This protocol is not considered cryptographically secure. Disabling it is recommended. This protocol is disabled by default if the registry key is not present. A reboot is required for these changes to be reflected. Disabling weak protocols will help ensure the confidentiality and integrity of in-transit data.