline-css */
</style>
<link rel='stylesheet' id='stylesheet-css' href='https://blog.ytso.com/wp-content/themes/justnews/css/style.css?ver=6.21.5' type='text/css' media='all' />
<link rel='stylesheet' id='material-icons-css' href='https://blog.ytso.com/wp-content/themes/justnews/themer/assets/css/material-icons.css?ver=6.21.5' type='text/css' media='all' />
<link rel='stylesheet' id='remixicon-css' href='https://cdnjs.cloudflare.com/ajax/libs/remixicon/4.2.0/remixicon.min.css?ver=6.9.4' type='text/css' media='all' />
<link rel='stylesheet' id='font-awesome-css' href='https://blog.ytso.com/wp-content/themes/justnews/themer/assets/css/font-awesome.css?ver=6.21.5' type='text/css' media='all' />
<style id='wp-block-library-inline-css' type='text/css'>
:root{--wp-block-synced-color:#7a00df;--wp-block-synced-color--rgb:122,0,223;--wp-bound-block-color:var(--wp-block-synced-color);--wp-editor-canvas-background:#ddd;--wp-admin-theme-color:#007cba;--wp-admin-theme-color--rgb:0,124,186;--wp-admin-theme-color-darker-10:#006ba1;--wp-admin-theme-color-darker-10--rgb:0,107,160.5;--wp-admin-theme-color-darker-20:#005a87;--wp-admin-theme-color-darker-20--rgb:0,90,135;--wp-admin-border-width-focus:2px}@media (min-resolution:192dpi){:root{--wp-admin-border-width-focus:1.5px}}.wp-element-button{cursor:pointer}:root .has-very-light-gray-background-color{background-color:#eee}:root .has-very-dark-gray-background-color{background-color:#313131}:root .has-very-light-gray-color{color:#eee}:root .has-very-dark-gray-color{color:#313131}:root .has-vivid-green-cyan-to-vivid-cyan-blue-gradient-background{background:linear-gradient(135deg,#00d084,#0693e3)}:root .has-purple-crush-gradient-background{background:linear-gradient(135deg,#34e2e4,#4721fb 50%,#ab1dfe)}:root .has-hazy-dawn-gradient-background{background:linear-gradient(135deg,#faaca8,#dad0ec)}:root .has-subdued-olive-gradient-background{background:linear-gradient(135deg,#fafae1,#67a671)}:root .has-atomic-cream-gradient-background{background:linear-gradient(135deg,#fdd79a,#004a59)}:root .has-nightshade-gradient-background{background:linear-gradient(135deg,#330968,#31cdcf)}:root .has-midnight-gradient-background{background:linear-gradient(135deg,#020381,#2874fc)}:root{--wp--preset--font-size--normal:16px;--wp--preset--font-size--huge:42px}.has-regular-font-size{font-size:1em}.has-larger-font-size{font-size:2.625em}.has-normal-font-size{font-size:var(--wp--preset--font-size--normal)}.has-huge-font-size{font-size:var(--wp--preset--font-size--huge)}.has-text-align-center{text-align:center}.has-text-align-left{text-align:left}.has-text-align-right{text-align:right}.has-fit-text{white-space:nowrap!important}#end-resizable-editor-section{display:none}.aligncenter{clear:both}.items-justified-left{justify-content:flex-start}.items-justified-center{justify-content:center}.items-justified-right{justify-content:flex-end}.items-justified-space-between{justify-content:space-between}.screen-reader-text{border:0;clip-path:inset(50%);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px;word-wrap:normal!important}.screen-reader-text:focus{background-color:#ddd;clip-path:none;color:#444;display:block;font-size:1em;height:auto;left:5px;line-height:normal;padding:15px 23px 14px;text-decoration:none;top:5px;width:auto;z-index:100000}html :where(.has-border-color){border-style:solid}html :where([style*=border-top-color]){border-top-style:solid}html :where([style*=border-right-color]){border-right-style:solid}html :where([style*=border-bottom-color]){border-bottom-style:solid}html :where([style*=border-left-color]){border-left-style:solid}html :where([style*=border-width]){border-style:solid}html :where([style*=border-top-width]){border-top-style:solid}html :where([style*=border-right-width]){border-right-style:solid}html :where([style*=border-bottom-width]){border-bottom-style:solid}html :where([style*=border-left-width]){border-left-style:solid}html :where(img[class*=wp-image-]){height:auto;max-width:100%}:where(figure){margin:0 0 1em}html :where(.is-position-sticky){--wp-admin--admin-bar--position-offset:var(--wp-admin--admin-bar--height,0px)}@media screen and (max-width:600px){html :where(.is-position-sticky){--wp-admin--admin-bar--position-offset:0px}}
/*wp_block_styles_on_demand_placeholder:69cef140994d5*/
/*# sourceURL=wp-block-library-inline-css */
</style>
<style id='classic-theme-styles-inline-css' type='text/css'>
/*! This file is auto-generated */
.wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none}
/*# sourceURL=/wp-includes/css/classic-themes.min.css */
</style>
<link rel='stylesheet' id='wpcom-member-css' href='https://blog.ytso.com/wp-content/plugins/wpcom-member/css/style.css?ver=1.7.19' type='text/css' media='all' />
<script type="text/javascript" src="https://blog.ytso.com/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script>
<script type="text/javascript" src="https://blog.ytso.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script>
<link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://blog.ytso.com/xmlrpc.php?rsd" />
<meta name='description' content='Growing trends in cyber attacks made system administrators implement more secured communication protocols to protect their assets and network from attacks. TLS plays a vital role in the implementatio…' />
<style>:root{--theme-color: #08c; --theme-hover: #07c; --logo-height: 32px; --logo-height-mobile: 26px; --menu-item-gap: 28px; --member-login-bg: url('https://blog.ytso.com/loginwall.jpg'); --header-bg-color: #fff; --header-bg-image: none; --theme-border-radius-s: 3px; --theme-border-radius-m: 5px; --theme-border-radius-l: 8px; --theme-border-radius-xl: 12px; --thumb-ratio-default: 480 / 300; --thumb-ratio-post: 480 / 300; --post-video-ratio: 860 / 482;}</style>
<link rel="icon" href="https://imgcdn.ytso.com/wp-content/uploads/2024/10/20241015181503433.jpg" sizes="32x32" />
<link rel="icon" href="https://imgcdn.ytso.com/wp-content/uploads/2024/10/20241015181503433.jpg" sizes="192x192" />
<link rel="apple-touch-icon" href="https://imgcdn.ytso.com/wp-content/uploads/2024/10/20241015181503433.jpg" />
<meta name="msapplication-TileImage" content="https://imgcdn.ytso.com/wp-content/uploads/2024/10/20241015181503433.jpg" />
    <!--[if lte IE 11]><script src="https://blog.ytso.com/wp-content/themes/justnews/js/update.js"></script><![endif]-->
</head>
<body class="wp-singular post-template-default single single-post postid-290305 single-format-standard wp-theme-justnews lang-cn el-boxed header-fixed">
<header class="header header-fluid">
    <div class="container">
        <div class="navbar-header">
            <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target=".navbar-collapse" aria-label="menu">
                <span class="icon-bar icon-bar-1"></span>
                <span class="icon-bar icon-bar-2"></span>
                <span class="icon-bar icon-bar-3"></span>
            </button>
                        <div class="logo">
                <a href="https://blog.ytso.com/" rel="home">
                    <img src="https://imgcdn.ytso.com/wp-content/uploads/2021/12/20211207181156143.png" alt="云图网">
                </a>
            </div>
        </div>
        <div class="collapse navbar-collapse mobile-style-0">
            <nav class="primary-menu"><ul id="menu-justnews-footer-menu" class="nav navbar-nav wpcom-adv-menu"><li class="menu-item"><a href="https://blog.ytso.com/category/industrynews">业界资讯</a></li>
<li class="menu-item current-post-ancestor active menu-item-style menu-item-style-1 dropdown"><a target="_blank" href="https://blog.ytso.com/category/tech" class="dropdown-toggle">技术专区</a>
<ul class="dropdown-menu menu-item-wrap menu-item-col-5">
	<li class="menu-item"><a href="https://blog.ytso.com/category/tech/cloud">云计算</a></li>
	<li class="menu-item"><a href="https://blog.ytso.com/category/tech/ai">人工智能</a></li>
	<li class="menu-item"><a href="https://blog.ytso.com/category/tech/safety">信息安全</a></li>
	<li class="menu-item"><a href="https://blog.ytso.com/category/tech/bigdata">大数据</a></li>
	<li class="menu-item"><a href="https://blog.ytso.com/category/tech/dev">研发管理</a></li>
	<li class="menu-item"><a href="https://blog.ytso.com/category/tech/webdev">大前端</a></li>
	<li class="menu-item"><a href="https://blog.ytso.com/category/tech/opensource">开源</a></li>
	<li class="menu-item current-post-ancestor current-post-parent active"><a href="https://blog.ytso.com/category/tech/aiops">智能运维</a></li>
	<li class="menu-item"><a href="https://blog.ytso.com/category/tech/pnotes">编程笔记</a></li>
	<li class="menu-item"><a href="https://blog.ytso.com/category/tech/wp">WordPress</a></li>
</ul>
</li>
<li class="menu-item"><a href="https://blog.ytso.com/category/enterprise-strategic-planning">企业战略规划</a></li>
<li class="menu-item"><a href="https://blog.ytso.com/category/download">下载专区</a></li>
<li class="menu-item"><a href="https://blog.ytso.com/category/it%e6%b1%9f%e6%b9%96%e5%8f%b2">江湖史</a></li>
<li class="menu-item"><a href="https://blog.ytso.com/category/notes">随笔记录</a></li>
</ul></nav>            <div class="navbar-action">
                <div class="navbar-search-icon j-navbar-search"><i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-search"></use></svg></i></div><form class="navbar-search" action="https://blog.ytso.com/" method="get" role="search"><div class="navbar-search-inner"><i class="wpcom-icon wi navbar-search-close"><svg aria-hidden="true"><use xlink:href="#wi-close"></use></svg></i><input type="text" name="s" class="navbar-search-input" autocomplete="off" maxlength="100" placeholder="输入关键词搜索..." value=""><button class="navbar-search-btn" type="submit" aria-label="搜索"><i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-search"></use></svg></i></button></div></form>                    <div id="j-user-wrap">
                        <a class="login" href="https://blog.ytso.com/login">登录</a>
                        <a class="login register" href="https://blog.ytso.com/register">注册</a>
                    </div>
                                            <a class="wpcom-btn btn-primary btn-xs publish" href="https://blog.ytso.com/contribute">
                            <i class="fa fa-edit"></i> 投稿                        </a>
                                </div>
        </div>
    </div><!-- /.container -->
</header>

<div id="wrap">    <div class="wrap container">
        <ol class="breadcrumb" vocab="https://schema.org/" typeof="BreadcrumbList"><li class="home" property="itemListElement" typeof="ListItem"><a href="https://blog.ytso.com" property="item" typeof="WebPage"><span property="name" class="hide">云图网</span>首页</a><meta property="position" content="1"></li><li property="itemListElement" typeof="ListItem"><i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-arrow-right-3"></use></svg></i><a href="https://blog.ytso.com/category/tech" property="item" typeof="WebPage"><span property="name">技术专区</span></a><meta property="position" content="2"></li><li property="itemListElement" typeof="ListItem"><i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-arrow-right-3"></use></svg></i><a href="https://blog.ytso.com/category/tech/aiops" property="item" typeof="WebPage"><span property="name">智能运维</span></a><meta property="position" content="3"></li></ol>        <main class="main">
                            <article id="post-290305" class="post-290305 post type-post status-publish format-standard hentry category-aiops entry">
                    <div class="entry-main">
                                                                        <div class="entry-head">
                            <h1 class="entry-title">How to Disable TLS 1.0 and TLS 1.1 on Windows Server</h1>
                            <div class="entry-info">
                                                                <time class="entry-date published" datetime="2022-10-01T22:29:38+08:00" pubdate>
                                    2022年10月1日 22:29                                </time>
                                <span class="dot">•</span>
