Windows Ssl Settings

To disable SSL 3.0 by default, create a DisabledByDefault entry and change the DWORD value to 1. If an SSPI app explicitly requests to use SSL 3.0, it may be negotiated. The following example shows SSL 3.0 disabled in the registry: TLS 1.0. This subkey controls the use of TLS 1.0. For TLS 1.0 default settings, see Protocols in the TLS/SSL (Schannel SSP). To Enable Administration Node SSL Port on Windows. Start Settings Control Panel. Click the Windows Firewall icon. A window appears. Click the Exceptions tab. Click the Add Port button. A window appears. Enter the name in Name field. Enter the Administration Server's port number in Port field. Select the TCP option. Click the OK button. Jul 20, 2018  How to Change your e-mail settings in Windows Live Mail. If the issue is with your Computer or a Laptop you should try using Reimage Plus which can scan the repositories and replace corrupt and missing files. This works in most cases, where the issue is originated due to a. TLS Settings on Firefox v47. The settings security.tls.version.max specifies the maximum supported protocol version and security.tls.version.min specifies the minimum supported protocol version. They can take any of the below 4 values: 0 – SSL 3.0. Oct 02, 2011  On Windows the support for SSL/TLS protocols is tied to the SCHANNEL component. So, if a specific OS version doesn’t support a SSL/TLS version, this means it remains unsupported. TLS settings in IE on Windows 10. Chrome supports whatever IE supports.

Oct 19, 2018  -In the Windows menu search box, type Internet options.Under Best match, click Internet Options.In the Internet Properties window, on the Advance tab, scroll down to the Security section.Check SSL and TLS protocol what would you need -Click OK.Close your browser and restart Microsoft Edge browser. I hope it helps. Both aperelli and Tim provide the reference article and link which could help you to disable ssl and enable tls. You could follow the link and test on your system. If you run into any issues while the test, feel free to let us know.

You run a respectable website that your users can trust. Right? You might want to double check that. If your site is running on Microsoft Internet Information Services (IIS), you might be in for a surprise. When your users try to connect to your server over a secure connection (SSL/TLS) you may not be providing them a safe option.

Providing a better cipher suite is free and pretty easy to setup. Just follow this step by step guide to protect your users and your server. You’ll also learn how to test services you use to see how safe they really are.

Why Your Cipher Suites are Important

Microsoft’s IIS is pretty great. It’s both easy to setup and maintain. It has a user friendly graphical interface that makes configuration a breeze. It runs on Windows. IIS really has a lot going for it, but really falls flat when it comes to security defaults.

Here’s how a secure connection works. Your browser initiates a secure connection to a site. This is most easily identified by a URL starting with “HTTPS://”. Firefox offers up a little lock icon to illustrate the point further. Chrome, Internet Explorer, and Safari all have similar methods of letting you know your connection is encrypted. The server you’re connecting to replies to your browser with a list of encryption options to choose from in order of most preferred to least. Your browser goes down the list until it finds an encryption option it likes and we’re off and running. The rest, as they say, is math. (No one says that.)

The fatal flaw in this is that not all of the encryption options are created equally. Some use really great encryption algorithms (ECDH), others are less great (RSA), and some are just ill advised (DES). A browser can connect to a server using any of the options the server provides. If your site is offering up some ECDH options but also some DES options, your server will connect on either. The simple act of offering up these bad encryption options makes your site, your server, and your users potentially vulnerable. Unfortunately, by default, IIS provides some pretty poor options. Not catastrophic, but definitely not good.

How to See Where You Stand

Before we start, you might want to know where your site stands. Thankfully the good folks at Qualys are providing SSL Labs to all of us free of charge. If you go to https://www.ssllabs.com/ssltest/, you can see exactly how your server is responding to HTTPS requests. You can also see how services you use regularly stack up.

One note of caution here. Just because a site doesn’t receive an A rating doesn’t mean the folks running them are doing a bad job. SSL Labs slams RC4 as a weak encryption algorithm even though there are no known attacks against it. True, it is less resistant to brute force attempts than something like RSA or ECDH, but it isn’t necessarily bad. A site may offer an RC4 connection option out of necessity for compatibility with certain browsers so use the sites rankings as a guideline, not an iron clad declaration of security or lack thereof.

