<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.moonlightdesign.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Stevenlawrance</id>
	<title>Moonlight Design - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.moonlightdesign.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Stevenlawrance"/>
	<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/Special:Contributions/Stevenlawrance"/>
	<updated>2026-05-15T10:56:44Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2292</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2292"/>
		<updated>2026-05-11T21:55:19Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: Removed the guest wireless reference, and updated Henry&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
Welcome to Moonlight Design -- the personal web site of [[Henry Lamb]] and [[Steven Lawrance]]&lt;br /&gt;
&lt;br /&gt;
==Henry Lamb==&lt;br /&gt;
[[Henry Lamb]] is working on becoming a licensed psychologist.&lt;br /&gt;
&lt;br /&gt;
==Steven Lawrance==&lt;br /&gt;
[[Steven Lawrance]] is a [https://en.wikipedia.org/wiki/Software_engineering software engineer] and [https://en.wikipedia.org/wiki/Open-source_software open-source software enthusiast] trained at [http://www.mse.cs.cmu.edu/ Carnegie Mellon University] and business administration at [https://www.bryant.edu/ Bryant University]&lt;br /&gt;
&lt;br /&gt;
[[Steven Lawrance#Software Project Experience|View the list of software that Steven has either written or contributed to]]&lt;br /&gt;
&lt;br /&gt;
|valign=&amp;quot;top&amp;quot; width=&amp;quot;25%&amp;quot;|&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://www.moonlightdesign.org/urllock/ IE URL Lock]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://gnucashtoqif.us/ GnuCashToQIF]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;4&amp;quot;&amp;gt;[[TLS-SSL-Protocols|TLS/SSL Protocol Group Policy Template]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[https://www.moonlightdesign.org/dirlist DirList] [[CompactOnDelete]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[[PortProxy]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Serendipity|Team Serendipity]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Disk Imager]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[[ScreenWindowX]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[https://www.moonlightdesign.org/kjmouse/ KJMouse]&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2289</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2289"/>
		<updated>2017-12-03T20:25:03Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
Welcome to Moonlight Design -- the personal web site of [[Henry Lamb]] and [[Steven Lawrance]]&lt;br /&gt;
&lt;br /&gt;
==Henry Lamb==&lt;br /&gt;
[[Henry Lamb]] is a psychology masters student at [https://www.ggu.edu Golden Gate University].&lt;br /&gt;
&lt;br /&gt;
==Steven Lawrance==&lt;br /&gt;
[[Steven Lawrance]] is a [https://en.wikipedia.org/wiki/Software_engineering software engineer] and [https://en.wikipedia.org/wiki/Open-source_software open-source software enthusiast] trained at [http://www.mse.cs.cmu.edu/ Carnegie Mellon University] and business administration at [https://www.bryant.edu/ Bryant University]&lt;br /&gt;
&lt;br /&gt;
[[Steven Lawrance#Software Project Experience|View the list of software that Steven has either written or contributed to]]&lt;br /&gt;
&lt;br /&gt;
|valign=&amp;quot;top&amp;quot; width=&amp;quot;25%&amp;quot;|&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://www.moonlightdesign.org/urllock/ IE URL Lock]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://gnucashtoqif.us/ GnuCashToQIF]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;4&amp;quot;&amp;gt;[[TLS-SSL-Protocols|TLS/SSL Protocol Group Policy Template]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[https://www.moonlightdesign.org/dirlist DirList] [[CompactOnDelete]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[[PortProxy]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Serendipity|Team Serendipity]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Disk Imager]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[[ScreenWindowX]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[https://www.moonlightdesign.org/kjmouse/ KJMouse]&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;small&amp;gt;[https://www.moonlightdesign.org/wireless/ Guest wireless network sign-up] (local network only)&amp;lt;/small&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2288</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2288"/>
		<updated>2015-12-07T01:37:48Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Configure Without Group Policies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page also includes registry merge files for convenience.&lt;br /&gt;
&lt;br /&gt;
==Configure With Group Policies==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can theoretically improve security further, but when this was tested in Windows 8 with Internet Explorer 11, Internet Explorer 11 wouldn&#039;t start up successfully until TLS 1.0 was enabled in Schannel. As a result, TLS 1.0 will need to be left enabled in Windows Schannel, even if it&#039;s disabled in Internet Explorer.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS1-1.2.reg Recommended: TLS 1.2, 1.1, and 1.0]&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS1.2.reg Windows 7 Best Security: TLS 1.2 only]&lt;br /&gt;
**A shrinking number of web sites on the Internet won&#039;t work with this configuration.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS1-1.2.reg Windows 7 Good Security: TLS 1.2 and 1.1]&lt;br /&gt;
**A shrinking number of web sites on the Internet won&#039;t work with this configuration.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-Vista-XP.reg Windows Vista/XP: TLS 1.0 Only]&lt;br /&gt;
**Don&#039;t use this on Windows 7, Windows Server 2008 R2, or newer as it disables TLS 1.1 and TLS 1.2 in Internet Explorer.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Insecure.reg Insecure: SSL 3.0 and TLS 1.0]&lt;br /&gt;
**Don&#039;t use this unless if absolutely necessary. This configuration opens up your https connections to attack and should be considered equivalent to having no encryption.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Highly-Insecure.reg Highly Insecure: SSL 3.0 only]&lt;br /&gt;
**Don&#039;t use this unless if absolutely necessary. This configuration opens up your https connections to attack and should be considered equivalent to having no encryption.&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Steven_Lawrance&amp;diff=2287</id>
		<title>Steven Lawrance</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Steven_Lawrance&amp;diff=2287"/>
		<updated>2015-06-06T15:12:09Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Software that I created */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Welcome to the web site of &#039;&#039;&#039;Steven Lawrance&#039;&#039;&#039;, [http://www.mse.cs.cmu.edu/ master of software engineering (MSE)]. I enjoy building complete computing solutions at all levels of abstraction to automate business processes at a low cost, in a short time frame, and with high quality. Put my experience, interests, training, and expertise to work for you. Please feel free to [mailto:steven@moonlightdesign.org contact me today].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;table style=&amp;quot;text-align: left;&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;5&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color: rgb(240, 240, 240); border: 2px solid rgb(90, 90, 90); padding: 3px;&amp;quot;&amp;gt;&amp;lt;big&amp;gt;[[Steven Lawrance#Team software|Software Built in a Team]]&amp;lt;/big&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color: rgb(240, 240, 240); border: 2px solid rgb(90, 90, 90); padding: 3px;&amp;quot;&amp;gt;&amp;lt;big&amp;gt;[[Steven Lawrance#Software that I created|Software Built by Just Me]]&amp;lt;/big&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color: rgb(240, 240, 240); border: 2px solid rgb(90, 90, 90); padding: 3px;&amp;quot;&amp;gt;&amp;lt;big&amp;gt;[[Steven Lawrance#Employment History|Employment History]]&amp;lt;/big&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color: rgb(240, 240, 240); border: 2px solid rgb(90, 90, 90); padding: 3px;&amp;quot;&amp;gt;&amp;lt;big&amp;gt;[[Steven Lawrance#Education and Training|Education and Training]]&amp;lt;/big&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Résumé:&#039;&#039;&#039; [https://www.moonlightdesign.org/steve/resume.pdf Portable document format (PDF)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Network:&#039;&#039;&#039; [http://www.linkedin.com/in/meowmeow LinkedIn]&lt;br /&gt;
&lt;br /&gt;
Please feel free to ask me for more information about any project listed on this page.&lt;br /&gt;
&lt;br /&gt;
==Software Project Experience==&lt;br /&gt;
&lt;br /&gt;
===Team software===&lt;br /&gt;
I materially participated in the team software projects listed below:&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;software sortable&amp;quot;&lt;br /&gt;
!Name&lt;br /&gt;
!Description&lt;br /&gt;
!Technologies&lt;br /&gt;
!SLOC&lt;br /&gt;
!Year&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.salesforce.com/ Salesforce.com]||Web-based business software platform and suite of integrated business applications. During my time at Salesforce.com, I have worked on several teams -- API, Force.com Sites, Site.com, and Platform Security. Most recently, I led the implementation of custom https domains for Salesforce&#039;s site technologies, and this included tangential work, such as the domain management screens that were added in Summer &#039;14. I&#039;ve been a go-to person for several parts of the platform, and this includes Force.com Sites, the database tier of Site.com, site publishing, custom https domains, clickjack protection, inbound and outbound https connections, the reverse proxy caching layer for sites, IPv6, and our main production feature testing tool.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;At Salesforce.com&#039;s Dreamforce 2013 conference, I presented a [http://www.youtube.com/watch?v=Z7L1pSfcCJc session on the lessons learned while developing a Force.com solution] to replace an older Microsoft Access solution for the San Francisco AIDS Foundation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Earlier at Salesforce.com, I integrated the low-level parts of Siteforce into the core Salesforce.com product; wrote Siteforce&#039;s Resin and runtime server configurations; wrote a [http://en.wikipedia.org/wiki/Cross-site_scripting cross site scripting] [http://en.wikipedia.org/wiki/Mozilla_Firefox Firefox]/[http://en.wikipedia.org/wiki/Firebug_(Firefox_extension) Firebug] extension to test proper output escaping in the manual and automated tests; improved an internal production testing tool&#039;s scheduling of tests by adding prerequisite expressions to increase test parallelization; and added per-window screenshots to an internal testing tool by extending Selenium with JNI native code.||{{Tech:Java}}, {{Tech:Ant}}, {{Tech:Selenium}}, {{Tech:JUnit}}, {{Tech:Salesforce.com}}, {{Tech:Jetty}}, {{Tech:Resin}}, {{Tech:JSP}}, {{Tech:Servlet}}, {{Tech:JNI}}, {{Tech:Win32}}, {{Tech:X11}}||large||2007-current&lt;br /&gt;
|-&lt;br /&gt;
|[[Reggie/CIS]]||A 200-user multi-tenant three-tiered HIV/AIDS client database system that was used by all Ryan White Foundation CARE-funded AIDS service organizations in San Francisco in collaboration with the [http://www.sfdph.org/ San Francisco Department of Public Health (DPH)] [http://www.sfdph.org/PHP/HIVHlthSvc.htm AIDS Office] and two partners to the [http://www.sfaf.org/ San Francisco AIDS Foundation (SFAF)], where I worked for about five years. I actively maintained this system with a colleague at the DPH AIDS Office and was principally responsible for maintaining the &amp;quot;CIS&amp;quot; portion of Reggie/CIS, which extended the Reggie platform with extra features that the SFAF and two other organizations used.||{{Tech:Java}}, {{Tech:VBScript}}, {{Tech:Swing}}, {{Tech:T-SQL}}, {{Tech:MS SQL Server}}, {{Tech:CVS}}, {{Tech:JavaScript}}, {{Tech:C}}, {{Tech:JNI}}, {{Tech:CORBA}}, {{Tech:IIS}}, {{Tech:COM}}, {{Tech:Win32}}||162,005||2000-2005&lt;br /&gt;
|-&lt;br /&gt;
|[[DonorPerfect Online]]||Donor and fundraising event management system used by the San Francisco AIDS Foundation. I migrated [http://www.aidslifecycle.org/index.html AIDS/LifeCycle] data from a [http://www.goldmine.com/micro.aspx?id=4398 Goldmine] database to the [http://www.sfaf.org/ San Francisco AIDS Foundation&#039;s] customized [http://www.donorperfect.com/ DonorPerfect Online] system using a [http://en.wikipedia.org/wiki/Test_driven_development test-driven development process] for the SQL scripts. I also contributed substantially to the bulk data entry wizard, fixed bugs throughout the system, including security holes, made all pages and [http://en.wikipedia.org/wiki/Javascript JavaScripts] operate properly in [http://en.wikipedia.org/wiki/Firefox Mozilla Firefox], and implemented strict URL filtering security using an [http://httpd.apache.org/ Apache] [http://en.wikipedia.org/wiki/Reverse_proxy reverse-proxy] and [http://en.wikipedia.org/wiki/Mod_rewrite mod_rewrite].||{{Tech:VBScript}}, {{Tech:T-SQL}}, {{Tech:MS SQL Server}}, {{Tech:JavaScript}}, {{Tech:Apache}}, {{Tech:IIS}}, {{Tech:CVS}}||97,592||2004-2005&lt;br /&gt;
|-&lt;br /&gt;
|[[SFAF CRM]]||Customer relationship management system that was implemented by a colleague at the [http://www.sfaf.org/ San Francisco AIDS Foundation] that primarily serves the organization&#039;s [http://www.sfaf.org/volunteer/ volunteer based programs department], automates expense reports, and runs the [http://www.aidshotline.org/ California AIDS Hotline]. I enhanced the deployment system using [http://en.wikipedia.org/wiki/Concurrent_Versions_System CVS] in a web-based front-end, helped my colleague fix various bugs, and enhanced its Internet-facing security with an [http://httpd.apache.org/ Apache] [http://en.wikipedia.org/wiki/Reverse_proxy reverse-proxy] and [http://en.wikipedia.org/wiki/Mod_rewrite mod_rewrite].||{{Tech:VBScript}}, {{Tech:T-SQL}}, {{Tech:MS SQL Server}}, {{Tech:JavaScript}}, {{Tech:Apache}}, {{Tech:IIS}}, {{Tech:CVS}}||69,015||2001-2005&lt;br /&gt;
|-&lt;br /&gt;
|[[Serendipity|Bosch Security Configuration Assistant]]||An Eclipse-based application that generates three-dimensional security plans for buildings using a rule engine and three-dimensional visualization. In this project, I integrated a Windows-based three-dimensional visualization program into an Eclipse view, kept our RedHat Fedora Core server and software available, secure, usable, and backed up using only one hour per week of my time on average throughout the project, and automated our data collection and reporting processes to minimize project overhead work. This group project involved four other students -- two whom also work at Salesforce.com -- and served as a laboratory for us to directly apply coursework to a software project with a real client throughout our software engineering masters&#039; programs.||{{Tech:Java}}, {{Tech:Eclipse}}, {{Tech:UML}}, {{Tech:Ant}}, {{Tech:Bugzilla}}, {{Tech:CruiseControl}}, {{Tech:MediaWiki}}, {{Tech:Subversion}}, {{Tech:SWT}}, {{Tech:C++}}, {{Tech:JNI}}, {{Tech:Win32}}||21,274||2005-2006&lt;br /&gt;
|-&lt;br /&gt;
|[[Park &#039;N Park]]||A fault-tolerant, distributed, real-time three-tiered application for tracking parking garage usage. This was an academic project.||{{Tech:Java}}, {{Tech:CORBA}}, {{Tech:MySQL}}, {{Tech:CVS}}||2,027||2006&lt;br /&gt;
|-&lt;br /&gt;
|[[Teacher&#039;s Pet]]||Shares a tab in your Mozilla Firefox browser with one or more remote browsers, which can be useful in virtual classroom environments||{{Tech:JavaScript}}, {{Tech:Java}}, {{Tech:XUL}}, {{Tech:XPCOM}}, {{Tech:Subversion}}||1,251||2006&lt;br /&gt;
|-&lt;br /&gt;
|[[Hulk]]||Physically navigates a maze using a customized {{Tech:Boe-Bot}}. This project involved both custom hardware and custom software as well as trade-offs between the two when implementing features.||{{Tech:BASIC Stamp}}, {{Tech:Boe-Bot}}, {{Tech:Subversion}}||784||2006&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/urllock/Configuration_editor URL Lock]||Follow-up project to [http://www.moonlightdesign.org/urllock/ IE URL Lock] that sports a configuration user interface and implements new ideas for visually disabling content on the web||{{Tech:JavaScript}}, {{Tech:XUL}}, {{Tech:C++}}, {{Tech:XPCOM}}, {{Tech:Win32}}, {{Tech:Subversion}}||3,868||2006&lt;br /&gt;
|-&lt;br /&gt;
|[[Ariesbase]]||Intranet system for Ariesnet, Inc. During the Summer of 1999, I helped shape the back-end functionality, such as the security system and global includes, and I also created a high-level specification for an employee rating system for virtual team environments.||{{Tech:PHP}}, {{Tech:MySQL}}, {{Tech:JavaScript}}, {{Tech:CVS}}||medium||1999-2000&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Software that I created===&lt;br /&gt;
I wrote and maintain the following software:&lt;br /&gt;
{|class=&amp;quot;software sortable&amp;quot;&lt;br /&gt;
!Name&lt;br /&gt;
!Description&lt;br /&gt;
!Technologies&lt;br /&gt;
!SLOC&lt;br /&gt;
!Year&lt;br /&gt;
|-&lt;br /&gt;
|[[Home Profiler]]||Synchronizes user profile data between multiple desktop computers, regardless of the operating system. This was used at the [http://www.sfaf.org/ San Francisco AIDS Foundation] to migrate user profile data from Windows NT to Windows XP while leaving malware and spyware behind.||{{Tech:Java}}, {{Tech:C}}, {{Tech:JNI}}, {{Tech:JACOB}}, {{Tech:COM}}, {{Tech:Win32}}, {{Tech:CVS}}||5,679||2005&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/urllock/ IE URL Lock]||A browser helper object (BHO) that prevents users from navigating to web sites in Internet Explorer and Windows Explorer while permitting URLs that match a Perl-compatible regular expression stored in the registry||{{Tech:C++}}, {{Tech:COM}}, {{Tech:BHO}}, {{Tech:Win32}}, {{Tech:Subversion}}||1,607||2005-2012&lt;br /&gt;
|-&lt;br /&gt;
|[[Backup system]]||Multi-platform, SSH-secured, Internet-based incremental backup system that I assembled and use to back up all computers that I manage||{{Tech:Unison}}, {{Tech:Apache}}, {{Tech:OpenSSH}}|| ||2005-2007&lt;br /&gt;
|-&lt;br /&gt;
|[[Read-only filesystem]]|||FUSE filesystem view that makes all files unconditionally read-only. I use this in my [[Backup system|backup system]] for the web-based file restore interface.||{{Tech:C}}, {{Tech:Fuse}}||241||2005-2007&lt;br /&gt;
|-&lt;br /&gt;