                                <a href="https://blog.ytso.com/category/tech/aiops" rel="category tag">智能运维</a>                                                            </div>
                        </div>
                        
                                                <div class="entry-content text-indent text-justify">
                            <div id="toc">
<p class="toc-title"><strong>文章目录</strong><span class="toc-controller toc-controller-show">[隐藏]</span></p>
<ul>
<li class="toc-level2"><a href="#h-a-short-note-about-tls-1-0-and-tls-1-1">A Short Note About TLS 1.0 and TLS 1.1:</a></li>
<li class="toc-level2"><a href="#toc_2">Why You Should Disable TLS 1.0 and TLS 1.1 on Windows Server?</a></li>
<li class="toc-level2"><a href="#toc_3">Attacks TLS 1.0 and TLS 1.1 are vulnerable to:</a></li>
<li class="toc-level2"><a href="#toc_4">What is the Alternate to TLS 1.0 and TLS 1.1?</a></li>
<li class="toc-level2"><a href="#toc_5">How to Disable TLS 1.0 and TLS 1.1 on Windows Server?</a>
<ul>
<li class="toc-level3"><a href="#toc_6">Method 1 : Disable TLS 1.0 and TLS 1.1 manually using Registry</a></li>
<li class="toc-level3"><a href="#toc_7">Method 2 : Disable TLS 1.0 and TLS 1.1 using Powershell commands</a></li>
<li class="toc-level3"><a href="#toc_8">Method 3 : Disable TLS 1.0 and TLS 1.1 on Windows Server using CMD</a></li>
<li class="toc-level3"><a href="#toc_9">Keep Reading:</a></li>
</ul>
</li>
</ul>
</div>
<p>Growing trends in cyber attacks made system administrators implement more secured communication protocols to protect their assets and network from attacks. TLS plays a vital role in the implementation stack. TLS is a critical security protocol that is used to encrypt communications between clients and servers. <a href="https://www.thesecmaster.com/decoding-tls-v1-2-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">TLS 1.2</a> and TLS 1.3 are the two latest versions of the Transport Layer Security (TLS) protocol and offer many advantages over their previous versions. TLS 1.2 is the most widely used version of the TLS protocol, but TLS 1.3 is gaining popularity because of its effeciency and speed. As a system administrator, you should enable TLS 1.2 and TLS 1.3 on your Windows Server to enhance the security of your infrastructure, but wait, that&#8217;s not enough, you should disable TLS 1.0 and TLS 1.1 on Windows Server as they are deprecated for their week security.</p>
<p>Before learning how to disable TLS 1.0 and TLS 1.1 on your Windows Server, let&#8217;s see about TLS 1.0 and TLS 1.1 and why you should disable disable TLS 1.0 and TLS 1.1 on Windows Server.</p>
<div id="ez-toc-container" class="ez-toc-v2_0_34 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction">
<div class="ez-toc-title-container">
<p class="ez-toc-title">Table of Contents</p>
<p><span class="ez-toc-title-toggle"><a href="https://thesecmaster.com/how-to-disable-tls-1-0-and-tls-1-1-on-windows-server/#" class="ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle" style="display: none;"><label for="item" aria-label="Table of Content"><i class="ez-toc-glyphicon ez-toc-icon-toggle"></i></label><input type="checkbox" id="item"></a></span></div><nav><ul class='ez-toc-list ez-toc-list-level-1'><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class="ez-toc-link ez-toc-heading-1" href="https://thesecmaster.com/how-to-disable-tls-1-0-and-tls-1-1-on-windows-server/#A_Short_Note_About_TLS_10_and_TLS_11" title="A Short Note About TLS 1.0 and TLS 1.1:">A Short Note About TLS 1.0 and TLS 1.1:</a></li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class="ez-toc-link ez-toc-heading-2" href="https://thesecmaster.com/how-to-disable-tls-1-0-and-tls-1-1-on-windows-server/#Why_You_Should_Disable_TLS_10_and_TLS_11_on_Windows_Server" title="Why You Should Disable TLS 1.0 and TLS 1.1 on Windows Server?">Why You Should Disable TLS 1.0 and TLS 1.1 on Windows Server?</a></li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class="ez-toc-link ez-toc-heading-3" href="https://thesecmaster.com/how-to-disable-tls-1-0-and-tls-1-1-on-windows-server/#Attacks_TLS_10_and_TLS_11_are_vulnerable_to" title="Attacks TLS 1.0 and TLS 1.1 are vulnerable to:">Attacks TLS 1.0 and TLS 1.1 are vulnerable to:</a></li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class="ez-toc-link ez-toc-heading-4" href="https://thesecmaster.com/how-to-disable-tls-1-0-and-tls-1-1-on-windows-server/#What_is_the_Alternate_to_TLS_10_and_TLS_11" title="What is the Alternate to TLS 1.0 and TLS 1.1?">What is the Alternate to TLS 1.0 and TLS 1.1?</a></li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class="ez-toc-link ez-toc-heading-5" href="https://thesecmaster.com/how-to-disable-tls-1-0-and-tls-1-1-on-windows-server/#How_to_Disable_TLS_10_and_TLS_11_on_Windows_Server" title="How to Disable TLS 1.0 and TLS 1.1 on Windows Server?">How to Disable TLS 1.0 and TLS 1.1 on Windows Server?</a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class="ez-toc-link ez-toc-heading-6" href="https://thesecmaster.com/how-to-disable-tls-1-0-and-tls-1-1-on-windows-server/#Method_1_Disable_TLS_10_and_TLS_11_manually_using_Registry" title="Method 1 : Disable TLS 1.0 and TLS 1.1 manually using Registry">Method 1 : Disable TLS 1.0 and TLS 1.1 manually using Registry</a></li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class="ez-toc-link ez-toc-heading-7" href="https://thesecmaster.com/how-to-disable-tls-1-0-and-tls-1-1-on-windows-server/#Method_2_Disable_TLS_10_and_TLS_11_using_Powershell_commands" title="Method 2 : Disable TLS 1.0 and TLS 1.1 using Powershell commands">Method 2 : Disable TLS 1.0 and TLS 1.1 using Powershell commands</a></li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class="ez-toc-link ez-toc-heading-8" href="https://thesecmaster.com/how-to-disable-tls-1-0-and-tls-1-1-on-windows-server/#Method_3_Disable_TLS_10_and_TLS_11_on_Windows_Server_using_CMD" title="Method 3 : Disable TLS 1.0 and TLS 1.1 on Windows Server using CMD">Method 3 : Disable TLS 1.0 and TLS 1.1 on Windows Server using CMD</a></li></ul></li></ul></nav></div><h2 id="h-a-short-note-about-tls-1-0-and-tls-1-1"><span class="ez-toc-section" id="A_Short_Note_About_TLS_10_and_TLS_11"></span><strong>A Short Note About TLS 1.0 and TLS 1.1:</strong><span class="ez-toc-section-end"></span></h2><p>The Transport Layer Security (TLS) protocols are cryptographic protocols that provide communication security over the Internet. TLS 1.0 and TLS 1.1 are the two previous versions of the TLS protocol.</p>
<p>TLS 1.0 was first defined in 1999, and TLS 1.1 was published as an update to TLS 1.0 in 2006. TLS 1.0 and TLS 1.1 are now considered to be obsolete, and they are no longer considered secure.</p>
<h2 id="toc_2"><span class="ez-toc-section" id="Why_You_Should_Disable_TLS_10_and_TLS_11_on_Windows_Server"></span><strong>Why You Should Disable TLS 1.0 and TLS 1.1 on Windows Server?</strong><span class="ez-toc-section-end"></span></h2>
<p>There are a few reasons why you should disable TLS 1.0 and TLS 1.1 on Windows Server:</p>
<ol>
<li>TLS 1.0 and TLS 1.1 are no longer considered secure, due to the fact that they are vulnerable to various attacks, such as the POODLE attack.</li>
<li>Disabling TLS 1.0 and TLS 1.1 on your server will force clients to use a more secure protocol (<a href="https://www.thesecmaster.com/decoding-tls-v1-2-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">TLS 1.2</a>), which is less vulnerable to attack.</li>
<li>Some government agencies, such as the US National Security Agency (NSA), have recommended that TLS 1.0 and TLS 1.1 be disabled.</li>
<li>Microsoft will no longer provide security updates for Windows Server running TLS 1.0 and TLS 1.1.</li>
<li>Many major software vendors are phasing out support for TLS 1.0 and TLS 1.1. This includes Google, Microsoft, Mozilla, and Apple.</li>
</ol>
<h2 id="toc_3"><span class="ez-toc-section" id="Attacks_TLS_10_and_TLS_11_are_vulnerable_to"></span><strong>Attacks TLS 1.0 and TLS 1.1 are vulnerable to:</strong><span class="ez-toc-section-end"></span></h2>
<p>There are a number of known vulnerabilities in TLS 1.0 and TLS 1.1 that can be exploited by attackers. These include:</p>
<ol>
<li><a href="https://www.ibm.com/docs/en/sdk-java-technology/7.1?topic=ip-padding-oracle-downgraded-legacy-encryption-poodle-security-vulnerability" target="_blank" rel="noreferrer noopener">POODLE</a><a href="https://www.ibm.com/docs/en/sdk-java-technology/7.1?topic=ip-padding-oracle-downgraded-legacy-encryption-poodle-security-vulnerability" target="_blank" rel="noopener"> </a>(Padding Oracle On Downgraded Legacy Encryption)</li>
<li><a href="https://beaglesecurity.com/blog/vulnerability/browser-exploit-against-ssl-tls.html" target="_blank" rel="noreferrer noopener">BEAST</a><a href="https://beaglesecurity.com/blog/vulnerability/browser-exploit-against-ssl-tls.html" target="_blank" rel="noopener"> </a>(Browser Exploit Against SSL/TLS)</li>
<li><a href="https://www.acunetix.com/vulnerabilities/web/crime-ssl-tls-attack/" target="_blank" rel="noreferrer noopener">CRIME </a>(Compression Ratio Info-leak Made Easy)</li>
<li><a href="https://beaglesecurity.com/blog/support/vulnerability/2018/06/19/Factoring-RSA-Export-Keys-(FREAK)-Attack.html" target="_blank" rel="noreferrer noopener">FREAK </a>(Factoring Attack on RSA-EXPORT Keys)</li>
<li>LOGJAM (Diffie-Hellman Key Exchange Weakness)</li>
</ol>
<p>These vulnerabilities allow attackers to perform man-in-the-middle attacks, decrypt sensitive information, and hijack user sessions. By disabling TLS 1.0 and TLS 1.1 on your Windows server, you can protect yourself from these attacks.</p>
<h2 id="toc_4"><span class="ez-toc-section" id="What_is_the_Alternate_to_TLS_10_and_TLS_11"></span><strong>What is the Alternate to TLS 1.0 and TLS 1.1?</strong><span class="ez-toc-section-end"></span></h2>
<p>The current version of the TLS protocol is <a href="https://www.thesecmaster.com/decoding-tls-1-3-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">TLS 1.3</a>. TLS 1.3 was first defined in 2018, and it includes a number of security improvements over previous versions of the TLS protocol. We suggest you to <a href="https://thesecmaster.com/how-to-enable-tls-1-2-and-tls-1-3-on-windows-server/" target="_blank" rel="noreferrer noopener">enable TLS 1.2 and TLS 1.3 on your Windows Server</a> instead of TLS 1.0 and TLS 1.1.</p>
<p>TLS 1.2 improves upon TLS 1.1 by adding support for Elliptic Curve Cryptography (ECC) and introducing new cryptographic suites that offer better security than the suites used in TLS 1.1. TLS 1.3 improves upon TLS 1.2 by simplifying the handshake process and making it more resistant to man-in-the-middle attacks. In addition, TLS 1.3 introduces new cryptographic suites that offer better security than the suites used in TLS 1.2.</p>
<p><a href="https://www.thesecmaster.com/decoding-tls-v1-2-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">TLS 1.2</a> and <a href="https://www.thesecmaster.com/decoding-tls-1-3-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">TLS 1.3</a> are both backward compatible with <a href="https://www.thesecmaster.com/what-is-ssl-tls-how-ssl-tls-1-2-and-tls-1-3-differ-from-each-other/" target="_blank" rel="noreferrer noopener">TLS</a> 1.1 and earlier versions of the protocol. This means that a client that supports TLS 1.2 can communicate with a server that supports <a href="https://www.thesecmaster.com/what-is-ssl-tls-how-ssl-tls-1-2-and-tls-1-3-differ-from-each-other/" target="_blank" rel="noreferrer noopener">TLS</a> 1.1 and vice versa. However, TLS 1.2 and TLS 1.3 are not compatible with each other. A client that supports TLS 1.2 cannot communicate with a server that supports TLS 1.3, and vice versa.</p>