Updating Your Cipher Suite

We’ve covered the background, now let’s get our hands dirty. Updating the suite of options your Windows server provides isn’t necessarily straightforward, but it definitely isn’t hard either.

To start, press Windows Key + R to bring up the “Run” dialogue box. Type “gpedit.msc” and click “OK” to launch the Group Policy Editor. This is where we’ll make our changes.

On the left hand side, expand Computer Configuration, Administrative Templates, Network, and then click on SSL Configuration Settings.

On the right hand side, double click on SSL Cipher Suite Order.

By default, the “Not Configured” button is selected. Click on the “Enabled” button to edit your server’s Cipher Suites.

The SSL Cipher Suites field will fill with text once you click the button. If you want to see what Cipher Suites your server is currently offering, copy the text from the SSL Cipher Suites field and paste it into Notepad. The text will be in one long, unbroken string. Each of the encryption options is separated by a comma. Putting each option on its own line will make the list easier to read.

You can go through the list and add or remove to your heart’s content with one restriction; the list cannot be more than 1,023 characters. This is especially annoying because the cipher suites have long names like “TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384”, so choose carefully. I recommend using the list put together by Steve Gibson over at GRC.com: https://www.grc.com/miscfiles/SChannel_Cipher_Suites.txt.

Once you’ve curated your list, you have to format it for use. Like the original list, your new one needs to be one unbroken string of characters with each cipher separated by a comma. Copy your formatted text and paste it into the SSL Cipher Suites field and click OK. Finally, to make the change stick, you have to reboot.

With your server back up and running, head over to SSL Labs and test it out. If everything went well, the results should give you an A rating.

If you would like something a little more visual, you can install IIS Crypto by Nartac (https://www.nartac.com/Products/IISCrypto/Default.aspx). This application will allow you to make the same changes as the steps above. It also lets you enable or disable ciphers based on a variety of criteria so you don’t have to go through them manually.

No matter how you do it, updating your Cipher Suites is an easy way to improve security for you and your end users.

READ NEXT
  • › How to Disable the Apple Watch’s Always-On Display
  • › How to Back Up Your Stuff and Switch to a New Mac
  • › Is the Mac Pro Overpriced Compared to a PC?
  • › Just Bought a Mac? 14 Essential Apps You Should Install
  • › Why You Should Sign In With Google, Facebook, or Apple
-->

Applies to: Windows Server (Semi-Annual Channel), Windows Server 2019, Windows Server 2016, Windows 10

Windows Ssl Settings Registry

This reference topic for the IT professional contains supported registry setting information for the Windows implementation of the Transport Layer Security (TLS) protocol and the Secure Sockets Layer (SSL) protocol through the Schannel Security Support Provider (SSP).The registry subkeys and entries covered in this topic help you administer and troubleshoot the Schannel SSP, specifically the TLS and SSL protocols.

Caution

This information is provided as a reference to use when you are troubleshooting or verifying that the required settings are applied.We recommend that you do not directly edit the registry unless there is no other alternative.Modifications to the registry are not validated by the Registry Editor or by the Windows operating system before they are applied.As a result, incorrect values can be stored, and this can result in unrecoverable errors in the system.When possible, instead of editing the registry directly, use Group Policy or other Windows tools such as the Microsoft Management Console (MMC) to accomplish tasks.If you must edit the registry, use extreme caution.

CertificateMappingMethods

This entry does not exist in the registry by default.The default value is that all four certificate mapping methods, listed below, are supported.

When a server application requires client authentication, Schannel automatically attempts to map the certificate that is supplied by the client computer to a user account.You can authenticate users who sign in with a client certificate by creating mappings, which relate the certificate information to a Windows user account.After you create and enable a certificate mapping, each time a client presents a client certificate, your server application automatically associates that user with the appropriate Windows user account.

In most cases, a certificate is mapped to a user account in one of two ways:

  • A single certificate is mapped to a single user account (one-to-one mapping).
  • Multiple certificates are mapped to one user account (many-to-one mapping).

