hi, i have a windows 2012 r2 server and my qualys scan is having result for SSL/TLS Server supports TLSv1.0 port 3389.
I have disabled tls1.0 and i am still getting the same vulnerability.
anyone has an idea how to resolve it?
i just tested this, these are better instructions:
Disabling TLS 1.0 for RDP follow the same method to disable TLS 1.1 while you are at it.
To disable the TLS 1.0 protocol, you'll need to create an entry in the appropriate subkey in the Windows registry. This entry does not exist in the registry by default. After you have created the entry, change the DWORD value to 0.
Registry path: HKLM SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
Subkeys to be added/changed (put all to 0)
Controls the use of TLS 1.0 on the client.
Controls the use of TLS 1.0 on the server.
Flag to disable TLS 1.0 by default.
Retrieving data ...