<p>TLS 1.2 is the most widely used version of the <a href="https://www.thesecmaster.com/what-is-ssl-tls-how-ssl-tls-1-2-and-tls-1-3-differ-from-each-other/" target="_blank" rel="noreferrer noopener">TLS</a> protocol, but TLS 1.3 is gaining in popularity. Many major web browsers, including Google Chrome, Mozilla Firefox, and Microsoft Edge, now support TLS 1.3. In addition, major Internet service providers, such as Cloudflare and Akamai, have started to support <a href="https://www.thesecmaster.com/what-is-ssl-tls-how-ssl-tls-1-2-and-tls-1-3-differ-from-each-other/" target="_blank" rel="noopener">TLS</a> 1.3 on their servers. Please visit this page if you want to deeply review the&nbsp;<a href="https://en.wikipedia.org/wiki/Comparison_of_TLS_implementations" target="_blank" rel="noreferrer noopener">comparison of TLS implementations</a>&nbsp;across different supported servers and clients.</p>
<p>Please visit these posts to learn more about TLS 1.2 and <a href="https://www.thesecmaster.com/decoding-tls-1-3-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">TLS 1.3</a>:</p>
<ol>
<li><a href="https://thesecmaster.com/what-is-ssl-tls-how-ssl-tls-1-2-and-tls-1-3-differ-from-each-other/#" target="_blank" rel="noreferrer noopener">What Is SSL/TLS? How SSL, TLS 1.2, And TLS 1.3 Differ From Each Other?</a></li>
<li><a href="https://thesecmaster.com/decoding-tls-v1-2-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">Decoding TLS v1.2 protocol Handshake with Wireshark</a></li>
<li><a href="https://thesecmaster.com/decoding-tls-1-3-protocol-handshake-with-wireshark/#" target="_blank" rel="noreferrer noopener">Decoding TLS 1.3 Protocol Handshake With Wireshark</a></li>
<li><a href="https://thesecmaster.com/how-to-enable-tls-1-3-in-standard-web-browsers/#" target="_blank" rel="noreferrer noopener">How to Enable TLS 1.3 in Standard Web Browsers?</a></li>
<li><a href="https://thesecmaster.com/how-to-enable-tls-1-3-on-popular-web-servers/#" target="_blank" rel="noreferrer noopener">How to Enable TLS 1.3 on Popular Web Servers?</a></li>
<li><a href="https://thesecmaster.com/how-to-enable-tls-1-2-and-tls-1-3-on-windows-server/#" target="_blank" rel="noreferrer noopener">How to Enable TLS 1.2 and TLS 1.3 on Windows Server</a></li>
</ol>
<h2 id="toc_5"><span class="ez-toc-section" id="How_to_Disable_TLS_10_and_TLS_11_on_Windows_Server"></span><strong>How to Disable TLS 1.0 and TLS 1.1 on Windows Server?</strong><span class="ez-toc-section-end"></span></h2>
<p>We have covered 3 different ways to disable <a href="https://www.thesecmaster.com/decoding-tls-v1-2-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">TLS 1.2</a> and <a href="https://www.thesecmaster.com/decoding-tls-1-3-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">TLS 1.3</a> on your Windows Server in this post. You can choose any one of the three ways to disable TLS 1.2 and TLS 1.3 on your Windows Server depending on your technical and automation skills.</p>
<ol>
<li>Disable TLS 1.2 and TLS 1.3 manually using Registry</li>
<li>Disable TLS 1.2 and TLS 1.3 using Powershell Commands</li>
<li>Disable TLS 1.2 and TLS 1.3 using CMD</li>
</ol>
<p><strong>Note</strong>:&nbsp;Microsoft clearly said that it doesn&#8217;t supports TLS 1.0 and TLS 1.1 on Windows operating systems. No patches will be provided for TLS 1.0 and TLS 1.1 from Microsoft. You can refer to the below table that shows the Microsoft Schannel Provider&nbsp;<a href="https://docs.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-" target="_blank" rel="noreferrer noopener">support of TLS protocol</a>&nbsp;versions.</p>
<p><strong>TLS Protocols Supported by Windows Operating Systems:</strong></p>
<figure class="wp-block-table">
<table>
<tbody>
<tr>
<th><strong>Windows OS</strong></th>
<th><strong>TLS 1.0 Client</strong></th>
<th><strong>TLS 1.0 Server</strong></th>
<th><strong>TLS 1.1 Client</strong></th>
<th><strong>TLS 1.1 Server</strong></th>
<th><strong>TLS 1.2 Client</strong></th>
<th><strong>TLS 1.2 Server</strong></th>
<th><strong>TLS 1.3 Client</strong></th>
<th><strong>TLS 1.3 Server</strong></th>
</tr>
<tr>
<td><strong>Windows&nbsp;Vista/Windows Server&nbsp;2008</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
<td>Not supported</td>
<td>Not supported</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows Server&nbsp;2008 with Service Pack&nbsp;2 (SP2)</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Disabled</td>
<td>Disabled</td>
<td>Disabled</td>
<td>Disabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;7/Windows Server&nbsp;2008&nbsp;R2</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Disabled</td>
<td>Disabled</td>
<td>Disabled</td>
<td>Disabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;8/Windows Server&nbsp;2012</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;8.1/Windows Server&nbsp;2012&nbsp;R2</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 1507</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 1511</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 1607/Windows Server&nbsp;2016 Standard</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 1703</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 1709</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 1803</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 1809//Windows Server&nbsp;2019</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 1903</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 1909</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 2004</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not supported</td>
<td>Not supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 20H2</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not Supported</td>
<td>Not Supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 21H1</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not Supported</td>
<td>Not Supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;10, version 21H2</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Not Supported</td>
<td>Not Supported</td>
</tr>
<tr>
<td><strong>Windows&nbsp;Server 2022</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
</tr>
<tr>
<td><strong>Windows&nbsp;11</strong></td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
<td>Enabled</td>
</tr>
</tbody>
</table>
</figure>
<h3 id="toc_6"><span class="ez-toc-section" id="Method_1_Disable_TLS_10_and_TLS_11_manually_using_Registry"></span>Method 1 : Disable TLS 1.0 and TLS 1.1 manually using Registry<span class="ez-toc-section-end"></span></h3>
<p>Let&#8217;s begin learning how to disable TLS 1.0 and TLS 1.1 manually using Windows Registry.</p>
<div class="schema-how-to wp-block-yoast-how-to-block">
<p class="schema-how-to-total-time"><span class="schema-how-to-duration-time-text">Time needed: </span>15 minutes. </p>
<p class="schema-how-to-description"><ol class="schema-how-to-steps"><li class="schema-how-to-step" id="how-to-step-1663478938904"><strong class="schema-how-to-step-name"><strong>Open regedit utility</strong></strong><p class="schema-how-to-step-text">Open &#8216;<strong>Run</strong>&#8216;, type &#8216;regedit&#8217; and click &#8216;OK&#8217;.</p>
<p><noscript><img fetchpriority="high" decoding="async" width="776" height="482" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222849315.png" class="attachment-full size-full" alt="Open regedit utility on Windows" style="max-width: 100%; height: auto;" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1.png 776w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1-300x186.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1-150x93.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1-768x477.png 768w" data-lazy-sizes="(max-width: 776px) 100vw, 776px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1.png" /></noscript><img fetchpriority="high" decoding="async" width="776" height="482" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222849315.png" class="attachment-full size-full j-lazy" alt="Open regedit utility on Windows" style="max-width: 100%; height: auto;" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1.png 776w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1-300x186.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1-150x93.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1-768x477.png 768w" data-lazy-sizes="(max-width: 776px) 100vw, 776px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Open-regedit-utility-on-Windows-1.png" /><noscript><noscript><img decoding="async" width="776" height="482" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222849315.png" class="attachment-full size-full" alt="Open regedit utility on Windows" style="max-width: 100%; height: auto;" sizes="(max-width: 776px) 100vw, 776px" /></noscript><img decoding="async" width="776" height="482" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222849315.png" class="attachment-full size-full j-lazy" alt="Open regedit utility on Windows" style="max-width: 100%; height: auto;" sizes="(max-width: 776px) 100vw, 776px" /></noscript></p>
</li>
<li class="schema-how-to-step" id="how-to-step-1663479099565"><strong class="schema-how-to-step-name"><strong>Create New Key</strong></strong>
<p class="schema-how-to-step-text">In Registry Editor, navigate to the path : <strong>Computer/HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols.</strong><br />Create a new key by Right click on &#8216;<strong>Protocols</strong>&#8216; &#8211;&gt; <strong>New </strong>&#8211;&gt; <strong>Key.</strong></p>
<p><noscript><img decoding="async" width="1324" height="698" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222851632.png" class="attachment-full size-full" alt="Create New Key on Windows" style="max-width: 100%; height: auto;" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1.png 1324w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1-300x158.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1-1024x540.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1-150x79.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1-768x405.png 768w" data-lazy-sizes="(max-width: 1324px) 100vw, 1324px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1.png" /></noscript><img decoding="async" width="1324" height="698" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222851632.png" class="attachment-full size-full j-lazy" alt="Create New Key on Windows" style="max-width: 100%; height: auto;" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1.png 1324w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1-300x158.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1-1024x540.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1-150x79.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1-768x405.png 768w" data-lazy-sizes="(max-width: 1324px) 100vw, 1324px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Key-on-Windows-1.png" /><noscript><noscript><img decoding="async" width="1324" height="698" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222851632.png" class="attachment-full size-full" alt="Create New Key on Windows" style="max-width: 100%; height: auto;" sizes="(max-width: 1324px) 100vw, 1324px" /></noscript><img decoding="async" width="1324" height="698" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222851632.png" class="attachment-full size-full j-lazy" alt="Create New Key on Windows" style="max-width: 100%; height: auto;" sizes="(max-width: 1324px) 100vw, 1324px" /></noscript></p>
</li>
<li class="schema-how-to-step" id="how-to-step-1663479159379"><strong class="schema-how-to-step-name"><strong>Rename the Registry Key &#8216;TLS 1.0&#8217;</strong></strong>
<p class="schema-how-to-step-text">Name key as &#8216;<strong>TLS 1.0</strong>&#8216;<br />Rename the registry key as &#8216;<strong>TLS 1.0</strong>&#8216;.</p>
