Essentials Server PCI Compliance and TLS 1.0
July 4, 2016 8 Comments
I recently wrote some articles for Third Tier regarding Essentials Servers and TLS 1.0, so if you are looking for guidance on what to do or how to do it, or even what happens when you have found out what to do and then done it. Look no further than the Third Tier blog.
http://www.thirdtier.net/2016/04/what-happens-when-you-disable-tls-1-0/
If you are also interested in SBS 2011 Standard, well then take a look at this.
Hi Robert,
Great article! Thanks for all of your amazing sleuthing on this one.
Just to let you know…
In addition to losing PC client backups when disabling TLS 1.0 on the server, you also lose the ability to install/update any add-ins that have a client-side component to them as well (seeing as the server is no longer able to distribute the client-side component of the add-ins out to the PC clients).
Also, things are no better on the RTM build of Windows Server 2016 Essentials. Out-of-the-box, Server 2016 gets a ‘B’ grade (up from ‘C’ in Server 2012 R2), but disabling TLS 1.0 on the 2016 server has the exact same set of consequences as it does on 2012 R2 servers (i.e. you lose client PC backups and you lose the ability to install/update the client-side component of any installed add-ins).
— MIKE (The Office Maven)
Thank you, I’m aware of a lot the issues with TP5, I have been waiting to get RTM bits as I have been bitten by blogging info based in beta products in the past.
Disabling TLS 1.0 also seems to break the essentials Office 365 integration, the password change notification service doesn’t seem to start. Would we lose any functionality if we just switched to AADConect?
You can’t install it on Essentials sadly.
So is it not possible to disable and have the Office 365 integration working do you know?
What version of .net do you have installed?
4.7.1 I believe, my test vM is patched up to date as well so presume thats either 4.7.1 or 4.7.2.
4.7.1 I believe, my test vM is patched up to date as well so presume thats either 4.7.1 or 4.7.2.