|[[Serendipity Time Tracking Tool]]||A two-tier software team time tracking tool used by [[Serendipity|Team Serendipity]] while designing and building the [[Serendipity|Bosch Security Configuration Assistant]]. It was rapidly developed using Microsoft Access 2003 as the front-end user interface, MySQL 5 as the back-end database, and SSH as the MySQL connection tunnel.||{{Tech:VBA}}, {{Tech:Microsoft Access}}, {{Tech:MySQL}}, {{Tech:OpenSSH}}||small||2006&lt;br /&gt;
|-&lt;br /&gt;
|[https://gnucashtoqif.us/ GnuCash to QIF]||Converts a GnuCash XML file into a QIF or an IIF file||{{Tech:Java}}, {{Tech:Xerces}}||2,274||2002-2007&lt;br /&gt;
|-&lt;br /&gt;
|[[PDF Access Reports]]||Web-based PDF reports using Microsoft Access, a customized PHP build to run as a COM server, and a custom-built COM object for use by ASP on the reporting server. This was a component of [[Reggie/CIS|Reggie/CIS&#039;s]] reporting system.||{{Tech:PHP}}, {{Tech:COM}}, {{Tech:C++}}, {{Tech:Sockets}}, {{Tech:VBA}}, {{Tech:ASP}}, {{Tech:Access}}||651||2002-2005&lt;br /&gt;
|-&lt;br /&gt;
|[[PDFFile and InvokeAsUser]]||Enables easy portable document format (PDF) file generation on Windows computers when used with AFPL GhostScript and RedMon||{{Tech:C}}, {{Tech:Win32}}||396||2005&lt;br /&gt;
|-&lt;br /&gt;
|[[SFAF VPN Client]]||Connects a [http://en.wikipedia.org/wiki/Microsoft_windows Microsoft Windows] 2000 or XP computer to the [http://www.sfaf.org/ San Francisco AIDS Foundation&#039;s] [http://en.wikipedia.org/wiki/Vpn virtual private network (VPN)] by using the built-in [http://en.wikipedia.org/wiki/Ipsec IPsec] and [http://en.wikipedia.org/wiki/Pptp PPTP] capabilities in Windows. Each client computer is secured with a machine-unique [http://en.wikipedia.org/wiki/Public-key_cryptography public/private key], and users are authenticated against the [http://en.wikipedia.org/wiki/Windows_Server_domain NT domain] using PPTP over the IPsec connection.||{{Tech:C}}, {{Tech:Win32}}, {{Tech:Java}}, {{Tech:Swing}}, {{Tech:CVS}}||2,623||2003-2005&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/thunderforce/shared/Door%20lock%20example/ Door Lock]||Specification (not an implementation) of a secure residential door real-time, embedded software system that uses electronic locks, secure entry, easy exiting, and alarm state awareness to securely and efficiently manage a door||{{Tech:Javelin}}||0||2006&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/steve/SpellChecker.pdf Swing Inline Spell Checker]||Inline spell checker that plugs into Swing&#039;s look-and-feel system. This was used in [[Reggie/CIS]] as its distributed spell checker with [http://aspell.net/ GNU Aspell] running on the server.||{{Tech:Java}}, {{Tech:Swing}}, {{Tech:CORBA}}, {{Tech:Aspell}}||2,859||2002-2005&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/dirlist/ DirList]||User directory system that runs as a CGI to serve up user lists, search, and synchronize with the operating system&#039;s user database. When used with [http://www.moonlightdesign.org/dirlist DirList2ODBC], the ODBC driver that I wrote for DirList2, the entire DirList2 system becomes a [http://en.wikipedia.org/wiki/Sql structured query language (SQL)]-compliant database system within the limits of the [https://www.moonlightdesign.org/dirlist/doc/server/ DirList2 Server]. This project began in January of 1998 and is actively patched for any security issues that arise. [http://www.bryant.edu/ Bryant University] continues to use this program for their [http://web.bryant.edu/forhelp/pointer.html student web site list].||{{Tech:C++}}, {{Tech:C}}, {{Tech:Sockets}}, {{Tech:ODBC}}, {{Tech:Linux}}, {{Tech:Win32}}, {{Tech:VBA}}, {{Tech:Access}}||8,268||1999-2007&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/dirlist/ DirList2ODBC]||[http://en.wikipedia.org/wiki/Odbc ODBC] 2.0 compliant driver written for the [https://www.moonlightdesign.org/dirlist/ DirList] server. This driver is primarily used with [http://en.wikipedia.org/wiki/Microsoft_access Microsoft Access], but can also be used from other ODBC client applications, such as [http://en.wikipedia.org/wiki/Spss SPSS].||{{Tech:C++}}, {{Tech:Win32}}, {{Tech:Sockets}}, {{Tech:ODBC}}||12,671||1999-2000&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/pam-cuecat/ PAM CueCat Module]||Turns the CueCat barcode scanner into a pluggable authentication module (PAM) library, permitting logins with bar code scans||{{Tech:C}}, {{Tech:PAM}}, {{Tech:Linux}}, {{Tech:CueCat}}||285||2000&lt;br /&gt;
|-&lt;br /&gt;
|[[Home Control]]||The project that marked my first significant work towards complete home and office automation systems||{{Tech:C}}, {{Tech:Win32}}, {{Tech:Serial}}, {{Tech:CP290}}||2,270||1996,1998&lt;br /&gt;
|-&lt;br /&gt;
|[[ResNet Online]]||I rewrote the old site for ease of use with more capabilities. Automatic port registration and heavy database integration saved the ResNet program a substantial amount of time while greatly improving customer/student satisfaction.||{{Tech:PHP}}, {{Tech:SNMP}}, {{Tech:MySQL}}, {{Tech:PHPLib}}||4,572||1999-2001&lt;br /&gt;
|-&lt;br /&gt;
|[[FAT Recover]]||Manual FAT filesystem recovery tool that I made to help with manual floppy disk recoveries and to salvage my dad&#039;s laptop when Windows totally crashed||{{Tech:C}}, {{Tech:Linux}}||246||2000&lt;br /&gt;
|-&lt;br /&gt;
|[[Bryant PRIDE web site]]||Web site for the [http://web.bryant.edu/~pride/ Bryant PRIDE] LGBT group. In the Fall of 1997, when I was a freshman at [http://www.bryant.edu/ Bryant University], I greatly enhanced the web site with several pages and JavaScripts. This also included a JavaScript-driven background {{Tech:MIDI}} music jukebox in a [http://en.wikipedia.org/wiki/Pop-under pop-under], which was unique for a web site at that time. While I was the web site&#039;s maintainer, it moved from static {{Tech:HTML}} to {{Tech:ASP}} and then to {{Tech:PHP}}.||{{Tech:JavaScript}}, {{Tech:PHP}}, {{Tech:VBScript}}, {{Tech:ASP}}||3,681||1997-2000&lt;br /&gt;
|-&lt;br /&gt;
|[[ActiveMail]]||Provides SMTP email sending, POP3 email downloading, and FTP authentication services to {{Tech:ASP}}, {{Tech:VisualBasic}}, and other {{Tech:COM}}-consuming programs||{{Tech:C++}}, {{Tech:COM}}, {{Tech:Win32}}, {{Tech:VisualBasic}}||4,691||1998-2000&lt;br /&gt;
|-&lt;br /&gt;
|[[CPU ID]]||A very simple program that displays information about the CPU that it happens to execute on||{{Tech:C}}, {{Tech:x86 Assembler}}, {{Tech:Win32}}||111||1999&lt;br /&gt;
|-&lt;br /&gt;
|[[Disk Imager]]||Reads, writes, verifies, and erases entire disks into/from [http://en.wikipedia.org/wiki/Disk_image raw image files]. This is similar in principle to [http://www.tux.org/pub/dos/rawrite/ rawrite.exe], but Disk Imager implements a graphical user interface.||{{Tech:C}}, {{Tech:Win32}}||520||1998&lt;br /&gt;
|-&lt;br /&gt;
|[[EzMIDI32]]||A 32-bit version of the ScreenWindow+EasyMIDI libraries that I wrote for Grapevine High School||{{Tech:C++}}, {{Tech:Win32}}||854||1998&lt;br /&gt;
|-&lt;br /&gt;
|[[LPD]]||Written for the [http://www.gcisd-k12.org/ Grapevine-Colleyville Independent School District (GCISD)] to allow employees to send [http://en.wikipedia.org/wiki/AS/400 AS/400] printouts to their local Windows printers. I wrote the piece that translates HP DeskJet 500 compatible instructions into a Windows GDI context.||{{Tech:C}}, {{Tech:Win32}}||1,850||1996-1998&lt;br /&gt;
|-&lt;br /&gt;
|[[PortProxy]]||[http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP] connection forwarding [http://en.wikipedia.org/wiki/Windows_service service] that I wrote in college so that I could run servers from behind a firewall. When I put Linux onto resnet.bryant.edu, I no longer needed this program, but it&#039;s still cool if you are running [http://en.wikipedia.org/wiki/Microsoft_Windows Windows]. I also wrote a version that runs as a [http://en.wikipedia.org/wiki/System_tray system tray] application in [http://en.wikipedia.org/wiki/Windows_95 Windows 95].||{{Tech:C}}, {{Tech:Win32}}, {{Tech:Sockets}}||1,461||1999&lt;br /&gt;
|-&lt;br /&gt;
|[[ScreenWindowX]]||An {{Tech:ActiveX}} version of [[ScreenWindow]] that I created during the ActiveX hype. This gives [http://en.wikipedia.org/wiki/Internet_Explorer Internet Explorer] pages, [http://en.wikipedia.org/wiki/Component_Object_Model COM] clients, and [http://en.wikipedia.org/wiki/.NET_Framework .NET] applications an easy-to-use text console user interface control.||{{Tech:C++}}, {{Tech:COM}}, {{Tech:Win32}}, {{Tech:ActiveX}}||1,614||1998&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/kjmouse/ KJMouse]||Busy cursor for {{Tech:Java}} that is similar to the launch feedback in [http://en.wikipedia.org/wiki/KDE KDE] 2.2||{{Tech:Java}}, {{Tech:JNI}}, {{Tech:Win32}}, {{Tech:X11}}, {{Tech:Cocoa}}||736||2001-2004&lt;br /&gt;
|-&lt;br /&gt;
|[[CatSetup]]||Scriptable install and uninstall utility for [http://en.wikipedia.org/wiki/Windows_3.1 16-bit Windows] that I wrote in the mid-1990s to ease the distribution of my software. Most of my software from 1994 to 2000 used CatSetup. I eventually switched to using [http://en.wikipedia.org/wiki/Nullsoft_Scriptable_Install_System NSIS] and, later, [http://dennisbareis.com/makemsi.htm MAKEMSI].||{{Tech:C}}, {{Tech:Win16}}||3,676||1994-1998&lt;br /&gt;
|-&lt;br /&gt;
|[[Trig Grapher]]||Plots [http://en.wikipedia.org/wiki/Trigonometry trigonometric functions] in a window. This was my first [http://en.wikipedia.org/wiki/Thread_%28computer_science%29 multi-threaded] {{Tech:Win32}} program, which I wrote in high school for fun. I later back-ported it to {{Tech:Win16}}.||{{Tech:C}}, {{Tech:Win32}}, {{Tech:Win16}}||1,441||1995-1996&lt;br /&gt;
