7.2 Ensure SSLv2 is disabled

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

This protocol is not considered cryptographically secure. Disabling it is recommended. This protocol is disabled by default if the registry key is not present. A reboot is required for these changes to be reflected.
Rationale:
Disabling weak protocols will help ensure the confidentiality and integrity of in-transit data.

Solution

Perform the following to disable SSL 2.0:
1. If the following key is not present, SSL 2.0 is disabled. You can delete the key to disable the protocol. If you delete the key, steps 2 and 3 are not necessary.
HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0
2. If the key exists, set it to 0.
HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server\Enabled
Default Value:
Enabled

See Also

https://workbench.cisecurity.org/files/2220

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CSCv7|14.4

Plugin: Windows

Control ID: 3199fa80664f4924196060ffcf08da131efce554679682ede236782b51780049