By default, the Schannel provider will use the following four certificate mapping methods, listed in order of preference:

  1. Kerberos service-for-user (S4U) certificate mapping
  2. User principal name mapping
  3. One-to-one mapping (also known as subject/issuer mapping)
  4. Many-to-one mapping

Applicable versions: As designated in the Applies To list that is at the beginning of this topic.

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNEL

Ciphers

TLS/SSL ciphers should be controlled by configuring the cipher suite order. For details, see Configuring TLS Cipher Suite Order.

For information about default cipher suites order that are used by the Schannel SSP, see Cipher Suites in TLS/SSL (Schannel SSP).

CipherSuites

Configuring TLS/SSL cipher suites should be done using group policy, MDM or PowerShell, see Configuring TLS Cipher Suite Order for details.

For information about default cipher suites order that are used by the Schannel SSP, see Cipher Suites in TLS/SSL (Schannel SSP).

ClientCacheTime

This entry controls the amount of time that the operating system takes in milliseconds to expire client-side cache entries.A value of 0 turns off secure-connection caching.This entry does not exist in the registry by default.

The first time a client connects to a server through the Schannel SSP, a full TLS/SSL handshake is performed.When this is complete, the master secret, cipher suite, and certificates are stored in the session cache on the respective client and server.

Beginning with Windows Server 2008 and Windows Vista, the default client cache time is 10 hours.

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNEL

Default client cache time

EnableOcspStaplingForSni

Online Certificate Status Protocol (OCSP) stapling enables a web server, such as Internet Information Services (IIS), to provide the current revocation status of a server certificate when it sends the server certificate to a client during the TLS handshake.This feature reduces the load on OCSP servers because the web server can cache the current OCSP status of the server certificate and send it to multiple web clients.Without this feature, each web client would try to retrieve the current OCSP status of the server certificate from the OCSP server.This would generate a high load on that OCSP server.

In addition to IIS, web services over http.sys can also benefit from this setting, including Active Directory Federation Services (AD FS) and Web Application Proxy (WAP).

By default, OCSP support is enabled for IIS websites that have a simple secure (SSL/TLS) binding.However, this support is not enabled by default if the IIS website is using either or both of the following types of secure (SSL/TLS) bindings:

  • Require Server Name Indication
  • Use Centralized Certificate Store

In this case, the server hello response during the TLS handshake won't include an OCSP stapled status by default.This behavior improves performance: The Windows OCSP stapling implementation scales to hundreds of server certificates.Because SNI and CCS enable IIS to scale to thousands of websites that potentially have thousands of server certificates, setting this behavior to be enabled by default may cause performance issues.

Applicable versions: All versions beginning with Windows Server 2012 and Windows 8.

Registry path: [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurityProvidersSCHANNEL]

Add the following key:

'EnableOcspStaplingForSni'=dword:00000001

To disable, set the DWORD value to 0:

'EnableOcspStaplingForSni'=dword:00000000

Note

Enabling this registry key has a potential performance impact.

FIPSAlgorithmPolicy

This entry controls Federal Information Processing (FIPS) compliance.The default is 0.

Applicable versions: All versions beginning with Windows Server 2012 and Windows 8.

Registry path: HKLM SYSTEMCurrentControlSetControlLSA

Windows Server FIPS cipher suites: See Supported Cipher Suites and Protocols in the Schannel SSP. Megaman 8 soundtrack.

Hashes

TLS/SSL hash algorithms should be controlled by configuring the cipher suite order.See Configuring TLS Cipher Suite Order for details.

IssuerCacheSize

This entry controls the size of the issuer cache, and it is used with issuer mapping.The Schannel SSP attempts to map all of the issuers in the client's certificate chain—not only the direct issuer of the client certificate.When the issuers do not map to an account, which is the typical case, the server might attempt to map the same issuer name repeatedly, hundreds of times per second.

To prevent this, the server has a negative cache, so if an issuer name does not map to an account, it is added to the cache and the Schannel SSP will not attempt to map the issuer name again until the cache entry expires.This registry entry specifies the cache size.This entry does not exist in the registry by default.The default value is 100.

Applicable versions: All versions beginning with Windows Server 2008 and Windows Vista.

