A cloud-native solution that protects workloads across hybrid and multi-cloud environments with threat detection and security recommendations
Hello Laura Hodge,
This recommendation is checking OS-level configuration rather than how your application negotiates TLS.On Windows Server 2019, TLS 1.2 is already available, but the policy requires older protocols to be explicitly disabled. If TLS 1.0 or TLS 1.1 are still enabled in the registry, the recommendation will remain non-compliant.
Please check: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols
Ensure TLS 1.0 and TLS 1.1 (both Client and Server) are set with Enabled=0 and DisabledByDefault=1, and TLS 1.2 is set with Enabled=1 and DisabledByDefault=0.
Also verify: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319 HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319
Set SchUseStrongCrypto=1 and SystemDefaultTlsVersions=1.
After making these changes, restart the server and allow some time for Defender for Cloud to refresh the status.
In short, even though your setup is already using modern TLS, the policy requires these settings to be explicitly defined in the registry to be considered compliant.
Hope this helps! Feel free to reach out for further queries.