<p><noscript><img decoding="async" width="1324" height="222" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222854715.png" class="attachment-full size-full" alt="Rename the Registry Key &#039;TLS 1.0&#039;" style="max-width: 100%; height: auto;" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0.png 1324w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0-300x50.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0-1024x172.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0-150x25.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0-768x129.png 768w" data-lazy-sizes="(max-width: 1324px) 100vw, 1324px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0.png" /></noscript><img decoding="async" width="1324" height="222" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222854715.png" class="attachment-full size-full j-lazy" alt="Rename the Registry Key &#039;TLS 1.0&#039;" style="max-width: 100%; height: auto;" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0.png 1324w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0-300x50.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0-1024x172.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0-150x25.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0-768x129.png 768w" data-lazy-sizes="(max-width: 1324px) 100vw, 1324px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Registry-Key-TLS-1.0.png" /><noscript><noscript><img decoding="async" width="1324" height="222" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222854715.png" class="attachment-full size-full" alt="Rename the Registry Key &#039;TLS 1.0&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1324px) 100vw, 1324px" /></noscript><img decoding="async" width="1324" height="222" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222854715.png" class="attachment-full size-full j-lazy" alt="Rename the Registry Key &#039;TLS 1.0&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1324px) 100vw, 1324px" /></noscript></p>
</li>
<li class="schema-how-to-step" id="how-to-step-1663479203828"><strong class="schema-how-to-step-name"><strong>Create One More Registry Key &#8216;Client&#8217; underneath &#8216;TLS 1.0&#8217;</strong></strong>
<p class="schema-how-to-step-text">As smiler to the above step, create another key as &#8216;<strong>Client</strong>&#8216; underneath &#8216;<strong>TLS 1.0</strong>&#8216; as shone in this picture.<noscript><img decoding="async" width="1376" height="430" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222857566.png" class="attachment-full size-full" alt="Create One More Registry Key &#039;Client&#039; underneath &#039;TLS 1.0&#039;" style="max-width: 100%; height: auto;" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0.png 1376w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0-300x94.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0-1024x320.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0-150x47.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0-768x240.png 768w" data-lazy-sizes="(max-width: 1376px) 100vw, 1376px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0.png" /></noscript><img decoding="async" width="1376" height="430" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222857566.png" class="attachment-full size-full j-lazy" alt="Create One More Registry Key &#039;Client&#039; underneath &#039;TLS 1.0&#039;" style="max-width: 100%; height: auto;" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0.png 1376w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0-300x94.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0-1024x320.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0-150x47.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0-768x240.png 768w" data-lazy-sizes="(max-width: 1376px) 100vw, 1376px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-One-More-Registry-Key-Client-underneath-TLS-1.0.png" /><noscript><noscript><img decoding="async" width="1376" height="430" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222857566.png" class="attachment-full size-full" alt="Create One More Registry Key &#039;Client&#039; underneath &#039;TLS 1.0&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1376px) 100vw, 1376px" /></noscript><img decoding="async" width="1376" height="430" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222857566.png" class="attachment-full size-full j-lazy" alt="Create One More Registry Key &#039;Client&#039; underneath &#039;TLS 1.0&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1376px) 100vw, 1376px" /></noscript></p>
</li>
<li class="schema-how-to-step" id="how-to-step-1663479249672"><strong class="schema-how-to-step-name"><strong>Create New Item &#8216;DWORD (32-bit) Value&#8217; Underneath &#8216;Client&#8217;</strong></strong>
<p class="schema-how-to-step-text">Create new  item by right click on &#8216;<strong>Client</strong>&#8216;, select &#8216;New&#8217; &#8211;&gt; <strong>DWORD (32-bit) Value.</strong></p>
<p><noscript><img decoding="async" width="1382" height="736" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222859541.png" class="attachment-full size-full" alt="Create New Item &#039;DWORD (32-bit) Value&#039; Underneath &#039;Client&#039;" style="max-width: 100%; height: auto;" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client.png 1382w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client-300x160.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client-1024x545.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client-150x80.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client-768x409.png 768w" data-lazy-sizes="(max-width: 1382px) 100vw, 1382px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client.png" /></noscript><img decoding="async" width="1382" height="736" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222859541.png" class="attachment-full size-full j-lazy" alt="Create New Item &#039;DWORD (32-bit) Value&#039; Underneath &#039;Client&#039;" style="max-width: 100%; height: auto;" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client.png 1382w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client-300x160.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client-1024x545.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client-150x80.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client-768x409.png 768w" data-lazy-sizes="(max-width: 1382px) 100vw, 1382px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-New-Item-DWORD-32-bit-Value-Underneath-Client.png" /><noscript><noscript><img decoding="async" width="1382" height="736" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222859541.png" class="attachment-full size-full" alt="Create New Item &#039;DWORD (32-bit) Value&#039; Underneath &#039;Client&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1382px) 100vw, 1382px" /></noscript><img decoding="async" width="1382" height="736" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222859541.png" class="attachment-full size-full j-lazy" alt="Create New Item &#039;DWORD (32-bit) Value&#039; Underneath &#039;Client&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1382px) 100vw, 1382px" /></noscript></p>
</li>
<li class="schema-how-to-step" id="how-to-step-1663479302330"><strong class="schema-how-to-step-name"><strong>Rename the Item &#8216;DWORD (32-bit) Value&#8217; to &#8216;Enable&#8217;</strong></strong>
<p class="schema-how-to-step-text">We Name the item as &#8216;<strong>Enabled</strong>&#8216; with Hexadecimal value as &#8216;<strong>0</strong>&#8216;.</p>
<p><noscript><img decoding="async" width="1372" height="420" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222902682.png" class="attachment-full size-full" alt="Rename the Item &#039;DWORD (32-bit) Value&#039; to &#039;Enable&#039;" style="max-width: 100%; height: auto;" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable.png 1372w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable-300x92.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable-1024x313.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable-150x46.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable-768x235.png 768w" data-lazy-sizes="(max-width: 1372px) 100vw, 1372px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable.png" /></noscript><img decoding="async" width="1372" height="420" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222902682.png" class="attachment-full size-full j-lazy" alt="Rename the Item &#039;DWORD (32-bit) Value&#039; to &#039;Enable&#039;" style="max-width: 100%; height: auto;" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable.png 1372w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable-300x92.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable-1024x313.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable-150x46.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable-768x235.png 768w" data-lazy-sizes="(max-width: 1372px) 100vw, 1372px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Rename-the-Item-DWORD-32-bit-Value-to-Enable.png" /><noscript><noscript><img decoding="async" width="1372" height="420" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222902682.png" class="attachment-full size-full" alt="Rename the Item &#039;DWORD (32-bit) Value&#039; to &#039;Enable&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1372px) 100vw, 1372px" /></noscript><img decoding="async" width="1372" height="420" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222902682.png" class="attachment-full size-full j-lazy" alt="Rename the Item &#039;DWORD (32-bit) Value&#039; to &#039;Enable&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1372px) 100vw, 1372px" /></noscript></p>
</li>
<li class="schema-how-to-step" id="how-to-step-1663479353792"><strong class="schema-how-to-step-name"><strong>Create another item, &#8216;DisabledByDefault&#8217; Underneath TLS 1.0</strong></strong>
<p class="schema-how-to-step-text">Similarly, create another item, &#8216;<strong>DisabledByDefault</strong>&#8216;, with a Hexadecimal value as &#8216;<strong>1</strong>&#8216;.</p>
<p><noscript><img decoding="async" width="1364" height="418" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222903303.png" class="attachment-full size-full" alt="Create another item, &#039;DisabledByDefault&#039; Underneath TLS 1.0" style="max-width: 100%; height: auto;" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0.png 1364w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0-300x92.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0-1024x314.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0-150x46.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0-768x235.png 768w" data-lazy-sizes="(max-width: 1364px) 100vw, 1364px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0.png" /></noscript><img decoding="async" width="1364" height="418" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222903303.png" class="attachment-full size-full j-lazy" alt="Create another item, &#039;DisabledByDefault&#039; Underneath TLS 1.0" style="max-width: 100%; height: auto;" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0.png 1364w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0-300x92.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0-1024x314.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0-150x46.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0-768x235.png 768w" data-lazy-sizes="(max-width: 1364px) 100vw, 1364px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-another-item-DisabledByDefault-Underneath-TLS-1.0.png" /><noscript><noscript><img decoding="async" width="1364" height="418" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222903303.png" class="attachment-full size-full" alt="Create another item, &#039;DisabledByDefault&#039; Underneath TLS 1.0" style="max-width: 100%; height: auto;" sizes="(max-width: 1364px) 100vw, 1364px" /></noscript><img decoding="async" width="1364" height="418" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222903303.png" class="attachment-full size-full j-lazy" alt="Create another item, &#039;DisabledByDefault&#039; Underneath TLS 1.0" style="max-width: 100%; height: auto;" sizes="(max-width: 1364px) 100vw, 1364px" /></noscript></p>
</li>
<li class="schema-how-to-step" id="how-to-step-1663479401418"><strong class="schema-how-to-step-name"><strong>Create &#8216;Server&#8217; and corresponding Keys as in the case of &#8216;Client&#8217;</strong></strong>
<p class="schema-how-to-step-text">Similar to the above steps, create a key &#8216;<strong>Server</strong>&#8216; under &#8216;<strong>Protocols</strong>&#8216; and create registry items &#8216;DWORD (32-bit)&#8217; and &#8216;Enabled&#8217; as shown below.</p>
<p><noscript><img decoding="async" width="1368" height="448" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222906249.png" class="attachment-full size-full" alt="Create &#039;Server&#039; and corresponding Keys as in the case of &#039;Client&#039;" style="max-width: 100%; height: auto;" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1.png 1368w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-300x98.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1024x335.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-150x49.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-768x252.png 768w" data-lazy-sizes="(max-width: 1368px) 100vw, 1368px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1.png" /></noscript><img decoding="async" width="1368" height="448" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222906249.png" class="attachment-full size-full j-lazy" alt="Create &#039;Server&#039; and corresponding Keys as in the case of &#039;Client&#039;" style="max-width: 100%; height: auto;" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1.png 1368w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-300x98.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1024x335.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-150x49.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-768x252.png 768w" data-lazy-sizes="(max-width: 1368px) 100vw, 1368px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1.png" /><noscript><noscript><img decoding="async" width="1368" height="448" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222906249.png" class="attachment-full size-full" alt="Create &#039;Server&#039; and corresponding Keys as in the case of &#039;Client&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1368px) 100vw, 1368px" /></noscript><img decoding="async" width="1368" height="448" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222906249.png" class="attachment-full size-full j-lazy" alt="Create &#039;Server&#039; and corresponding Keys as in the case of &#039;Client&#039;" style="max-width: 100%; height: auto;" sizes="(max-width: 1368px) 100vw, 1368px" /></noscript></p>
</li>
<li class="schema-how-to-step" id="how-to-step-1663479449507"><strong class="schema-how-to-step-name"><strong>Disable TLS 1.1 on the Windows Server</strong></strong>
<p class="schema-how-to-step-text">Similar to the above steps, create a key &#8216;TLS 1.1&#8217; under &#8216;<strong>Protocols</strong>&#8216; and below keys and items to Disable &#8216;TLS 1.1&#8217;</p>
<p>&gt; HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client/Enabled with Hexadecimal value as &#8216;1&#8217;<br />&gt; HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client/DisabledByDefault with Hexadecimal value as &#8216;0&#8217;</p>
<p>&gt; HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server/Enabled with Hexadecimal value as &#8216;1&#8217;<br />&gt; HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server/DisabledByDefault with Hexadecimal value as &#8216;0&#8217;</p>
</li>
<li class="schema-how-to-step" id="how-to-step-1663479499252"><strong class="schema-how-to-step-name"></strong>
<p class="schema-how-to-step-text"><noscript><img decoding="async" width="1376" height="488" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222909231.png" class="attachment-full size-full" alt="Create &#039;Server&#039; and corresponding Keys as in the case of &#039;Client&#039; (1)" style="max-width: 100%; height: auto;" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1.png 1376w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1-300x106.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1-1024x363.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1-150x53.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1-768x272.png 768w" data-lazy-sizes="(max-width: 1376px) 100vw, 1376px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1.png" /></noscript><img decoding="async" width="1376" height="488" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222909231.png" class="attachment-full size-full j-lazy" alt="Create &#039;Server&#039; and corresponding Keys as in the case of &#039;Client&#039; (1)" style="max-width: 100%; height: auto;" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1.png 1376w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1-300x106.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1-1024x363.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1-150x53.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1-768x272.png 768w" data-lazy-sizes="(max-width: 1376px) 100vw, 1376px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Create-Server-and-corresponding-Keys-as-in-the-case-of-Client-1-1.png" /><noscript><noscript><img decoding="async" width="1376" height="488" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222909231.png" class="attachment-full size-full" alt="Create &#039;Server&#039; and corresponding Keys as in the case of &#039;Client&#039; (1)" style="max-width: 100%; height: auto;" sizes="(max-width: 1376px) 100vw, 1376px" /></noscript><img decoding="async" width="1376" height="488" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222909231.png" class="attachment-full size-full j-lazy" alt="Create &#039;Server&#039; and corresponding Keys as in the case of &#039;Client&#039; (1)" style="max-width: 100%; height: auto;" sizes="(max-width: 1376px) 100vw, 1376px" /></noscript></p>
</li>
</ol>
</div>
<h3 id="toc_7"><span class="ez-toc-section" id="Method_2_Disable_TLS_10_and_TLS_11_using_Powershell_commands"></span><strong>Method 2 : Disable TLS 1.0 and TLS 1.1 using Powershell commands</strong><span class="ez-toc-section-end"></span></h3>
<p>Follow this simple procedure to enable <a href="https://www.thesecmaster.com/decoding-tls-v1-2-protocol-handshake-with-wireshark/" target="_blank" rel="noreferrer noopener">TLS 1.2</a> and TLS 1.2 using Powershell commands.</p>
<ol>
<li>Open Powershell as Administrator</li>
</ol>
<figure class="wp-block-image size-large"><noscript><img decoding="async" width="1024" height="894" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222910595.png" alt="Open Powershell as Administrator on Windows" class="wp-image-10442" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-1024x894.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-300x262.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-150x131.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-768x671.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-1536x1341.png 1536w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1.png 1560w" data-lazy-sizes="(max-width: 1024px) 100vw, 1024px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-1024x894.png" /></noscript><img decoding="async" width="1024" height="894" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222910595.png" alt="Open Powershell as Administrator on Windows" class="wp-image-10442 j-lazy" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-1024x894.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-300x262.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-150x131.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-768x671.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-1536x1341.png 1536w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1.png 1560w" data-lazy-sizes="(max-width: 1024px) 100vw, 1024px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Open-Powershell-as-Administrator-1-1024x894.png" /><noscript><noscript><img decoding="async" width="1024" height="894" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222910595.png" alt="Open Powershell as Administrator on Windows" class="wp-image-10442" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript><img decoding="async" width="1024" height="894" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222910595.png" alt="Open Powershell as Administrator on Windows" class="wp-image-10442 j-lazy" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>
<p>2. Run the below commands to create Registry entries</p>
<pre class="wp-block-code"><code>- New-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Server' -Force
- New-ItemProperty -Path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Server' –PropertyType 'DWORD' -Name 'Enabled' -Value '0' 
- New-ItemProperty -Path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Server' –PropertyType 'DWORD' -Name 'DisabledByDefault' -Value '1' 

- New-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Client' -Force
- New-ItemProperty -Path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Client' -PropertyType 'DWORD' -Name 'Enabled' -Value '0'
- New-ItemProperty -Path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Client' –PropertyType 'DWORD' -Name 'DisabledByDefault' -Value '1' 


- New-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server' -Force
- New-ItemProperty -Path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server' –PropertyType 'DWORD' -Name 'Enabled' -Value '0' 
- New-ItemProperty -Path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server' –PropertyType 'DWORD' -Name 'DisabledByDefault' -Value '1' 

- New-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client' -Force
- New-ItemProperty -Path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client' -PropertyType 'DWORD' -Name 'Enabled' -Value '0'
- New-ItemProperty -Path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client' –PropertyType 'DWORD' -Name 'DisabledByDefault' -Value '1'</code></pre>
<p>Before running the commands, you can see no items exist underneath Protocol.</p>
<figure class="wp-block-image size-large"><noscript><img decoding="async" width="1024" height="304" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222912664.png" alt="no items were exist underneath Protocol" class="wp-image-10443" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-1024x304.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-300x89.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-150x45.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-768x228.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1.png 1286w" data-lazy-sizes="(max-width: 1024px) 100vw, 1024px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-1024x304.png" /></noscript><img decoding="async" width="1024" height="304" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222912664.png" alt="no items were exist underneath Protocol" class="wp-image-10443 j-lazy" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-1024x304.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-300x89.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-150x45.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-768x228.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1.png 1286w" data-lazy-sizes="(max-width: 1024px) 100vw, 1024px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/no-items-were-exist-underneath-Protocol-1-1024x304.png" /><noscript><noscript><img decoding="async" width="1024" height="304" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222912664.png" alt="no items were exist underneath Protocol" class="wp-image-10443" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript><img decoding="async" width="1024" height="304" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222912664.png" alt="no items were exist underneath Protocol" class="wp-image-10443 j-lazy" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>
<p>After running the commands you can see there are two keys created &#8216;TLS 1.0&#8217; &amp; &#8216;TLS 1.1&#8217;, Underneath each protocols there are &#8216;Client&#8217; &amp;&#8217;Server&#8217; Keys inside them ther are two items &#8216;DisableByDefault&#8217; &amp; &#8216;Enabled&#8217;.</p>
