Disable TLS 1.0, 1.1, 1.3 and only use TLS 1.2 on DLP detection servers.
Release: DLP 15.8, 16.0.0, 16.0.1 (RU1), 16.0.2 (RU2)
Deprecation of TLS 1.0 and 1.1.
TLS 1.3 is not yet supported.
In the java.security file, add TLSv1, TLSv1.1 and TLSv1.3 to the "jdk.tls.disabledAlgorithms" line.
Then recycle services after editing the file.
Default location of the java.security file is:
Windows:
Linux:
Example:
jdk.tls.disabledAlgorithms=SSLv3, RC4, MD5withRSA, DH keySize < 1024, \ EC keySize < 224, DES40_CBC, RC4_40, 3DES_EDE_CBC, TLSv1, TLSv1.1, TLSv1.3
After recycling services, test and verify the connection no longer uses TLSv1 or TLSv1.1 or TLSv1.3
Use the openssl command as shown here: