Company is asking us to make the following changes to minimize vulnerabilities tied to ransomware exploits
1. Disable the use of TLSv1.0 protocol in favor of a cryptographically stronger protocol such as TLSv1.2.
2. Disable and stop using DES, 3DES, IDEA or RC2 ciphers
3. RC4 should not be used where possible
Could you please let us know how we can make these change? Also, would these change limit any capabilities of the tool?
Release : 4.9.1
Component : CA Test Data Manager - Others
N/A
Please open a support case and ask for the latest TDM Portal patch.
The latest TDM Portal patch uses a java version that will not accept TLS lower than 1.2
The latest patch is available from: TDM Support Patches