<figure class="wp-block-image size-large"><noscript><img decoding="async" width="1024" height="406" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222914680.png" alt="List of Item Created underneath Client' and Server using PowerShell Commands" class="wp-image-10444" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-1024x406.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-300x119.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-150x60.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-768x305.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands.png 1386w" data-lazy-sizes="(max-width: 1024px) 100vw, 1024px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-1024x406.png" /></noscript><img decoding="async" width="1024" height="406" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222914680.png" alt="List of Item Created underneath Client' and Server using PowerShell Commands" class="wp-image-10444 j-lazy" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-1024x406.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-300x119.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-150x60.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-768x305.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands.png 1386w" data-lazy-sizes="(max-width: 1024px) 100vw, 1024px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/List-of-Item-Created-underneath-Client-and-Server-using-PowerShell-Commands-1024x406.png" /><noscript><noscript><img decoding="async" width="1024" height="406" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222914680.png" alt="List of Item Created underneath Client' and Server using PowerShell Commands" class="wp-image-10444" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript><img decoding="async" width="1024" height="406" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222914680.png" alt="List of Item Created underneath Client' and Server using PowerShell Commands" class="wp-image-10444 j-lazy" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>
<h3 id="toc_8"><span class="ez-toc-section" id="Method_3_Disable_TLS_10_and_TLS_11_on_Windows_Server_using_CMD"></span><strong>Method 3 : Disable TLS 1.0 and TLS 1.1 on Windows Server using CMD</strong><span class="ez-toc-section-end"></span></h3>
<p>Follow this simple procedure to disable TLS 1.0 and TLS 1.1 using CMD comments.</p>
<ol>
<li>Open &#8216;Command Prompt&#8217; as Administrator</li>
</ol>
<figure class="wp-block-image size-large"><noscript><img decoding="async" width="1024" height="988" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222916257.png" alt="Open 'Command Prompt' as Administrator on the Windows Server" class="wp-image-10445" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-1024x988.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-300x289.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-150x145.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-768x741.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-24x24.png 24w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1.png 1420w" data-lazy-sizes="(max-width: 1024px) 100vw, 1024px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-1024x988.png" /></noscript><img decoding="async" width="1024" height="988" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222916257.png" alt="Open 'Command Prompt' as Administrator on the Windows Server" class="wp-image-10445 j-lazy" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-1024x988.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-300x289.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-150x145.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-768x741.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-24x24.png 24w, https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1.png 1420w" data-lazy-sizes="(max-width: 1024px) 100vw, 1024px" data-lazy-src="https://thesecmaster.com/wp-content/uploads/2022/09/Open-Command-Prompt-as-Administrator-on-the-Windows-Server-1-1024x988.png" /><noscript><noscript><img decoding="async" width="1024" height="988" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222916257.png" alt="Open 'Command Prompt' as Administrator on the Windows Server" class="wp-image-10445" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript><img decoding="async" width="1024" height="988" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222916257.png" alt="Open 'Command Prompt' as Administrator on the Windows Server" class="wp-image-10445 j-lazy" sizes="(max-width: 1024px) 100vw, 1024px" /></noscript></figure>
<p>2. Run the below commands to create Registry entries.</p>
<pre class="wp-block-code"><code>reg add "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Server" /v Enabled /t REG_DWORD /d 0 /f 
reg add "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Server" /v DisabledByDefault /t REG_DWORD /d 1 /f

reg add "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Client" /v Enabled /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Client" /v DisabledByDefault /t REG_DWORD /d 1 /f


reg add "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server" /v Enabled /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server" /v DisabledByDefault /t REG_DWORD /d 1 /f

reg add "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client" /v Enabled /t REG_DWORD /d 0 /f reg add "HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client" /v DisabledByDefault /t REG_DWORD /d 1 /f</code></pre>
<p>We hope this post will help you know how to disable TLS 1.0 and TLS 1.1 on your Windows Server as they are deprecated for their week security. Please share this post if you find this interested. Visit our social media page on&nbsp;<a href="https://facebook.com/TheSecMaster/" target="_blank" rel="noreferrer noopener">Facebook</a>,&nbsp;<a href="https://www.linkedin.com/company/thesecmaster" target="_blank" rel="noreferrer noopener">LinkedIn</a>,&nbsp;<a href="https://twitter.com/TheSecMaster1" target="_blank" rel="noreferrer noopener">Twitter</a>,&nbsp;<a href="https://t.me/thesecmaster" target="_blank" rel="noreferrer noopener">Telegram</a>,&nbsp;<a href="https://www.tumblr.com/blog/thesecmaster" target="_blank" rel="noreferrer noopener">Tumblr</a>, &amp;&nbsp;<a href="https://medium.com/thesecmaster" target="_blank" rel="noreferrer noopener">Medium</a>&nbsp;and subscribe to receive updates like this.</p>
<ul class="wp-block-yoast-seo-related-links">
<li><a href="https://thesecmaster.com/how-to-enable-tls-1-2-and-tls-1-3-on-windows-server/" target="_blank" rel="noopener">How to Enable TLS 1.2 and TLS 1.3 on </a><a href="https://thesecmaster.com/how-to-enable-tls-1-2-and-tls-1-3-on-windows-server/" target="_blank" rel="noreferrer noopener">Windows</a><a href="https://thesecmaster.com/how-to-enable-tls-1-2-and-tls-1-3-on-windows-server/" target="_blank" rel="noopener"> Server</a></li>
<li><a href="https://thesecmaster.com/web-stories/enable-tls-1-3-on-web-servers/" target="_blank" rel="noopener">Enable TLS 1.3 on Web </a><a href="https://thesecmaster.com/web-stories/enable-tls-1-3-on-web-servers/" target="_blank" rel="noreferrer noopener">Servers</a></li>
<li><a href="https://thesecmaster.com/how-to-enable-tls-1-3-in-standard-web-browsers/" target="_blank" rel="noreferrer noopener">How to Enable TLS 1.3 in Standard Web Browsers?</a></li>
<li><a href="https://thesecmaster.com/how-to-enable-tls-1-3-on-popular-web-servers/" target="_blank" rel="noreferrer noopener">How to Enable TLS 1.3 on Popular Web Servers?</a></li>
<li><a href="https://thesecmaster.com/web-stories/tls-1-3-protocol-handshake/" target="_blank" rel="noreferrer noopener">TLS 1.3 protocol Handshake</a></li>
</ul>
<nav class="jp-relatedposts-i2 wp-block-jetpack-related-posts" data-layout="grid">
<div class="jp-related-posts-i2__row" data-post-count="2">
<ul id="related-posts-item-633806f185b48" aria-labelledby="related-posts-item-633806f185b48-label" class="jp-related-posts-i2__post" role="menuitem">
<li class="jp-related-posts-i2__post-link"><a id="related-posts-item-633806f185b48-label" href="https://thesecmaster.com/how-to-enable-tls-1-2-and-tls-1-3-on-windows-server/" target="_blank" rel="noopener">How to Enable TLS 1.2 and TLS 1.3 on Windows Server</a></li>
<li class="jp-related-posts-i2__post-img-link"><a href="https://thesecmaster.com/how-to-enable-tls-1-2-and-tls-1-3-on-windows-server/" target="_blank" rel="noopener"><noscript><img decoding="async" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222918655.png" width="350" height="200" alt="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" loading="lazy" data-lazy-src="https://i0.wp.com/thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server.png?resize=350%2C200&#038;ssl=1" /></noscript><img decoding="async" class="j-lazy" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222918655.png" width="350" height="200" alt="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" loading="lazy" data-lazy-src="https://i0.wp.com/thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server.png?resize=350%2C200&#038;ssl=1" /><noscript><noscript><img decoding="async" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222918655.png" width="350" height="200" alt="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" loading="lazy" /></noscript><img decoding="async" class="j-lazy" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222918655.png" width="350" height="200" alt="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" loading="lazy" /></noscript></a></li>
</ul>
<ul id="related-posts-item-633806f185b6d" aria-labelledby="related-posts-item-633806f185b6d-label" class="jp-related-posts-i2__post" role="menuitem">
<li class="jp-related-posts-i2__post-link"><a id="related-posts-item-633806f185b6d-label" href="https://thesecmaster.com/how-to-enable-tls-1-3-in-standard-web-browsers/" target="_blank" rel="noopener">How to Enable TLS 1.3 in Standard Web Browsers?</a></li>
<li class="jp-related-posts-i2__post-img-link"><a href="https://thesecmaster.com/how-to-enable-tls-1-3-in-standard-web-browsers/" target="_blank" rel="noopener"><noscript><img decoding="async" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222922792.png" width="350" height="200" alt="How to Enable TLS 1.3 in standard Web Browsers" loading="lazy" data-lazy-src="https://i0.wp.com/thesecmaster.com/wp-content/uploads/2021/03/How-to-Enable-TLS-1.3-in-standard-Web-Browsers.png?resize=350%2C200&#038;ssl=1" /></noscript><img decoding="async" class="j-lazy" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222922792.png" width="350" height="200" alt="How to Enable TLS 1.3 in standard Web Browsers" loading="lazy" data-lazy-src="https://i0.wp.com/thesecmaster.com/wp-content/uploads/2021/03/How-to-Enable-TLS-1.3-in-standard-Web-Browsers.png?resize=350%2C200&#038;ssl=1" /><noscript><noscript><img decoding="async" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222922792.png" width="350" height="200" alt="How to Enable TLS 1.3 in standard Web Browsers" loading="lazy" /></noscript><img decoding="async" class="j-lazy" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222922792.png" width="350" height="200" alt="How to Enable TLS 1.3 in standard Web Browsers" loading="lazy" /></noscript></a></li>
</ul>
</div>
<div class="jp-related-posts-i2__row" data-post-count="2">
<ul id="related-posts-item-633806f185b89" aria-labelledby="related-posts-item-633806f185b89-label" class="jp-related-posts-i2__post" role="menuitem">
<li class="jp-related-posts-i2__post-link"><a id="related-posts-item-633806f185b89-label" href="https://thesecmaster.com/decoding-tls-1-3-protocol-handshake-with-wireshark/" target="_blank" rel="noopener">Decoding TLS 1.3 Protocol Handshake With Wireshark</a></li>
<li class="jp-related-posts-i2__post-img-link"><a href="https://thesecmaster.com/decoding-tls-1-3-protocol-handshake-with-wireshark/" target="_blank" rel="noopener"><noscript><img decoding="async" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222925148.png" width="350" height="200" alt="TLS 1.3 protocol Handshake" loading="lazy" data-lazy-src="https://i0.wp.com/thesecmaster.com/wp-content/uploads/2021/03/Decoding-TLS-1.3-protocol-Handshake-with-Wireshark.png?resize=350%2C200&#038;ssl=1" /></noscript><img decoding="async" class="j-lazy" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222925148.png" width="350" height="200" alt="TLS 1.3 protocol Handshake" loading="lazy" data-lazy-src="https://i0.wp.com/thesecmaster.com/wp-content/uploads/2021/03/Decoding-TLS-1.3-protocol-Handshake-with-Wireshark.png?resize=350%2C200&#038;ssl=1" /><noscript><noscript><img decoding="async" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222925148.png" width="350" height="200" alt="TLS 1.3 protocol Handshake" loading="lazy" /></noscript><img decoding="async" class="j-lazy" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222925148.png" width="350" height="200" alt="TLS 1.3 protocol Handshake" loading="lazy" /></noscript></a></li>
</ul>
<ul id="related-posts-item-633806f185b9f" aria-labelledby="related-posts-item-633806f185b9f-label" class="jp-related-posts-i2__post" role="menuitem">
<li class="jp-related-posts-i2__post-link"><a id="related-posts-item-633806f185b9f-label" href="https://thesecmaster.com/how-do-alpaca-tls-cross-protocol-attacks-lets-attackers-redirect-https-traffic/" target="_blank" rel="noopener">How Do (ALPACA ) TLS Cross-Protocol Attacks Lets Attackers Redirect HTTPS Traffic</a></li>
<li class="jp-related-posts-i2__post-img-link"><a href="https://thesecmaster.com/how-do-alpaca-tls-cross-protocol-attacks-lets-attackers-redirect-https-traffic/" target="_blank" rel="noopener"><noscript><img decoding="async" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222927213.png" width="350" height="200" alt="TLS Cross-Protocol Attacks" loading="lazy" data-lazy-src="https://i0.wp.com/thesecmaster.com/wp-content/uploads/2021/06/How-do-ALPACA-TLS-Cross-Protocol-Attacks-lets-Attackers-redirect-HTTPS-traffic.png?resize=350%2C200&#038;ssl=1" /></noscript><img decoding="async" class="j-lazy" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222927213.png" width="350" height="200" alt="TLS Cross-Protocol Attacks" loading="lazy" data-lazy-src="https://i0.wp.com/thesecmaster.com/wp-content/uploads/2021/06/How-do-ALPACA-TLS-Cross-Protocol-Attacks-lets-Attackers-redirect-HTTPS-traffic.png?resize=350%2C200&#038;ssl=1" /><noscript><noscript><img decoding="async" src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222927213.png" width="350" height="200" alt="TLS Cross-Protocol Attacks" loading="lazy" /></noscript><img decoding="async" class="j-lazy" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222927213.png" width="350" height="200" alt="TLS Cross-Protocol Attacks" loading="lazy" /></noscript></a></li>
</ul>
</div>
</nav>
<div class="crp_related     crp-masonry">
<h3 id="toc_9">Keep Reading:</h3>
<ul>
<li><a href="https://thesecmaster.com/how-to-enable-tls-1-2-and-tls-1-3-on-windows-server/" target="_blank" class="crp_link post-9859" rel="noopener"><br />
<figure><noscript><img decoding="async" loading="lazy" width="300" height="169" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured" alt="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" title="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-300x169.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-1024x576.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-150x84.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-768x432.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-1536x864.png 1536w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-2048x1152.png 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy" width="300" height="169" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured j-lazy" alt="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" title="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-300x169.png 300w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-1024x576.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-150x84.png 150w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-768x432.png 768w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-1536x864.png 1536w, https://thesecmaster.com/wp-content/uploads/2022/09/How-to-Enable-TLS-1.2-and-TLS-1.3-on-Windows-Server-2048x1152.png 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:><noscript><noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222929964.png" class="crp_thumb crp_featured" alt="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" title="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222929964.png" class="crp_thumb crp_featured j-lazy" alt="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" title="How to Enable TLS 1.2 and TLS 1.3 on Windows Server" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript></figure>
<p><span class="crp_title">How to Enable TLS 1.2 and TLS 1.3 on Windows&hellip;</span></a></li>
<li><a href="https://thesecmaster.com/step-by-step-procedure-to-set-up-a-standalone-root-ca-on-windows-server/" target="_blank" class="crp_link post-7621" rel="noopener"><br />
<figure><noscript><img decoding="async" loading="lazy" width="300" height="169" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured" alt="Step -By-Step Procedure To Set Up A Standalone Root CA On Windows Server" title="Step -By-Step Procedure To Set Up A Standalone Root CA On Windows Server" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-300x169.png 300w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-1024x576.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-150x84.png 150w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-768x432.png 768w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-1536x864.png 1536w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-2048x1152.png 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy" width="300" height="169" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured j-lazy" alt="Step -By-Step Procedure To Set Up A Standalone Root CA On Windows Server" title="Step -By-Step Procedure To Set Up A Standalone Root CA On Windows Server" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-300x169.png 300w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-1024x576.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-150x84.png 150w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-768x432.png 768w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-1536x864.png 1536w, https://thesecmaster.com/wp-content/uploads/2022/05/Procedure-to-set-up-A-Standalone-Root-CA-on-Windows-Server-2048x1152.png 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:><noscript><noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222930912.png" class="crp_thumb crp_featured" alt="Step -By-Step Procedure To Set Up A Standalone Root CA On Windows Server" title="Step -By-Step Procedure To Set Up A Standalone Root CA On Windows Server" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222930912.png" class="crp_thumb crp_featured j-lazy" alt="Step -By-Step Procedure To Set Up A Standalone Root CA On Windows Server" title="Step -By-Step Procedure To Set Up A Standalone Root CA On Windows Server" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript></figure>
<p><span class="crp_title">Step -By-Step Procedure To Set Up A Standalone&hellip;</span></a></li>
<li><a href="https://thesecmaster.com/build-your-own-ott-platforms-like-netflix-using-raspberry-pi-and-plex-media-server/" target="_blank" class="crp_link post-1137" rel="noopener"><br />
<figure><noscript><img decoding="async" loading="lazy" width="300" height="169" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured" alt="Build Your Own OTT Platforms Like Netflix Using Raspberry Pi And Plex Media Server:" title="Build Your Own OTT Platforms Like Netflix Using Raspberry Pi And Plex Media Server:" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-300x169.jpg 300w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-1024x576.jpg 1024w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-150x84.jpg 150w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-768x432.jpg 768w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-1536x864.jpg 1536w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-2048x1152.jpg 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy" width="300" height="169" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured j-lazy" alt="Build Your Own OTT Platforms Like Netflix Using Raspberry Pi And Plex Media Server:" title="Build Your Own OTT Platforms Like Netflix Using Raspberry Pi And Plex Media Server:" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-300x169.jpg 300w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-1024x576.jpg 1024w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-150x84.jpg 150w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-768x432.jpg 768w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-1536x864.jpg 1536w, https://thesecmaster.com/wp-content/uploads/2021/04/Build-your-own-OTT-platforms-like-Netflix-using-Raspberry-Pi-and-Plex-media-server-2048x1152.jpg 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:><noscript><noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222932910.jpg" class="crp_thumb crp_featured" alt="Build Your Own OTT Platforms Like Netflix Using Raspberry Pi And Plex Media Server:" title="Build Your Own OTT Platforms Like Netflix Using Raspberry Pi And Plex Media Server:" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222932910.jpg" class="crp_thumb crp_featured j-lazy" alt="Build Your Own OTT Platforms Like Netflix Using Raspberry Pi And Plex Media Server:" title="Build Your Own OTT Platforms Like Netflix Using Raspberry Pi And Plex Media Server:" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript></figure>
<p><span class="crp_title">Build Your Own OTT Platforms Like Netflix Using&hellip;</span></a></li>
<li><a href="https://thesecmaster.com/step-by-step-procedure-to-configure-iis-on-the-windows-server/" target="_blank" class="crp_link post-8249" rel="noopener"><br />
<figure><noscript><img decoding="async" loading="lazy" width="300" height="169" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured" alt="Step By Step Procedure To Configure IIS On The Windows Server" title="Step By Step Procedure To Configure IIS On The Windows Server" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-300x169.png 300w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-1024x576.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-150x84.png 150w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-768x432.png 768w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-1536x864.png 1536w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-2048x1152.png 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy" width="300" height="169" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured j-lazy" alt="Step By Step Procedure To Configure IIS On The Windows Server" title="Step By Step Procedure To Configure IIS On The Windows Server" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-300x169.png 300w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-1024x576.png 1024w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-150x84.png 150w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-768x432.png 768w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-1536x864.png 1536w, https://thesecmaster.com/wp-content/uploads/2022/07/Step-by-Step-Procedure-to-Configure-IIS-on-the-Windows-Server-2048x1152.png 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:><noscript><noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222933147.png" class="crp_thumb crp_featured" alt="Step By Step Procedure To Configure IIS On The Windows Server" title="Step By Step Procedure To Configure IIS On The Windows Server" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222933147.png" class="crp_thumb crp_featured j-lazy" alt="Step By Step Procedure To Configure IIS On The Windows Server" title="Step By Step Procedure To Configure IIS On The Windows Server" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript></figure>
<p><span class="crp_title">Step By Step Procedure To Configure IIS On The&hellip;</span></a></li>
<li><a href="https://thesecmaster.com/run-windows-on-mac-for-free/" target="_blank" class="crp_link post-1726" rel="noopener"><br />
