To configure SSL/TLS settings via Registry using GPO, follow these steps:
Step 1: Open Group Policy Management
- Press
Win + R
, typegpedit.msc
, and press Enter to open the Local Group Policy Editor.- If using a domain environment, open Group Policy Management Editor (
gpmc.msc
) and create or edit an existing GPO.
- If using a domain environment, open Group Policy Management Editor (
Step 2: Modify SSL/TLS Settings via Registry using GPO
Since SSL/TLS settings are controlled via the Windows Registry, we will use Group Policy Preferences to apply these registry changes.
1. Navigate to the Registry Settings in GPO
- In Group Policy Management Editor, go to:
- Right-click and select New > Registry Item.
Step 3: Add Registry Keys for SSL/TLS
We will modify Schannel (Secure Channel) settings.
1. Disable TLS 1.0 & 1.1
For TLS 1.0
-
Path:
- Value Name:
Enabled
- Value Type:
REG_DWORD
- Value Data:
0
(Disabled)
- Value Name:
-
Path:
- Value Name:
Enabled
- Value Type:
REG_DWORD
- Value Data:
0
(Disabled)
- Value Name:
For TLS 1.1
-
Path:
- Value Name:
Enabled
- Value Type:
REG_DWORD
- Value Data:
0
(Disabled)
- Value Name:
-
Path:
- Value Name:
Enabled
- Value Type:
REG_DWORD
- Value Data:
0
(Disabled)
- Value Name:
2. Enable TLS 1.2 & TLS 1.3
For TLS 1.2
-
Path:
- Value Name:
Enabled
- Value Type:
REG_DWORD
- Value Data:
1
(Enabled)
- Value Name:
-
Path:
- Value Name:
Enabled
- Value Type:
REG_DWORD
- Value Data:
1
(Enabled)
- Value Name:
For TLS 1.3
-
Path:
- Value Name:
Enabled
- Value Type:
REG_DWORD
- Value Data:
1
(Enabled)
- Value Name:
-
Path:
- Value Name:
Enabled
- Value Type:
REG_DWORD
- Value Data:
1
(Enabled)
- Value Name:
3. Configure SSL Cipher Suites (Optional)
To define SSL/TLS cipher suites, modify the following registry key:
- Path:
- Value Name:
Functions
- Value Type:
REG_SZ
- Value Data: (Example for TLS 1.2 and TLS 1.3)
- Value Name:
Step 4: Apply and Enforce GPO
- Close Group Policy Management Editor.
- Run the following command to apply the policy:
- Restart the computers for the settings to take effect.
Step 5: Verify SSL/TLS Configuration
To check if the settings are applied correctly:
PowerShell: Check Enabled TLS Versions
Open PowerShell (Admin) and run:
It should return:
PowerShell: Check Available Cipher Suites
Run:
This will display the enabled cipher suites.
Conclusion
Now, your system is hardened by: ✅ Disabling weak TLS 1.0 & TLS 1.1
✅ Enabling TLS 1.2 & TLS 1.3
✅ Configuring strong cipher suites via Registry using GPO
This method ensures secure encryption settings are enforced across all systems in your domain.