TLS Hardening
Warning
Don't use deprecated TLS versions, such as 1.0 and 1.1, or weak cipher suites, such as RC4 or 3DES.
Test your TLS security using a third-party tool or by running the following command:
nmap --script ssl-enum-ciphers -p 443 {your.domain.com}
These instructions apply to both the Gateway (HTTPS/WSS) and the Media Server (TURNS).
Do the following to harden your TLS security on Windows:
Ensure Windows is updated with the latest official patches.
Turn off weak cipher suites:
- Click Start > Edit Group Policy.
- Go to Local Computer Policy > Computer Configuration > Administrative Templates > Network > SSL Configuration Settings.
- Double-click SSL Cipher Suite Order.
- Select Enabled.
- Set SSL Cipher Suites to a comma-delimited list of strong cipher suites that are valid for your operating system. For example:
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- Restart Windows.
To verify, open PowerShell and run the following command:
PS C:\Users\Administrator> Get-TlsCipherSuite | Format-Table Name
The output should look like the following:
Name ---- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384