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNEL

IssuerCacheTime

This entry controls the length of the cache timeout interval in milliseconds.The Schannel SSP attempts to map all of the issuers in the client's certificate chain—not only the direct issuer of the client certificate.In the case where the issuers do not map to an account, which is the typical case, the server might attempt to map the same issuer name repeatedly, hundreds of times per second.

To prevent this, the server has a negative cache, so if an issuer name does not map to an account, it is added to the cache and the Schannel SSP will not attempt to map the issuer name again until the cache entry expires.This cache is kept for performance reasons, so that the system does not continue trying to map the same issuers.This entry does not exist in the registry by default.The default value is 10 minutes.

Applicable versions: All versions beginning with Windows Server 2008 and Windows Vista.

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNEL

KeyExchangeAlgorithm - Client RSA key sizes

This entry controls the client RSA key sizes.

Use of key exchange algorithms should be controlled by configuring the cipher suite order.

Added in Windows 10, version 1507 and Windows Server 2016.

Registry path: HKLMSYSTEMCurrentControlSetControlSecurityProvidersSCHANNELKeyExchangeAlgorithmsPKCS

To specify a minimum supported range of RSA key bit length for the TLS client, create a ClientMinKeyBitLength entry.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to the desired bit length.If not configured, 1024 bits will be the minimum.

To specify a maximum supported range of RSA key bit length for the TLS client, create a ClientMaxKeyBitLength entry.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to the desired bit length.If not configured, then a maximum is not enforced.

KeyExchangeAlgorithm - Diffie-Hellman key sizes

This entry controls the Diffie-Hellman key sizes.

Use of key exchange algorithms should be controlled by configuring the cipher suite order.

Added in Windows 10, version 1507 and Windows Server 2016.

Registry path: HKLMSYSTEMCurrentControlSetControlSecurityProvidersSCHANNELKeyExchangeAlgorithmsDiffie-Hellman

To specify a minimum supported range of Diffie-Helman key bit length for the TLS client, create a ClientMinKeyBitLength entry.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to the desired bit length.If not configured, 1024 bits will be the minimum.

To specify a maximum supported range of Diffie-Helman key bit length for the TLS client, create a ClientMaxKeyBitLength entry.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to the desired bit length.If not configured, then a maximum is not enforced.

To specify the Diffie-Helman key bit length for the TLS server default, create a ServerMinKeyBitLength entry.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to the desired bit length.If not configured, 2048 bits will be the default.

MaximumCacheSize

This entry controls the maximum number of cache elements.Setting MaximumCacheSize to 0 disables the server-side session cache and prevents reconnection.Increasing MaximumCacheSize above the default values causes Lsass.exe to consume additional memory.Each session-cache element typically requires 2 to 4 KB of memory.This entry does not exist in the registry by default.The default value is 20,000 elements.

Applicable versions: All versions beginning with Windows Server 2008 and Windows Vista.

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNEL

Messaging – fragment parsing

This entry controls the maximum allowed size of fragmented TLS handshake messages that will be accepted.Messages larger than the allowed size will not be accepted and the TLS handshake will fail.These entries do not exist in the registry by default.

When you set the value to 0x0, fragmented messages are not processed and will cause the TLS handshake to fail.This makes TLS clients or servers on the current machine non-compliant with the TLS RFCs.

The maximum allowed size can be increased up to 2^24-1 bytes.Allowing a client or server to read and store large amounts of unverified data from the network is not a good idea and will consume additional memory for each security context.

Added in Windows 7 and Windows Server 2008 R2.An update that enables Internet Explorer in Windows XP, in Windows Vista, or in Windows Server 2008 to parse fragmented TLS/SSL handshake messages is available.

Registry path: HKLMSYSTEMCurrentControlSetControlSecurityProvidersSCHANNELMessaging

To specify a maximum allowed size of fragmented TLS handshake messages that the TLS client will accept, create a MessageLimitClient entry.After you have created the entry, change the DWORD value to the desired bit length.If not configured, the default value will be 0x8000 bytes.

To specify a maximum allowed size of fragmented TLS handshake messages that the TLS server will accept when there is no client authentication, create a MessageLimitServer entry.After you have created the entry, change the DWORD value to the desired bit length.If not configured, the default value will be 0x4000 bytes.

To specify a maximum allowed size of fragmented TLS handshake messages that the TLS server will accept when there is client authentication, create a MessageLimitServerClientAuth entry.After you have created the entry, change the DWORD value to the desired bit length.If not configured, the default value will be 0x8000 bytes.

SendTrustedIssuerList

This entry controls the flag that is used when the list of trusted issuers is sent.In the case of servers that trust hundreds of certification authorities for client authentication, there are too many issuers for the server to be able to send them all to the client computer when requesting client authentication.In this situation, this registry key can be set, and instead of sending a partial list, the Schannel SSP will not send any list to the client.

Not sending a list of trusted issuers might impact what the client sends when it is asked for a client certificate.For example, when Internet Explorer receives a request for client authentication, it only displays the client certificates that chain up to one of the certification authorities that is sent by the server.If the server did not send a list, Internet Explorer displays all of the client certificates that are installed on the client.

This behavior might be desirable.For example, when PKI environments include cross certificates, the client and server certificates will not have the same root CA; therefore, Internet Explorer cannot chose a certificate that chains up to one of the server's CAs.By configuring the server to not send a trusted issuer list, Internet Explorer will send all its certificates.

This entry does not exist in the registry by default.

Default Send Trusted Issuer List behavior

Windows versionTime
Windows Server 2012 and Windows 8 and laterFALSE
Windows Server 2008 R2 and Windows 7 and earlierTRUE

Applicable versions: All versions beginning with Windows Server 2008 and Windows Vista.

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNEL

ServerCacheTime

This entry controls the amount of time in milliseconds that the operating system takes to expire server-side cache entries.A value of 0 disables the server-side session cache and prevents reconnection.Increasing ServerCacheTime above the default values causes Lsass.exe to consume additional memory.Each session cache element typically requires 2 to 4 KB of memory.This entry does not exist in the registry by default.

Applicable versions: All versions beginning with Windows Server 2008 and Windows Vista.

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNEL

Default server cache time: 10 hours

SSL 2.0

This subkey controls the use of SSL 2.0.

Beginning with Windows 10, version 1607 and Windows Server 2016, SSL 2.0 has been removed and is no longer supported.For a SSL 2.0 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocols

Windows Ssl Configuration Settings

To enable the SSL 2.0 protocol, create an Enabled entry in either the Client or Server subkey, as described in the following table.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to 1.

SSL 2.0 subkey table

SubkeyDescription
ClientControls the use of SSL 2.0 on the SSL client.
ServerControls the use of SSL 2.0 on the SSL server.

To disable SSL 2.0 for client or server, change the DWORD value to 0.If an SSPI app requests to use SSL 2.0, it will be denied.

To disable SSL 2.0 by default, create a DisabledByDefault entry and change the DWORD value to 1.If an SSPI app explcitly requests to use SSL 2.0, it may be negotiated.

The following example shows SSL 2.0 disabled in the registry:

SSL 3.0

This subkey controls the use of SSL 3.0.

Beginning with Windows 10, version 1607 and Windows Server 2016, SSL 3.0 has been disabled by default.For SSL 3.0 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocols

To enable the SSL 3.0 protocol, create an Enabled entry in either the Client or Server subkey, as described in the following table.
This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to 1.

SSL 3.0 subkey table

SubkeyDescription
ClientControls the use of SSL 3.0 on the SSL client.
ServerControls the use of SSL 3.0 on the SSL server.

To disable SSL 3.0 for client or server, change the DWORD value to 0.If an SSPI app requests to use SSL 3.0, it will be denied.

To disable SSL 3.0 by default, create a DisabledByDefault entry and change the DWORD value to 1.If an SSPI app explicitly requests to use SSL 3.0, it may be negotiated.

The following example shows SSL 3.0 disabled in the registry:

TLS 1.0

This subkey controls the use of TLS 1.0.

For TLS 1.0 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocols

To enable the TLS 1.0 protocol, create an Enabled entry in either the Client or Server subkey as described in the following table.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to 1.

