Now you’re less likely to miss what’s been brewing in our knowledge base with this weekly digest
The client and server cannot communicate, because they do not possess a common algorithm.
The following registry keys need to be added on machines where TLS 1.0/1.1 has been disabled to force the usage of TLS 1.2.
Key Location: HKLM\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
Value Name: SchUseStrongCrypto
Value Type: DWORD (32-bit) Value
Value Data: 1
Key Location: HKLM\SOFTWARE\Microsoft\.NETFramework\v4.0.30319
Value Name: SystemDefaultTlsVersions
Value Type: DWORD (32-bit) Value
Value Data: 1
Key Location: HKLM\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v4.0.30319
Value Name: SchUseStrongCrypto
Value Type: DWORD (32-bit) Value
Value Data: 1
Key Location: HKLM\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v4.0.30319
Value Name: SystemDefaultTlsVersions
Value Type: DWORD (32-bit) Value
Value Data: 1
A .reg file is provided by Microsoft that will set these keys to their safest values:
https://docs.microsoft.com/en-us/dotnet/framework/network-programming/tls#configuring-security-via-the-windows-registry
Your feedback has been received and will be reviewed.
Please try again later.
This form is only for KB Feedback/Suggestions, if you need help with the software open a support case
Your feedback has been received and will be reviewed.