mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
TLS changes - ng-jess
This commit is contained in:
parent
5be46b66b4
commit
5f025be739
@ -25,16 +25,24 @@ In enterprise environments, network protection works best with Microsoft Defende
|
||||
|
||||
Transport Layer Security (TLS) is the internet's most deployed security protocol, encrypting data in transit to provide a secure communication channel between two endpoints. Windows defaults to the latest protocol versions and strong cipher suites unless policies are in effect to limit them. There are many extensions available, such as client authentication for enhanced server security and session resumption for improved application performance.
|
||||
|
||||
We have now added support for certificate transparency policy in certificate chain validation. This provides additional protection from trusting mis-issued certificates that have not yet been revoked. When paired with CT log monitoring, it can replace the need for certificate pinning for a domain owner.
|
||||
Additionally, we have disallowed RSA certificates with keys <2048 bits within the Microsoft 3rd party trusted root store for stronger security by default.
|
||||
|
||||
TLS 1.3 is the latest version of the protocol and is enabled by default starting with Windows 11 and Windows Server 2022. TLS 1.3 eliminates obsolete cryptographic algorithms, enhances security over older versions, and encrypts as much of the TLS handshake as possible. The handshake is more performant, with one fewer round trip per connection on average, and supports only five strong cipher suites, which provide perfect forward secrecy and reduced operational risk.
|
||||
TLS 1.3 now includes ephemeral key reuse, which improves performance (especially for high-load TLS servers) and brings it on par with TLS 1.2. The reuse time is 30 seconds by default, but is configurable. We also added the ability to enable/disable specific signature schemes (such as RSA-PSS) per-SNI binding.
|
||||
|
||||
Customers using TLS 1.3 (or Windows components that support it, including HTTP.SYS, WinInet, .NET, MsQuic, and more) will get enhanced privacy and lower latencies for their encrypted online connections. Note that if either the client or server does not support TLS 1.3, Windows will fall back to TLS 1.2.
|
||||
|
||||
Legacy protocol versions TLS 1.0 and 1.1 are officially deprecated and will be disabled by default in future OS versions only. This change will come to Windows Insider Preview in September 2023. Organizations and application developers are strongly encouraged to begin to identify and remove code dependencies on TLS 1.0/1.1 if they have not done so already.
|
||||
Legacy protocol versions TLS 1.0 and 1.1 are officially deprecated and are now disabled by default in Azure Host 2024, but remain enabled in Windows server and client. We are planning to continue this deprecation in RS_prerelease starting July 2024. Organizations and application developers are strongly encouraged to begin to identify and remove code dependencies on TLS 1.0/1.1 if they have not done so already.
|
||||
|
||||
|
||||
|
||||
|
||||
:::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:**
|
||||
|
||||
- [TLS/SSL overview (Schannel SSP)](/windows-server/security/tls/tls-ssl-schannel-ssp-overview)
|
||||
- [TLS 1.0 and TLS 1.1 soon to be disabled in Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/tls-1-0-and-tls-1-1-soon-to-be-disabled-in-windows/bc-p/3894928/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExMM0hCN0VURDk3OU9OfDM4OTQ5Mjh8U1VCU0NSSVBUSU9OU3xoSw#M6180)
|
||||
- [TLS 1.0 and TLS 1.1 deprecation in Windows](https://learn.microsoft.com/en-us/windows/win32/secauthn/tls-10-11-deprecation-in-windows?tabs=registry-editor)
|
||||
|
||||
## Domain Name System (DNS) security
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user