TLS 1.0 subkey table

SubkeyDescription
ClientControls the use of TLS 1.0 on the TLS client.
ServerControls the use of TLS 1.0 on the TLS server.

To disable TLS 1.0 for client or server, change the DWORD value to 0.If an SSPI app requests to use TLS 1.0, it will be denied.

To disable TLS 1.0 by default, create a DisabledByDefault entry and change the DWORD value to 1.If an SSPI app explicitly requests to use TLS 1.0, it may be negotiated.

The following example shows TLS 1.0 disabled in the registry:

TLS 1.1

This subkey controls the use of TLS 1.1.

For TLS 1.1 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocols

To enable the TLS 1.1 protocol, create an Enabled entry in either the Client or Server subkey as described in the following table.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to 1.

TLS 1.1 subkey table

SubkeyDescription
ClientControls the use of TLS 1.1 on the TLS client.
ServerControls the use of TLS 1.1 on the TLS server.

To disable TLS 1.1 for client or server, change the DWORD value to 0.If an SSPI app requests to use TLS 1.1, it will be denied.

To disable TLS 1.1 by default, create a DisabledByDefault entry and change the DWORD value to 1.If an SSPI app explicitly requests to use TLS 1.1, it may be negotiated.

The following example shows TLS 1.1 disabled in the registry:

Windows Enable Ssl

TLS 1.2

This subkey controls the use of TLS 1.2.

For TLS 1.2 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocols

To enable the TLS 1.2 protocol, create an Enabled entry in either the Client or Server subkey as described in the following table.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to 1.

TLS 1.2 subkey table

SubkeyDescription
ClientControls the use of TLS 1.2 on the TLS client.
ServerControls the use of TLS 1.2 on the TLS server.

To disable TLS 1.2 for client or server, change the DWORD value to 0.If an SSPI app requests to use TLS 1.2, it will be denied.

To disable TLS 1.2 by default, create a DisabledByDefault entry and change the DWORD value to 1.If an SSPI app explicitly requests to use TLS 1.2, it may be negotiated.

The following example shows TLS 1.2 disabled in the registry:

DTLS 1.0

This subkey controls the use of DTLS 1.0.

Phylogenetic studies of horse, elephant and other animals show that all these increase in their evolution from simple to complex forms.2. Evidences in favour of Lamarckism:1. Giraffe (Fig. Evolution of life pdf.

For DTLS 1.0 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocols

To enable the DTLS 1.0 protocol, create an Enabled entry in either the Client or Server subkey as described in the following table.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to 1.

DTLS 1.0 subkey table

SubkeyDescription
ClientControls the use of DTLS 1.0 on the DTLS client.
ServerControls the use of DTLS 1.0 on the DTLS server.

To disable DTLS 1.0 for client or server, change the DWORD value to 0.If an SSPI app requests to use DTLS 1.0, it will be denied.

To disable DTLS 1.0 by default, create a DisabledByDefault entry and change the DWORD value to 1.If an SSPI app explicitly requests to use DTLS 1.0, it may be negotiated.

The following example shows DTLS 1.0 disabled in the registry:

DTLS 1.2

This subkey controls the use of DTLS 1.2.

For DTLS 1.2 default settings, see Protocols in the TLS/SSL (Schannel SSP).

Registry path: HKLM SYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocols

To enable the DTLS 1.2 protocol, create an Enabled entry in either the Client or Server subkey as described in the following table.This entry does not exist in the registry by default.After you have created the entry, change the DWORD value to 1.

DTLS 1.2 subkey table

Windows 7 Ssl Settings

SubkeyDescription
ClientControls the use of DTLS 1.2 on the DTLS client.
ServerControls the use of DTLS 1.2 on the DTLS server.

Windows Ssl Settings Windows 10

To disable DTLS 1.2 for client or server, change the DWORD value to 0.If an SSPI app requests to use DTLS 1.0, it will be denied.

Windows 10 Ssl Settings

To disable DTLS 1.2 by default, create a DisabledByDefault entry and change the DWORD value to 1.If an SSPI app explicitly requests to use DTLS 1.2, it may be negotiated.

Microsoft Edge Ssl Settings

The following example shows DTLS 1.1 disabled in the registry: