Submit a ticketCall us

Announcing NCM 7.7
With NCM 7.7, you can examine the rules that make up an access control list for a Cisco ASA device. Then you can apply filters to display only rules that meet the specified criteria, order the rules by line number or by the hit count, and much more.
See new features and improvements.

Home > Success Center > Patch Manager > Patch: Disable TLS 1.0 and 1.1 to establish a Patch Manager connection

Patch: Disable TLS 1.0 and 1.1 to establish a Patch Manager connection

Table of contents

Updated May 26, 2017

Overview

This article describes how to disable TLS 1.0 and TLS 1.1 and verify a Patch Manager connection.

Environment

  • Patch Manager 2.0 and later
  • Windows Server 2008 and later

Steps

  1. Perform the steps to disable TLS 1.0 and TLS 1.1 in TLS/SSL Settings (© 2017 Microsoft, available at https://technet.microsoft.com/, obtained on May 25, 2017).
  2. Verify that a connection to TLS 1.2 is established:
    1. Change the SCHANNEL logging to debug, or change the registry key value to 4.
    2. Check the System log in Event Viewer.

Note: Additional Microsoft KB patches may need to be installed for the RDP session to connect.

 

Screenshots property of © 2017 Microsoft.

 

Disclaimer: Please note, any content posted herein is provided as a suggestion or recommendation to you for your internal use. This is not part of the SolarWinds software or documentation that you purchased from SolarWinds, and the information set forth herein may come from third parties. Your organization should internally review and assess to what extent, if any, such custom scripts or recommendations will be incorporated into your environment.  You elect to use third-party content at your own risk, and you will be solely responsible for the incorporation of the same, if any.

 

 

Last modified
19:37, 29 May 2017

Tags

Classifications

Public