Securing HTTPS configuration on Windows Server

In this article

    To apply the best practice HTTPS configuration on a Windows server, we can run a Powershell script written by NSM (Nasjonal Sikkerhetsmyndighet). This script will make changes to the Windows registry in order to enable the latest encryption algorithms and disable old and insecure algorithms and ciphers.

    Download the script from NSMs website:

    https://www.nsm.stat.no/globalassets/dokumenter/veiledninger/systemteknisk-sikkerhet/u-03_sikring_av_windows_tls.zip

    Unzip the first ZIP file. Then inside the unpacked directory, unzip the second ZIP file “Schannel.zip”and enter the unpacked directory again. Holding shift and right-clicking gives us a menu where we can open a command window in the current directory. Note: The following must be done with administrator level-access.

    Zip file content

     


    Get a Powershell prompt by typing “powershell”. Then import the NSM Powershell module by entering the following commands:

    Import-Module ‘.\NSM TLS Tools.psm1’ –force

    & ‘.\Apply NSM Schannel Policy.ps1’

     Powershell

    Follow the instructions and the script will check for compliance with recommended settings, backup existing settings to a registry file, change the settings to comply and run a final test.

    To read more about the script, what it does and why, check out the PDF file in the unzipped directory called “U-03_Sikring_av_Windows_TLS.pdf”.