Objective
How to enable TLS 1.2 on a Windows 7 SVP to ensure that it will continue to function after TLS 1.0 and 1.1 are disabled on the HRO endpoints.
Download (right click -> Save As) the registry file or create your own with the following keys:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client]
"DisabledByDefault"=dword:00000000
"Enabled"=dword:00000001
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server]
"DisabledByDefault"=dword:00000000
"Enabled"=dword:00000001
Copy the file to the Site Manager Server and the SVP or on a Standalone SVP.
Double click to open registry file.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2
Verify the both Client and Server are installed using regedit:
Stop the SVP Agent Service , and if applicable, the Site Manager Service and click the Apply button
Exit out of Remote Ops SVP Agent
Open <SVP Agent Install Media>\Service Processor Agent\ and run dotNetFx46_full_x86_x64.exe as Administrator
Run a Repair of .NET 4.6
Note: See Additional Notes if there is an error
Reboot the Site Manager Server and the SVP, and/or the standalone SVP.
Validate the SVP Agent Service , and if applicable, the Site Manager Service are Running.
Attachment: 7374_20240807162427_240417000240668.reg
Tags: Hi-track,SVP,TLS,Hitrack,svp agent,TLS 1.2,Remote Ops
PageID: 159073