EX19-ED-000006 - SchUseStrongCrypto must be enabled.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Exchange Server 2019 is configured by default with TLS 1.2. However, SchUseStrongCrypto is not set by default and must be configured to meet the TLS requirement. The strong cryptography (configured by the SchUseStrongCrypto registry value) uses more secure network protocols (TLS 1.2, TLS 1.1, and TLS 1.0) and blocks protocols that are not secure. SchUseStrongCrypto affects only client (outgoing) connections in the application.

Solution

In a PowerShell window with elevated privileges, run the following commands:

reg add HKLM\SOFTWARE\Microsoft\.NetFramework\v4.0.30319 /v 'SchUseStrongCrypto' /t REG_DWORD /d 1

reg add HKLM\SOFTWARE\WoW6432Node\Microsoft\.NetFramework\v4.0.30319 /v 'SchUseStrongCrypto' /t REG_DWORD /d 1

This will create the value within the necessary key and set the data to 1.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Exchange_2019_Y24M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000068, Rule-ID|SV-259577r960759_rule, STIG-ID|EX19-ED-000006, Vuln-ID|V-259577

Plugin: Windows

Control ID: 15a227388ae61165a624bce6eee9aa851b9610b4f282acc7513124105f7c990b