{"id":69307,"date":"2017-07-20T09:00:55","date_gmt":"2017-07-20T16:00:55","guid":{"rendered":"http:\/\/blogs.microsoft.com\/microsoftsecure\/?p=69307"},"modified":"2023-05-15T23:11:16","modified_gmt":"2023-05-16T06:11:16","slug":"tls-1-2-support-added-to-windows-server-2008","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/07\/20\/tls-1-2-support-added-to-windows-server-2008\/","title":{"rendered":"TLS 1.2 Support added to Windows Server 2008"},"content":{"rendered":"
This post is authored by Arden White, Senior Program Manager, Windows Servicing and Delivery.<\/em><\/p>\n As a follow-up to our announcement regarding TLS 1.2 support at Microsoft<\/a> we are announcing that support for TLS1.1\/TLS 1.2 on Windows Server 2008 is now available for download as of July 18th, 2017. We\u2019re offering this support in recognition that our customers have a strong demand for support for these newer protocols in their environment and in recognition of the extended lifetime of Windows Server 2008 under the Windows Server Premium Assurance offering.<\/p>\n This update for Windows Server 2008 will include support for both TLS 1.1 and TLS 1.2. For application compatibility purposes, these protocols will be disabled by default in a manner similar to the TLS 1.1\/TLS 1.2 support that was disabled by default in Windows 7 and Windows Server 2008 R2. After downloading and installing the update these protocols can be enabled by setting the registry keys described in KB4019276<\/a>.<\/p>\n This update is being made available on the following timeline:<\/p>\n We are announcing that support for TLS1.1\/TLS 1.2 on Windows Server 2008 is now available for download as of July 18th, 2017.<\/p>\n","protected":false},"author":49,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3663],"topic":[3687],"products":[],"threat-intelligence":[3739],"tags":[3819],"coauthors":[1957],"class_list":["post-69307","post","type-post","status-publish","format-standard","hentry","content-type-research","topic-threat-intelligence","threat-intelligence-vulnerabilities-and-exploits","tag-windows"],"yoast_head":"\n\n\n
\n Release Date<\/strong><\/td>\n Channels<\/strong><\/td>\n Classification<\/strong><\/td>\n<\/tr>\n \n July 18, 2017<\/td>\n Microsoft Catalog<\/td>\n <\/td>\n<\/tr>\n \n August 15, 2017<\/td>\n Windows Update\/WSUS\/Catalog<\/td>\n Optional<\/td>\n<\/tr>\n \n September 12, 2017<\/td>\n Windows Update\/WSUS\/Catalog<\/td>\n Recommended<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"