<figure><noscript><img decoding="async" loading="lazy" width="300" height="169" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured" alt="Step By Step Procedure To Run Windows On Mac For Free!" title="Step By Step Procedure To Run Windows On Mac For Free!" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-300x169.jpg 300w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-1024x576.jpg 1024w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-150x84.jpg 150w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-768x432.jpg 768w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-1536x864.jpg 1536w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-2048x1152.jpg 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy" width="300" height="169" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured j-lazy" alt="Step By Step Procedure To Run Windows On Mac For Free!" title="Step By Step Procedure To Run Windows On Mac For Free!" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-300x169.jpg 300w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-1024x576.jpg 1024w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-150x84.jpg 150w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-768x432.jpg 768w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-1536x864.jpg 1536w, https://thesecmaster.com/wp-content/uploads/2021/07/Step-by-Step-Procedure-to-Run-Windows-on-Mac-for-Free-2048x1152.jpg 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:><noscript><noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222935117.jpg" class="crp_thumb crp_featured" alt="Step By Step Procedure To Run Windows On Mac For Free!" title="Step By Step Procedure To Run Windows On Mac For Free!" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222935117.jpg" class="crp_thumb crp_featured j-lazy" alt="Step By Step Procedure To Run Windows On Mac For Free!" title="Step By Step Procedure To Run Windows On Mac For Free!" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript></figure>
<p><span class="crp_title">Step By Step Procedure To Run Windows On Mac For&hellip;</span></a></li>
<li><a href="https://thesecmaster.com/what-is-starttls-how-starttls-vulnerabilities-affect-popular-email-clients/" target="_blank" class="crp_link post-2056" rel="noopener"><br />
<figure><noscript><img decoding="async" loading="lazy" width="300" height="169" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured" alt="What Is STARTTLS? How STARTTLS Vulnerabilities Affect Popular Email Clients?" title="What Is STARTTLS? How STARTTLS Vulnerabilities Affect Popular Email Clients?" data-lazy-srcset="https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-300x169.jpg 300w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-1024x576.jpg 1024w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-150x84.jpg 150w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-768x432.jpg 768w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-1536x864.jpg 1536w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-2048x1152.jpg 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy" width="300" height="169" src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20300%20169'%3E%3C/svg%3E" class="crp_thumb crp_featured j-lazy" alt="What Is STARTTLS? How STARTTLS Vulnerabilities Affect Popular Email Clients?" title="What Is STARTTLS? How STARTTLS Vulnerabilities Affect Popular Email Clients?" data-lazy-data-srcset="https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-300x169.jpg 300w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-1024x576.jpg 1024w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-150x84.jpg 150w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-768x432.jpg 768w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-1536x864.jpg 1536w, https://thesecmaster.com/wp-content/uploads/2021/08/STARTTLS-Vulnerabilities-2048x1152.jpg 2048w" data-lazy-sizes="(max-width: 300px) 100vw, 300px" "https:><noscript><noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222938202.jpg" class="crp_thumb crp_featured" alt="What Is STARTTLS? How STARTTLS Vulnerabilities Affect Popular Email Clients?" title="What Is STARTTLS? How STARTTLS Vulnerabilities Affect Popular Email Clients?" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript><img decoding="async" loading="lazy"  width="300" height="169"  src="https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001222938202.jpg" class="crp_thumb crp_featured j-lazy" alt="What Is STARTTLS? How STARTTLS Vulnerabilities Affect Popular Email Clients?" title="What Is STARTTLS? How STARTTLS Vulnerabilities Affect Popular Email Clients?" sizes="auto, (max-width: 300px) 100vw, 300px" "https:></noscript></figure>
<p><span class="crp_title">What Is STARTTLS? How STARTTLS Vulnerabilities&hellip;</span></a></li>
</ul>
<div class="crp_clear"></div>
</div>
<div class="entry-readmore"><div class="entry-readmore-btn"></div></div>                                                        <div class="entry-copyright"><p>原创文章，作者：ItWorker，如若转载，请注明出处：https://blog.ytso.com/tech/aiops/290305.html</p></div>                        </div>

                        <div class="entry-tag"></div>
                        <div class="entry-action">
                            <div class="btn-zan" data-id="290305"><i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-thumb-up-fill"></use></svg></i> 赞 <span class="entry-action-num">(0)</span></div>
                                                    </div>

                        <div class="entry-bar">
                            <div class="entry-bar-inner">
                                                                <div class="entry-bar-info entry-bar-info2">
                                    <div class="info-item meta">
                                                                                    <a class="meta-item j-heart" href="javascript:;" data-id="290305"><i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-star"></use></svg></i> <span class="data">0</span></a>                                        <a class="meta-item" href="#comments"><i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-comment"></use></svg></i> <span class="data">0</span></a>                                                                            </div>
                                    <div class="info-item share">
                                                                                    <a class="meta-item mobile j-mobile-share" href="javascript:;" data-id="290305" data-qrcode="https://blog.ytso.com/tech/aiops/290305.html">
                                                <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-share"></use></svg></i> 生成海报                                            </a>
                                                                                    <a class="meta-item wechat" data-share="wechat" target="_blank" rel="nofollow noopener noreferrer" href="#">
                                                <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-wechat"></use></svg></i>                                            </a>
                                                                                    <a class="meta-item weibo" data-share="weibo" target="_blank" rel="nofollow noopener noreferrer" href="#">
                                                <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-weibo"></use></svg></i>                                            </a>
                                                                                    <a class="meta-item qq" data-share="qq" target="_blank" rel="nofollow noopener noreferrer" href="#">
                                                <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-qq"></use></svg></i>                                            </a>
                                                                                    <a class="meta-item qzone" data-share="qzone" target="_blank" rel="nofollow noopener noreferrer" href="#">
                                                <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-qzone"></use></svg></i>                                            </a>
                                                                                    <a class="meta-item douban" data-share="douban" target="_blank" rel="nofollow noopener noreferrer" href="#">
                                                <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-douban"></use></svg></i>                                            </a>
                                                                                    <a class="meta-item linkedin" data-share="linkedin" target="_blank" rel="nofollow noopener noreferrer" href="#">
                                                <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-linkedin"></use></svg></i>                                            </a>
                                                                                    <a class="meta-item facebook" data-share="facebook" target="_blank" rel="nofollow noopener noreferrer" href="#">
                                                <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-facebook"></use></svg></i>                                            </a>
                                                                                    <a class="meta-item twitter" data-share="twitter" target="_blank" rel="nofollow noopener noreferrer" href="#">
                                                <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-twitter"></use></svg></i>                                            </a>
                                                                            </div>
                                    <div class="info-item act">
                                        <a href="javascript:;" id="j-reading"><i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-article"></use></svg></i></a>
                                    </div>
                                </div>
                            </div>
                        </div>
                    </div>
                                            <div class="entry-page">
                    <div class="entry-page-prev j-lazy" style="background-image: url('https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png');" data-original="http://ytso-blog-oss-img.oss-accelerate.aliyuncs.com/wp-content/uploads/2022/10/01/20221001221238456.png">
                <a href="https://blog.ytso.com/tech/aiops/290002.html" title="How to Disable TLS 1.0 and TLS 1.1 on Windows Server" rel="prev">
                    <span>How to Disable TLS 1.0 and TLS 1.1 on Windows Server</span>
                </a>
                <div class="entry-page-info">
                    <span class="pull-left"><i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-arrow-left-double"></use></svg></i> 上一篇</span>
                    <span class="pull-right">2022年10月1日 22:13</span>
                </div>
            </div>
                            <div class="entry-page-next entry-page-nobg">
                <a href="https://blog.ytso.com/tech/aiops/290375.html" title="图文详解优麒麟系统安装教程（建议收藏）" rel="next">
                    <span>图文详解优麒麟系统安装教程（建议收藏）</span>
                </a>
                <div class="entry-page-info">
                    <span class="pull-right">下一篇 <i class="wpcom-icon wi"><svg aria-hidden="true"><use xlink:href="#wi-arrow-right-double"></use></svg></i></span>
                    <span class="pull-left">2022年10月2日 16:34</span>
                </div>
            </div>
            </div>
                                        <error>
    <code>wp_die</code>
    <title><![CDATA[WordPress &amp;rsaquo; Error]]></title>
    <message><![CDATA[&lt;h1&gt;Error establishing a Redis connection&lt;/h1&gt;
&lt;p&gt;To disable Redis, delete the &lt;code&gt;object-cache.php&lt;/code&gt; file in the &lt;code&gt;/wp-content/&lt;/code&gt; directory.&lt;/p&gt;
]]></message>
    <data>
        <status>500</status>
    </data>
</error>
<!--
Performance optimized by Redis Object Cache. Learn more: https://wprediscache.com

Retrieved 1764 objects (460 KB) from Redis using Predis (v2.4.0).
-->