|-&lt;br /&gt;
|[[256-Color SDK]]||Library that I wrote a to easily manage 256-color bitmaps on 256-color displays||{{Tech:C}}, {{Tech:Win16}}||704||1994&lt;br /&gt;
|-&lt;br /&gt;
|[[AudioCD Pictures]]||Displays predefined pictures as a playing CD reaches predefined moments||{{Tech:C}}, {{Tech:Win16}}||550||1994&lt;br /&gt;
|-&lt;br /&gt;
|[[BBS Ads]]||Simply a program that can advertise bulletin board systems, when they used to be popular||{{Tech:C}}, {{Tech:Win16}}||258||1993-1994&lt;br /&gt;
|-&lt;br /&gt;
|[[Bids-to-ASP]]||Converts American Airlines bidsheet files into Procomm Plus for DOS ASPect scripts||{{Tech:C}}, {{Tech:Win16}}||562||1994&lt;br /&gt;
|-&lt;br /&gt;
|[[Horses]]||A fun horse racing strategy game for Windows||{{Tech:C}}, {{Tech:Win16}}||3,348||1995,1997&lt;br /&gt;
|-&lt;br /&gt;
|[[KittyCat! Comm]]||[http://en.wikipedia.org/wiki/Bulletin_board_system Bulletin board system (BBS)] communications program with a [http://en.wikipedia.org/wiki/Dynamic_Data_Exchange dynamic data exchange (DDE)] based [http://en.wikipedia.org/wiki/Application_programming_interface application programming interface (API)] and support for [http://en.wikipedia.org/wiki/ANSI_escape_code ANSI text] and [http://en.wikipedia.org/wiki/Remote_imaging_protocol RIPscrip graphics]. This was never finished due to the Internet and the World Wide Web making it obsolete.||{{Tech:C}}, {{Tech:Win16}}||8,166||1994-1995&lt;br /&gt;
|-&lt;br /&gt;
|[[MCI SendString]]||Allows users to work with the [http://en.wikipedia.org/wiki/Media_Control_Interface Microsoft Windows media control interface (MCI)] with text rather than through pointing and clicking||{{Tech:C}}, {{Tech:Win16}}||212||1994&lt;br /&gt;
|-&lt;br /&gt;
|[[MeowyMIDI]]||A [http://en.wikipedia.org/wiki/SoundFont 1.0 sound font] with cat meows and purrs for [http://en.wikipedia.org/wiki/Sound_Blaster Sound Blaster] AWE32 and AWE64 audio cards||{{Tech:SoundFont}}, {{Tech:MIDI}}||0||1994-1995&lt;br /&gt;
|-&lt;br /&gt;
|[[PCL Page]]||Manipulate [http://en.wikipedia.org/wiki/Printer_Command_Language PCL]-compliant printers with this utility that works in both {{Tech:Win16}} and {{Tech:DOS}}||{{Tech:C}}, {{Tech:Win16}}, {{Tech:DOS}}||196||1995&lt;br /&gt;
|-&lt;br /&gt;
|[[ScreenWindow]]||Text console and {{Tech:MIDI}} library for {{Tech:Win16}} that I wrote so that students at [http://www.gcisd-ghs.org/ Grapevine High School] in first-year computer science class could use MIDI in their music projects using [http://en.wikipedia.org/wiki/Turbo_Pascal Borland&#039;s Turbo Pascal]. When they switched to teaching {{Tech:C++}}, I made a 32-bit version of the library that used {{Tech:Win32}}&#039;s native console rather than my own.||{{Tech:C++}}, {{Tech:C}}, {{Tech:Pascal}}, {{Tech:Win16}}, {{Tech:Win32}}, {{Tech:MIDI}}||2,953||1996-1997&lt;br /&gt;
|-&lt;br /&gt;
|[[AriesType]]||A [http://en.wikipedia.org/wiki/Touch_typing touch typing] education program that I made while I was a freshman in high school. It tied into the local [http://en.wikipedia.org/wiki/Novell_Netware Novell NetWare] network to be a multi-user application with different capabilities given to students, teachers, and system operators. AriesType also included basic local email and paging capabilities.||{{Tech:BASIC}}, {{Tech:DOS}}||4,364||1993-1994&lt;br /&gt;
|-&lt;br /&gt;
|[[IntMap]]||A small image library that I wrote for a Pascal project in high school to provide image drawing, movement, and rotation operations in DOS||{{Tech:Pascal}}, {{Tech:DOS}}, {{Tech:C}}||1,797||1995,1998&lt;br /&gt;
|-&lt;br /&gt;
|[[Jingle Bells]]||A first-year computer science course project to visually and audibly play a [http://en.wikipedia.org/wiki/Christmas_song traditional December holiday song], which I later ported to Windows using [[ScreenWindow]]||{{Tech:Pascal}}, {{Tech:DOS}}, {{Tech:C}}, {{Tech:Win16}}, {{Tech:Win32}}, {{Tech:MIDI}}||611||1994,1996&lt;br /&gt;
|-&lt;br /&gt;
|[[SLOS-DOS]]||A small interpreted toy operating environment written in BASIC for DOS. Programs are written in a trivial and limited scripting language.||{{Tech:BASIC}}, {{Tech:DOS}}||1,277||1993&lt;br /&gt;
|-&lt;br /&gt;
|[[SLOS-Win]]||Windows version of [[SLOS-DOS|SLOS]], a small interpreted toy operating environment written in BASIC for DOS. Programs are written in a trivial and limited scripting language.||{{Tech:C++}}, {{Tech:Win16}}||1,679||1993&lt;br /&gt;
|-&lt;br /&gt;
|[[TSNHead]]||Kept track of how much time my brothers and I spent on [http://en.wikipedia.org/wiki/The_Sierra_Network The Sierra Network (TSN)]||{{Tech:BASIC}}, {{Tech:DOS}}||291||1992&lt;br /&gt;
|-&lt;br /&gt;
|[[TrackTrek]]||A track meet program that &amp;quot;keeps track&amp;quot; of events and allows others to view scores in realtime. This was my first {{Tech:Java}} program. This was more of a self-driven academic exercise as the project was never finished.||{{Tech:Java}}, {{Tech:AWT}}||3,690||1996-1998&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/thunderforce/ Thunderforce]||An open-source Mozilla Thunderbird extension for Salesforce.com. This project is now abandoned due to other priorities and interests.||{{Tech:JavaScript}}, {{Tech:XPCOM}}, {{Tech:C++}}, {{Tech:XUL}}, {{Tech:Subversion}}, {{Tech:MediaWiki}}||5,411||2007-2009&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Software and project contributions===&lt;br /&gt;
I contributed to the following projects:&lt;br /&gt;
{|class=&amp;quot;software sortable&amp;quot;&lt;br /&gt;
!Name&lt;br /&gt;
!Description&lt;br /&gt;
!Technologies&lt;br /&gt;
!SLOC&lt;br /&gt;
!Year&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.mozilla.org/ Mozilla]||[https://www.moonlightdesign.org/startfirefox/ Workaround code] for a shutdown bug in Firefox ([https://bugzilla.mozilla.org/show_bug.cgi?id=239223 bug 239223]) and helped others find the cause of a [https://bugzilla.mozilla.org/show_bug.cgi?id=245742 NTLM authentication crash] in a pre-Firefox build|| ||156||2005&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.samba.org/ Samba]||[https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=134570 Patch] to allow the use of 32-bit user and group IDs in smbmnt|| ||11||2004&lt;br /&gt;
|-&lt;br /&gt;
|[http://pan.rebelbase.com/ Pan]||Contributed a small multi-threaded bugfix to a function that was crashing on several important dialog boxes in version 0.6.3|| ||small||1999&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.php.net/ PHP]||Contributed the [http://us.php.net/snmpset snmpset()] function to [http://cvs.php.net/viewvc.cgi/php3/functions/?pathrev=php_3_0_12 PHP 3.0.12] and [http://cvs.php.net/viewvc.cgi/php-src/ext/snmp/?pathrev=php_4_0b2-2 PHP4 Beta2] so that [[ResNet Online]] could turn on the ResHall ports when students registered their computers||{{Tech:C}}, {{Tech:Net-SNMP}}, {{Tech:CVS}}||172||1999&lt;br /&gt;
|-&lt;br /&gt;
|[http://spruce.sourceforge.net/ Spruce]||Contributed several small usability patches and a fix for a thread-based crash that brought down Spruce while checking messages in previous versions||{{Tech:C}}, {{Tech:GLib}} threads, {{Tech:GTK+}}||200||2000&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.opensuse.org/ Novell openSUSE]||Fixed bugs related to [https://bugzilla.novell.com/show_bug.cgi?id=343891 LVM on a USB boot drive] and [https://bugzilla.novell.com/show_bug.cgi?id=410736 J-Pilot thinking that the username is always wrong on 64-bit platforms], and added a [https://bugzilla.novell.com/show_bug.cgi?id=328116 workaround for Bluetooth DUND issues]. [https://bugzilla.novell.com/buglist.cgi?query_format=advanced&amp;amp;short_desc_type=allwordssubstr&amp;amp;short_desc=&amp;amp;long_desc_type=fulltext&amp;amp;long_desc=&amp;amp;bug_file_loc_type=allwordssubstr&amp;amp;bug_file_loc=&amp;amp;status_whiteboard_type=allwordssubstr&amp;amp;status_whiteboard=&amp;amp;keywords_type=anywords&amp;amp;keywords=&amp;amp;emailassigned_to1=1&amp;amp;emailreporter1=1&amp;amp;emailinfoprovider1=1&amp;amp;emailcc1=1&amp;amp;emaillongdesc1=1&amp;amp;emailtype1=exact&amp;amp;email1=novell%40moonlightdesign.org&amp;amp;emailassigned_to2=1&amp;amp;emailreporter2=1&amp;amp;emailqa_contact2=1&amp;amp;emailcc2=1&amp;amp;emailtype2=substring&amp;amp;email2=&amp;amp;bugidtype=include&amp;amp;bug_id=&amp;amp;votes=&amp;amp;chfieldfrom=&amp;amp;chfieldto=Now&amp;amp;chfieldvalue=&amp;amp;cmdtype=doit&amp;amp;order=Reuse+same+sort+as+last+time&amp;amp;field0-0-0=noop&amp;amp;type0-0-0=noop&amp;amp;value0-0-0= Full bug list].||{{Tech:C}}||small||2007-2008&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.bryant.edu/ Bryant University]||During the Spring of 1998, I enhanced Bryant&#039;s main page with rollovers and images. Other miscellaneous pages were also updated, and the [http://www.moonlightdesign.org/dirlist/ DirList] project was started originally as a web directory for Bryant.||{{Tech:JavaScript}}, {{Tech:HTML}}||small||1998-1999&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Lines of code were computed using [http://www.dwheeler.com/sloccount/ SLOCCount] and, for extensions not supported by SLOCCount, &amp;lt;code&amp;gt;find . -iname \*\\.js -print0 -or -iname \*\\.bs2 -print0 -or -iname \*\\.idl -print0 -or -iname \*\\.asp -print0 -or -iname \*\\.clp -print0 -or -iname \*\\.xul -print0 -or -iname \*\\.bas -print0 -or -iname \*\\.exc -print0| xargs -0 -Ixxx cat xxx| grep &amp;quot;[a-zA-Z0-9]&amp;quot;|wc -l&amp;lt;/code&amp;gt;. SLOC counts that relate to San Francisco AIDS Foundation software that has not been made open-source were computed during my final months of employment; Carnegie Mellon University asked for those numbers as part of the admission process. Generated code is excluded from the SLOC counts. With generated code, such as the [[Reggie/CIS]] code generated from [http://java.sun.com/j2se/1.4.2/docs/guide/rmi-iiop/toJavaPortableUG.html idlj], the SLOC counts balloon significantly.&lt;br /&gt;
&lt;br /&gt;
==Employment History==&lt;br /&gt;
&lt;br /&gt;
===[http://www.salesforce.com/ Salesforce.com]===&lt;br /&gt;
*&#039;&#039;&#039;Senior Member of the Technical Staff: [http://developer.force.com/sites Force.com Sites], Core Infrastructure, Security, and [http://wiki.developerforce.com/index.php/Web_Services_API API] Teams&#039;&#039;&#039;&lt;br /&gt;
*January 2007 to present&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**Brought attention to specific [http://en.wikipedia.org/wiki/Cross-site_scripting cross-site scripting (XSS)] vulnerabilities by writing a Firefox Firebug extension that looked for improper string escaping in a test org that had been specially populated with attack strings by another tool and having quality engineers from every functional team test the system with the Firebug extension running. This led to the identification and resolution of a large number of vulnerabilities, thus making Salesforce.com even more secure. A security research firm later commended Salesforce.com&#039;s security, saying that they couldn&#039;t find any XSS or cross site request forgery (CSRF) vulnerabilities, despite looking for them over the course of several days.&lt;br /&gt;
**Championed an improvement to an anti-phishing feature&#039;s design successfully, and that improvement is patent-pending&lt;br /&gt;
**Resolved customer cases related to the [http://wiki.apexdevnet.com/index.php/Web_Services_API application programming interface] (API) and [http://en.wikipedia.org/wiki/Secure_Sockets_Layer secure sockets layer] (SSL), quickly becoming a go-to person for HTTPS and SSL&lt;br /&gt;
**Improved an internal production testing tool&#039;s scheduling of tests by adding prerequisite expressions to increase test parallelization&lt;br /&gt;
**Built the initial security testing framework for [http://wiki.apexdevnet.com/index.php/Partner_Access_Controls package access controls], which helped quickly bring that feature to market with confidence in its quality and security&lt;br /&gt;
**Designed and began to implement a Thunderbird add-on for Salesforce.com: [https://www.moonlightdesign.org/thunderforce Thunderforce]&lt;br /&gt;
**Enhanced the user interface of, added Apache Ant build files to, significantly improved the configuration system of, and added multiple-window browser screenshots to an internal production testing tool that is used by multiple teams&lt;br /&gt;
**Created and automated anti-phishing and security test scenarios&lt;br /&gt;
**Automated HTTPS troubleshooting with an internal utility for support representatives that substantially reduced the number of escalated HTTPS cases&lt;br /&gt;
**Ensured that new releases of the core product did not break older API versions through gold files and automated testing&lt;br /&gt;
**Established a methodology for determining equivalence partition coverage in the test cases for the [http://www.salesforce.com/us/developer/docs/api/Content/sforce_api_calls_soql.htm Salesforce.com object query language (SOQL)]&lt;br /&gt;
**Assisted developers and quality engineers with installing and maintaining [http://www.opensuse.org/ Novell openSUSE Linux] on their primary desktops&lt;br /&gt;
&lt;br /&gt;
===[http://www.sfaf.org/ San Francisco AIDS Foundation]===&lt;br /&gt;
*&#039;&#039;&#039;Database Administrator and Software Engineer&#039;&#039;&#039;&lt;br /&gt;
*September 2000 to July 2005&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**Maintained a [[Reggie/CIS|large 200-user multi-tenant three-tiered system]] used by all Ryan White CARE-funded AIDS service organizations in San Francisco in collaboration with the Department of Public Health AIDS Office of San Francisco and two direct partners. That involved all aspects of the software development lifecycle as well as server and client deployments, network maintenance, and top-tier user support.&lt;br /&gt;
**Gathered requirements for new features collaboratively with stakeholders, designed those features, coded them, tested them, and deployed them&lt;br /&gt;
**Assisted the other database administrator with the foundation&#039;s customized [[SFAF CRM|customer relationship management]] (CRM) and [[DonorPerfect Online|donor relationship management]] systems&lt;br /&gt;
**Implemented large parts of the data conversion and customization of the Foundation&#039;s purchased donor relationship management system&lt;br /&gt;
**Secured the Internet-facing presence of the donor relationship management system using a locked-down Apache configuration and strict URL regular expressions&lt;br /&gt;
**Obviated a need for Crystal Reports by implementing web-based [[PDF Access Reports|PDF reports]] using Microsoft Access, a customized PHP build to run as a COM server, and a custom-built COM object for use by ASP on the reporting server, saving a significant amount of money&lt;br /&gt;
**Migrated client operating system data during the Windows XP transition using a [[Home Profiler|multi-platform profile migration tool]] that I wrote&lt;br /&gt;
**Planned, deployed, and provided training for Mozilla Firefox as the default web browser to all foundation users and created [https://www.moonlightdesign.org/urllock IE URL Lock] for business-related sites that only worked in Internet Explorer&lt;br /&gt;
**Evaluated, purchased, and managed the licenses of software related to Reggie/CIS&lt;br /&gt;
**Maintained the Cisco network equipment, including the PIX firewall&#039;s access control lists (ACLs) and routers&#039; virtual local area network (VLAN) ACLs&lt;br /&gt;
**Cut unsolicited commercial email (UCE or SPAM) drastically and added virtual private networking (VPN) using Astaro Secure Linux (ASL) in the demilitarized zone (DMZ) behing the Cisco PIX firewall&lt;br /&gt;
**Administered databases, servers, and the organization&#039;s backup system&lt;br /&gt;
&lt;br /&gt;
===[http://www.ariesnet.com/ Ariesnet]===&lt;br /&gt;
*&#039;&#039;&#039;Intranet Developer&#039;&#039;&#039;&lt;br /&gt;
*May 1999 to August 1999 and May 2000 to July 2000&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**Developed specifications for a statistical employee rating system to help Ariesnet move towards building teams of virtual at−home employees&lt;br /&gt;
**Helped Ariesnet build their secure intranet system using PHP and MySQL&lt;br /&gt;
**Administered the intranet system&#039;s Linux server as well as the development test server using the CVS versioning software&lt;br /&gt;
&lt;br /&gt;
===[http://www.bryant.edu/ Bryant University]===&lt;br /&gt;
*&#039;&#039;&#039;ResNet Consultant&#039;&#039;&#039;&lt;br /&gt;
**January 1999 to May 2000&lt;br /&gt;
**&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
***Shortened residence hall computer registration port activation turnaround times from two weeks to one second with a [[ResNet Online|custom-written Linux-based PHP web site]]&lt;br /&gt;
***Provided in-person network and computer support to students living in the university&#039;s residence halls&lt;br /&gt;
*&#039;&#039;&#039;Internet Developer&#039;&#039;&#039;&lt;br /&gt;
**January 1998 to May 1998 and September 1998 to May 1999&lt;br /&gt;
**&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
***Implemented the university’s first web-based faculty and student directory using the common gateway interface (CGI)&lt;br /&gt;
***Wrote an ODBC driver and Microsoft Access database for its administration. This lives on as the [https://www.moonlightdesign.org/dirlist/ DirList2] open-source project&lt;br /&gt;
&lt;br /&gt;
===[http://www.gcisd-k12.org/ Grapevine-Colleyville Independent School District]===&lt;br /&gt;
*&#039;&#039;&#039;Student Intern&#039;&#039;&#039;&lt;br /&gt;
*January 1996 to August 1997&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**Provided hardware and software support, winning an employee award for exceptional service&lt;br /&gt;
**Worked with wide-area network configurations&lt;br /&gt;
**Wrote a [[LPD|networked printer driver]] to save thousands of dollars in licenses by allowing printing from their AS/400s to local printers&lt;br /&gt;
&lt;br /&gt;
==Education and Training==&lt;br /&gt;
&lt;br /&gt;
===[http://www.cmu.edu Carnegie Mellon University]===&lt;br /&gt;
*&#039;&#039;&#039;[http://www.mse.cs.cmu.edu/ Master of Software Engineering]&#039;&#039;&#039;, [http://www.isri.cmu.edu/index.jsp Institute of Software Research]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Pittsburgh%2C_Pennsylvania Pittsburgh, Pennsylvania]&lt;br /&gt;
*&#039;&#039;&#039;Graduation:&#039;&#039;&#039; December 2006&lt;br /&gt;
*&#039;&#039;&#039;Masters group project:&#039;&#039;&#039; [[Serendipity|Bosch Security Configuration Assistant]], which is an [http://www.eclipse.org/ Eclipse-based] application that generates three-dimensional security plans for buildings using the [http://en.wikipedia.org/wiki/Jess_programming_language Jess] [http://en.wikipedia.org/wiki/Rule_engine rule engine] and three-dimensional visualization&lt;br /&gt;
*&#039;&#039;&#039;Project roles:&#039;&#039;&#039; Technology support manager and, via rotation, planning manager, software process manager, project risk manager, and quality manager&lt;br /&gt;
*&#039;&#039;&#039;Focus areas studied:&#039;&#039;&#039; Fault tolerant, distributed, real-time systems; software project management; formal models and analysis of software systems; software architecture; and software requirements elicitation methods&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**As a team, we met and exceeded our client&#039;s original picture of success by the end of the project&#039;s one-year time frame.&lt;br /&gt;
**I reduced the status meeting data collection time to less than 30 minutes through automation and used historical data to reduce our estimation error.&lt;br /&gt;
**As the support manager, I kept our [http://fedoraproject.org/ RedHat Fedora Core] server and software available, secure, usable, and backed up using only one hour per week of my time on average throughout the project.&lt;br /&gt;
*&#039;&#039;&#039;[http://www.cmu.edu/hub/reg/grading.html Quality point average]:&#039;&#039;&#039; Graduated with 4.03 out of 4.00, which is a weighted grade point average (GPA), due to earning several A+ grades&lt;br /&gt;
&lt;br /&gt;
===[http://www.bryant.edu/ Bryant University]===&lt;br /&gt;
*&#039;&#039;&#039;[http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Undergraduate%20Programs/ Bachelor of Science in Business Administration]&#039;&#039;&#039;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Smithfield%2C_Rhode_Island Smithfield, Rhode Island]&lt;br /&gt;
*&#039;&#039;&#039;Graduation:&#039;&#039;&#039; May 2000&lt;br /&gt;
*[http://www.aacsb.edu/ AACSB] [http://www.aacsb.edu/members/Omd/Profile_page2.asp?LinkId=38588&amp;amp;CallingPage=InstLists Accredited]&lt;br /&gt;
*&#039;&#039;&#039;Focus areas studied:&#039;&#039;&#039; [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Computer%20Information%20Systems Computer information systems] with a minor in [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Applied%20Statistics applied business statistics]&lt;br /&gt;
*&#039;&#039;&#039;[http://en.wikipedia.org/wiki/GPA#United_States Grade point average]:&#039;&#039;&#039; Graduated [http://en.wikipedia.org/wiki/Summa_cum_laude summa cum laude] with a GPA of 3.96 out of 4.00&lt;br /&gt;
*&#039;&#039;&#039;Leadership:&#039;&#039;&#039; Served as president of [http://web.bryant.edu/~pride Bryant PRIDE] for more than a year and conducted a [http://en.wikipedia.org/wiki/Linux Linux] installation event&lt;br /&gt;
&lt;br /&gt;
===Certification===&lt;br /&gt;
*&#039;&#039;&#039;[https://www.redhat.com/training/rhce/courses/ RedHat Certified Engineer]&#039;&#039;&#039; (RHCE for 6.2): [https://www.redhat.com/training/certification/verify/ 806200565301847]&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2286</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2286"/>
		<updated>2015-06-06T15:11:15Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
Welcome to Moonlight Design -- the personal web site of [[Henry Lamb]] and [[Steven Lawrance]]&lt;br /&gt;
&lt;br /&gt;
==Henry Lamb==&lt;br /&gt;
[[Henry Lamb]] is a professional [http://en.wikipedia.org/wiki/Restaurant restaurateur] trained in both [http://www.baychef.com/programs/hospitality_and_restaurant.asp restaurant management] and [http://www.baychef.com/programs/culinary_arts.asp culinary arts] at the [http://www.baychef.com/ California Culinary Academy]. For a few years from the late 1990s to the early 2000s, Henry was a [http://en.wikipedia.org/wiki/Graphic_designer graphic designer] trained at the [http://www.artinstitutes.edu/sanfrancisco/ Art Institute of San Francisco] and the [http://www.academyart.edu/ Academy of Art University]&lt;br /&gt;
&lt;br /&gt;
Visit Henry&#039;s new wine site: [http://glassofgrape.com/ Glass of Grape]&lt;br /&gt;
&lt;br /&gt;
==Steven Lawrance==&lt;br /&gt;
[[Steven Lawrance]] is an active practitioner of [http://en.wikipedia.org/wiki/Software_engineering software engineering] and [http://en.wikipedia.org/wiki/Open-source_software open-source software enthusiast] trained in [http://www.mse.cs.cmu.edu/ software engineering] at [http://www.mse.cs.cmu.edu/ Carnegie Mellon University] and [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Undergraduate%20Programs/ business administration] with [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Computer%20Information%20Systems computer information systems] at [http://www.bryant.edu/ Bryant University]&lt;br /&gt;
&lt;br /&gt;
[[Steven Lawrance#Software Project Experience|Check out the list of software that Steven has either written or contributed to]]&lt;br /&gt;
&lt;br /&gt;
|valign=&amp;quot;top&amp;quot; width=&amp;quot;25%&amp;quot;|&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://www.moonlightdesign.org/urllock/ IE URL Lock]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://gnucashtoqif.us/ GnuCashToQIF]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;4&amp;quot;&amp;gt;[[TLS-SSL-Protocols|TLS/SSL Protocol Group Policy Template]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[https://www.moonlightdesign.org/dirlist DirList] [[CompactOnDelete]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[[PortProxy]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Serendipity|Team Serendipity]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Disk Imager]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[[ScreenWindowX]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[https://www.moonlightdesign.org/kjmouse/ KJMouse]&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;small&amp;gt;[https://www.moonlightdesign.org/wireless/ Guest wireless network sign-up] (local network only)&amp;lt;/small&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2285</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2285"/>
		<updated>2015-06-06T15:04:53Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
Welcome to Moonlight Design -- the personal web site of [[Henry Lamb]] and [[Steven Lawrance]]&lt;br /&gt;
&lt;br /&gt;
==Henry Lamb==&lt;br /&gt;
[[Henry Lamb]] is a professional [http://en.wikipedia.org/wiki/Restaurant restaurateur] trained in both [http://www.baychef.com/programs/hospitality_and_restaurant.asp restaurant management] and [http://www.baychef.com/programs/culinary_arts.asp culinary arts] at the [http://www.baychef.com/ California Culinary Academy]. For a few years from the late 1990s to the early 2000s, Henry was a [http://en.wikipedia.org/wiki/Graphic_designer graphic designer] trained at the [http://www.artinstitutes.edu/sanfrancisco/ Art Institute of San Francisco] and the [http://www.academyart.edu/ Academy of Art University]&lt;br /&gt;
&lt;br /&gt;
Visit Henry&#039;s new wine site: [http://glassofgrape.com/ Glass of Grape]&lt;br /&gt;
&lt;br /&gt;
==Steven Lawrance==&lt;br /&gt;
[[Steven Lawrance]] is an active practitioner of [http://en.wikipedia.org/wiki/Software_engineering software engineering] and [http://en.wikipedia.org/wiki/Open-source_software open-source software enthusiast] trained in [http://www.mse.cs.cmu.edu/ software engineering] at [http://www.mse.cs.cmu.edu/ Carnegie Mellon University] and [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Undergraduate%20Programs/ business administration] with [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Computer%20Information%20Systems computer information systems] at [http://www.bryant.edu/ Bryant University]&lt;br /&gt;
&lt;br /&gt;
[[Steven Lawrance#Software Project Experience|Check out the list of software that Steven has either written or contributed to]]&lt;br /&gt;
&lt;br /&gt;
|valign=&amp;quot;top&amp;quot; width=&amp;quot;25%&amp;quot;|&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://www.moonlightdesign.org/urllock/ IE URL Lock]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://gnucashtoqif.us/ GnuCashToQIF]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;4&amp;quot;&amp;gt;[[TLS-SSL-Protocols|TLS/SSL Protocol Group Policy Template]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[https://www.moonlightdesign.org/dirlist DirList] [[CompactOnDelete]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[[PortProxy]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Serendipity|Team Serendipity]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Disk Imager]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[[ScreenWindowX]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[https://www.moonlightdesign.org/kjmouse/ KJMouse]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[https://www.moonlightdesign.org/pam-cuecat/ PAM-CueCat]&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;small&amp;gt;[https://www.moonlightdesign.org/wireless/ Guest wireless network sign-up] (local network only)&amp;lt;/small&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2284</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2284"/>
		<updated>2015-06-06T14:03:37Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
Welcome to Moonlight Design -- the personal web site of [[Henry Lamb]] and [[Steven Lawrance]]&lt;br /&gt;
&lt;br /&gt;
==Henry Lamb==&lt;br /&gt;
[[Henry Lamb]] is a professional [http://en.wikipedia.org/wiki/Restaurant restaurateur] trained in both [http://www.baychef.com/programs/hospitality_and_restaurant.asp restaurant management] and [http://www.baychef.com/programs/culinary_arts.asp culinary arts] at the [http://www.baychef.com/ California Culinary Academy]. For a few years from the late 1990s to the early 2000s, Henry was a [http://en.wikipedia.org/wiki/Graphic_designer graphic designer] trained at the [http://www.artinstitutes.edu/sanfrancisco/ Art Institute of San Francisco] and the [http://www.academyart.edu/ Academy of Art University]&lt;br /&gt;
&lt;br /&gt;
Visit Henry&#039;s new wine site: [http://glassofgrape.com/ Glass of Grape]&lt;br /&gt;
&lt;br /&gt;
==Steven Lawrance==&lt;br /&gt;
[[Steven Lawrance]] is an active practitioner of [http://en.wikipedia.org/wiki/Software_engineering software engineering] and [http://en.wikipedia.org/wiki/Open-source_software open-source software enthusiast] trained in [http://www.mse.cs.cmu.edu/ software engineering] at [http://www.mse.cs.cmu.edu/ Carnegie Mellon University] and [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Undergraduate%20Programs/ business administration] with [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Computer%20Information%20Systems computer information systems] at [http://www.bryant.edu/ Bryant University]&lt;br /&gt;
&lt;br /&gt;
[[Steven Lawrance#Software Project Experience|Check out the list of software that Steven has either written or contributed to]]&lt;br /&gt;
&lt;br /&gt;
|valign=&amp;quot;top&amp;quot; width=&amp;quot;25%&amp;quot;|&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://www.moonlightdesign.org/urllock/ IE URL Lock]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://gnucashtoqif.us/ GnuCashToQIF]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;4&amp;quot;&amp;gt;[[TLS-SSL-Protocols|TLS/SSL Protocol Group Policy Template]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[https://www.moonlightdesign.org/dirlist DirList] [[CompactOnDelete]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[[PortProxy]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Serendipity|Team Serendipity]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Disk Imager]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[[ScreenWindowX]]&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;small&amp;gt;[https://www.moonlightdesign.org/wireless/ Guest wireless network sign-up] (local network only)&amp;lt;/small&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Steven_Lawrance&amp;diff=2283</id>
		<title>Steven Lawrance</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Steven_Lawrance&amp;diff=2283"/>
		<updated>2015-06-06T14:01:44Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Software that I created */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Welcome to the web site of &#039;&#039;&#039;Steven Lawrance&#039;&#039;&#039;, [http://www.mse.cs.cmu.edu/ master of software engineering (MSE)]. I enjoy building complete computing solutions at all levels of abstraction to automate business processes at a low cost, in a short time frame, and with high quality. Put my experience, interests, training, and expertise to work for you. Please feel free to [mailto:steven@moonlightdesign.org contact me today].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;table style=&amp;quot;text-align: left;&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;5&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color: rgb(240, 240, 240); border: 2px solid rgb(90, 90, 90); padding: 3px;&amp;quot;&amp;gt;&amp;lt;big&amp;gt;[[Steven Lawrance#Team software|Software Built in a Team]]&amp;lt;/big&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color: rgb(240, 240, 240); border: 2px solid rgb(90, 90, 90); padding: 3px;&amp;quot;&amp;gt;&amp;lt;big&amp;gt;[[Steven Lawrance#Software that I created|Software Built by Just Me]]&amp;lt;/big&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color: rgb(240, 240, 240); border: 2px solid rgb(90, 90, 90); padding: 3px;&amp;quot;&amp;gt;&amp;lt;big&amp;gt;[[Steven Lawrance#Employment History|Employment History]]&amp;lt;/big&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color: rgb(240, 240, 240); border: 2px solid rgb(90, 90, 90); padding: 3px;&amp;quot;&amp;gt;&amp;lt;big&amp;gt;[[Steven Lawrance#Education and Training|Education and Training]]&amp;lt;/big&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Résumé:&#039;&#039;&#039; [https://www.moonlightdesign.org/steve/resume.pdf Portable document format (PDF)]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Network:&#039;&#039;&#039; [http://www.linkedin.com/in/meowmeow LinkedIn]&lt;br /&gt;
&lt;br /&gt;
Please feel free to ask me for more information about any project listed on this page.&lt;br /&gt;
&lt;br /&gt;
==Software Project Experience==&lt;br /&gt;
&lt;br /&gt;
===Team software===&lt;br /&gt;
I materially participated in the team software projects listed below:&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;software sortable&amp;quot;&lt;br /&gt;
!Name&lt;br /&gt;
!Description&lt;br /&gt;
!Technologies&lt;br /&gt;
!SLOC&lt;br /&gt;
!Year&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.salesforce.com/ Salesforce.com]||Web-based business software platform and suite of integrated business applications. During my time at Salesforce.com, I have worked on several teams -- API, Force.com Sites, Site.com, and Platform Security. Most recently, I led the implementation of custom https domains for Salesforce&#039;s site technologies, and this included tangential work, such as the domain management screens that were added in Summer &#039;14. I&#039;ve been a go-to person for several parts of the platform, and this includes Force.com Sites, the database tier of Site.com, site publishing, custom https domains, clickjack protection, inbound and outbound https connections, the reverse proxy caching layer for sites, IPv6, and our main production feature testing tool.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;At Salesforce.com&#039;s Dreamforce 2013 conference, I presented a [http://www.youtube.com/watch?v=Z7L1pSfcCJc session on the lessons learned while developing a Force.com solution] to replace an older Microsoft Access solution for the San Francisco AIDS Foundation.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Earlier at Salesforce.com, I integrated the low-level parts of Siteforce into the core Salesforce.com product; wrote Siteforce&#039;s Resin and runtime server configurations; wrote a [http://en.wikipedia.org/wiki/Cross-site_scripting cross site scripting] [http://en.wikipedia.org/wiki/Mozilla_Firefox Firefox]/[http://en.wikipedia.org/wiki/Firebug_(Firefox_extension) Firebug] extension to test proper output escaping in the manual and automated tests; improved an internal production testing tool&#039;s scheduling of tests by adding prerequisite expressions to increase test parallelization; and added per-window screenshots to an internal testing tool by extending Selenium with JNI native code.||{{Tech:Java}}, {{Tech:Ant}}, {{Tech:Selenium}}, {{Tech:JUnit}}, {{Tech:Salesforce.com}}, {{Tech:Jetty}}, {{Tech:Resin}}, {{Tech:JSP}}, {{Tech:Servlet}}, {{Tech:JNI}}, {{Tech:Win32}}, {{Tech:X11}}||large||2007-current&lt;br /&gt;
|-&lt;br /&gt;
|[[Reggie/CIS]]||A 200-user multi-tenant three-tiered HIV/AIDS client database system that was used by all Ryan White Foundation CARE-funded AIDS service organizations in San Francisco in collaboration with the [http://www.sfdph.org/ San Francisco Department of Public Health (DPH)] [http://www.sfdph.org/PHP/HIVHlthSvc.htm AIDS Office] and two partners to the [http://www.sfaf.org/ San Francisco AIDS Foundation (SFAF)], where I worked for about five years. I actively maintained this system with a colleague at the DPH AIDS Office and was principally responsible for maintaining the &amp;quot;CIS&amp;quot; portion of Reggie/CIS, which extended the Reggie platform with extra features that the SFAF and two other organizations used.||{{Tech:Java}}, {{Tech:VBScript}}, {{Tech:Swing}}, {{Tech:T-SQL}}, {{Tech:MS SQL Server}}, {{Tech:CVS}}, {{Tech:JavaScript}}, {{Tech:C}}, {{Tech:JNI}}, {{Tech:CORBA}}, {{Tech:IIS}}, {{Tech:COM}}, {{Tech:Win32}}||162,005||2000-2005&lt;br /&gt;
|-&lt;br /&gt;
|[[DonorPerfect Online]]||Donor and fundraising event management system used by the San Francisco AIDS Foundation. I migrated [http://www.aidslifecycle.org/index.html AIDS/LifeCycle] data from a [http://www.goldmine.com/micro.aspx?id=4398 Goldmine] database to the [http://www.sfaf.org/ San Francisco AIDS Foundation&#039;s] customized [http://www.donorperfect.com/ DonorPerfect Online] system using a [http://en.wikipedia.org/wiki/Test_driven_development test-driven development process] for the SQL scripts. I also contributed substantially to the bulk data entry wizard, fixed bugs throughout the system, including security holes, made all pages and [http://en.wikipedia.org/wiki/Javascript JavaScripts] operate properly in [http://en.wikipedia.org/wiki/Firefox Mozilla Firefox], and implemented strict URL filtering security using an [http://httpd.apache.org/ Apache] [http://en.wikipedia.org/wiki/Reverse_proxy reverse-proxy] and [http://en.wikipedia.org/wiki/Mod_rewrite mod_rewrite].||{{Tech:VBScript}}, {{Tech:T-SQL}}, {{Tech:MS SQL Server}}, {{Tech:JavaScript}}, {{Tech:Apache}}, {{Tech:IIS}}, {{Tech:CVS}}||97,592||2004-2005&lt;br /&gt;
|-&lt;br /&gt;
|[[SFAF CRM]]||Customer relationship management system that was implemented by a colleague at the [http://www.sfaf.org/ San Francisco AIDS Foundation] that primarily serves the organization&#039;s [http://www.sfaf.org/volunteer/ volunteer based programs department], automates expense reports, and runs the [http://www.aidshotline.org/ California AIDS Hotline]. I enhanced the deployment system using [http://en.wikipedia.org/wiki/Concurrent_Versions_System CVS] in a web-based front-end, helped my colleague fix various bugs, and enhanced its Internet-facing security with an [http://httpd.apache.org/ Apache] [http://en.wikipedia.org/wiki/Reverse_proxy reverse-proxy] and [http://en.wikipedia.org/wiki/Mod_rewrite mod_rewrite].||{{Tech:VBScript}}, {{Tech:T-SQL}}, {{Tech:MS SQL Server}}, {{Tech:JavaScript}}, {{Tech:Apache}}, {{Tech:IIS}}, {{Tech:CVS}}||69,015||2001-2005&lt;br /&gt;
|-&lt;br /&gt;
|[[Serendipity|Bosch Security Configuration Assistant]]||An Eclipse-based application that generates three-dimensional security plans for buildings using a rule engine and three-dimensional visualization. In this project, I integrated a Windows-based three-dimensional visualization program into an Eclipse view, kept our RedHat Fedora Core server and software available, secure, usable, and backed up using only one hour per week of my time on average throughout the project, and automated our data collection and reporting processes to minimize project overhead work. This group project involved four other students -- two whom also work at Salesforce.com -- and served as a laboratory for us to directly apply coursework to a software project with a real client throughout our software engineering masters&#039; programs.||{{Tech:Java}}, {{Tech:Eclipse}}, {{Tech:UML}}, {{Tech:Ant}}, {{Tech:Bugzilla}}, {{Tech:CruiseControl}}, {{Tech:MediaWiki}}, {{Tech:Subversion}}, {{Tech:SWT}}, {{Tech:C++}}, {{Tech:JNI}}, {{Tech:Win32}}||21,274||2005-2006&lt;br /&gt;
|-&lt;br /&gt;
|[[Park &#039;N Park]]||A fault-tolerant, distributed, real-time three-tiered application for tracking parking garage usage. This was an academic project.||{{Tech:Java}}, {{Tech:CORBA}}, {{Tech:MySQL}}, {{Tech:CVS}}||2,027||2006&lt;br /&gt;
|-&lt;br /&gt;
|[[Teacher&#039;s Pet]]||Shares a tab in your Mozilla Firefox browser with one or more remote browsers, which can be useful in virtual classroom environments||{{Tech:JavaScript}}, {{Tech:Java}}, {{Tech:XUL}}, {{Tech:XPCOM}}, {{Tech:Subversion}}||1,251||2006&lt;br /&gt;
|-&lt;br /&gt;
|[[Hulk]]||Physically navigates a maze using a customized {{Tech:Boe-Bot}}. This project involved both custom hardware and custom software as well as trade-offs between the two when implementing features.||{{Tech:BASIC Stamp}}, {{Tech:Boe-Bot}}, {{Tech:Subversion}}||784||2006&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/urllock/Configuration_editor URL Lock]||Follow-up project to [http://www.moonlightdesign.org/urllock/ IE URL Lock] that sports a configuration user interface and implements new ideas for visually disabling content on the web||{{Tech:JavaScript}}, {{Tech:XUL}}, {{Tech:C++}}, {{Tech:XPCOM}}, {{Tech:Win32}}, {{Tech:Subversion}}||3,868||2006&lt;br /&gt;
|-&lt;br /&gt;
|[[Ariesbase]]||Intranet system for Ariesnet, Inc. During the Summer of 1999, I helped shape the back-end functionality, such as the security system and global includes, and I also created a high-level specification for an employee rating system for virtual team environments.||{{Tech:PHP}}, {{Tech:MySQL}}, {{Tech:JavaScript}}, {{Tech:CVS}}||medium||1999-2000&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Software that I created===&lt;br /&gt;
I wrote and maintain the following software:&lt;br /&gt;
{|class=&amp;quot;software sortable&amp;quot;&lt;br /&gt;
!Name&lt;br /&gt;
!Description&lt;br /&gt;
!Technologies&lt;br /&gt;
!SLOC&lt;br /&gt;
!Year&lt;br /&gt;
|-&lt;br /&gt;
|[[Home Profiler]]||Synchronizes user profile data between multiple desktop computers, regardless of the operating system. This was used at the [http://www.sfaf.org/ San Francisco AIDS Foundation] to migrate user profile data from Windows NT to Windows XP while leaving malware and spyware behind.||{{Tech:Java}}, {{Tech:C}}, {{Tech:JNI}}, {{Tech:JACOB}}, {{Tech:COM}}, {{Tech:Win32}}, {{Tech:CVS}}||5,679||2005&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/urllock/ IE URL Lock]||A browser helper object (BHO) that prevents users from navigating to web sites in Internet Explorer and Windows Explorer while permitting URLs that match a Perl-compatible regular expression stored in the registry||{{Tech:C++}}, {{Tech:COM}}, {{Tech:BHO}}, {{Tech:Win32}}, {{Tech:Subversion}}||1,607||2005-2012&lt;br /&gt;
|-&lt;br /&gt;
|[[Backup system]]||Multi-platform, SSH-secured, Internet-based incremental backup system that I assembled and use to back up all computers that I manage||{{Tech:Unison}}, {{Tech:Apache}}, {{Tech:OpenSSH}}|| ||2005-2007&lt;br /&gt;
|-&lt;br /&gt;
|[[Read-only filesystem]]|||FUSE filesystem view that makes all files unconditionally read-only. I use this in my [[Backup system|backup system]] for the web-based file restore interface.||{{Tech:C}}, {{Tech:Fuse}}||241||2005-2007&lt;br /&gt;
|-&lt;br /&gt;
|[[Serendipity Time Tracking Tool]]||A two-tier software team time tracking tool used by [[Serendipity|Team Serendipity]] while designing and building the [[Serendipity|Bosch Security Configuration Assistant]]. It was rapidly developed using Microsoft Access 2003 as the front-end user interface, MySQL 5 as the back-end database, and SSH as the MySQL connection tunnel.||{{Tech:VBA}}, {{Tech:Microsoft Access}}, {{Tech:MySQL}}, {{Tech:OpenSSH}}||small||2006&lt;br /&gt;
|-&lt;br /&gt;
|[https://gnucashtoqif.us/ GnuCash to QIF]||Converts a GnuCash XML file into a QIF or an IIF file||{{Tech:Java}}, {{Tech:Xerces}}||2,274||2002-2007&lt;br /&gt;
|-&lt;br /&gt;
|[[PDF Access Reports]]||Web-based PDF reports using Microsoft Access, a customized PHP build to run as a COM server, and a custom-built COM object for use by ASP on the reporting server. This was a component of [[Reggie/CIS|Reggie/CIS&#039;s]] reporting system.||{{Tech:PHP}}, {{Tech:COM}}, {{Tech:C++}}, {{Tech:Sockets}}, {{Tech:VBA}}, {{Tech:ASP}}, {{Tech:Access}}||651||2002-2005&lt;br /&gt;
|-&lt;br /&gt;
|[[PDFFile and InvokeAsUser]]||Enables easy portable document format (PDF) file generation on Windows computers when used with AFPL GhostScript and RedMon||{{Tech:C}}, {{Tech:Win32}}||396||2005&lt;br /&gt;
|-&lt;br /&gt;
|[[SFAF VPN Client]]||Connects a [http://en.wikipedia.org/wiki/Microsoft_windows Microsoft Windows] 2000 or XP computer to the [http://www.sfaf.org/ San Francisco AIDS Foundation&#039;s] [http://en.wikipedia.org/wiki/Vpn virtual private network (VPN)] by using the built-in [http://en.wikipedia.org/wiki/Ipsec IPsec] and [http://en.wikipedia.org/wiki/Pptp PPTP] capabilities in Windows. Each client computer is secured with a machine-unique [http://en.wikipedia.org/wiki/Public-key_cryptography public/private key], and users are authenticated against the [http://en.wikipedia.org/wiki/Windows_Server_domain NT domain] using PPTP over the IPsec connection.||{{Tech:C}}, {{Tech:Win32}}, {{Tech:Java}}, {{Tech:Swing}}, {{Tech:CVS}}||2,623||2003-2005&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/thunderforce/shared/Door%20lock%20example/ Door Lock]||Specification (not an implementation) of a secure residential door real-time, embedded software system that uses electronic locks, secure entry, easy exiting, and alarm state awareness to securely and efficiently manage a door||{{Tech:Javelin}}||0||2006&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/steve/SpellChecker.pdf Swing Inline Spell Checker]||Inline spell checker that plugs into Swing&#039;s look-and-feel system. This was used in [[Reggie/CIS]] as its distributed spell checker with [http://aspell.net/ GNU Aspell] running on the server.||{{Tech:Java}}, {{Tech:Swing}}, {{Tech:CORBA}}, {{Tech:Aspell}}||2,859||2002-2005&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/dirlist/ DirList]||User directory system that runs as a CGI to serve up user lists, search, and synchronize with the operating system&#039;s user database. When used with [http://www.moonlightdesign.org/dirlist DirList2ODBC], the ODBC driver that I wrote for DirList2, the entire DirList2 system becomes a [http://en.wikipedia.org/wiki/Sql structured query language (SQL)]-compliant database system within the limits of the [https://www.moonlightdesign.org/dirlist/doc/server/ DirList2 Server]. This project began in January of 1998 and is actively patched for any security issues that arise. [http://www.bryant.edu/ Bryant University] continues to use this program for their [http://web.bryant.edu/forhelp/pointer.html student web site list].||{{Tech:C++}}, {{Tech:C}}, {{Tech:Sockets}}, {{Tech:ODBC}}, {{Tech:Linux}}, {{Tech:Win32}}, {{Tech:VBA}}, {{Tech:Access}}||8,268||1999-2007&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/dirlist/ DirList2ODBC]||[http://en.wikipedia.org/wiki/Odbc ODBC] 2.0 compliant driver written for the [https://www.moonlightdesign.org/dirlist/ DirList] server. This driver is primarily used with [http://en.wikipedia.org/wiki/Microsoft_access Microsoft Access], but can also be used from other ODBC client applications, such as [http://en.wikipedia.org/wiki/Spss SPSS].||{{Tech:C++}}, {{Tech:Win32}}, {{Tech:Sockets}}, {{Tech:ODBC}}||12,671||1999-2000&lt;br /&gt;
|-&lt;br /&gt;
|[http://pam-cuecat.sourceforge.net/ PAM CueCat Module]||Turns the CueCat barcode scanner into a pluggable authentication module (PAM) library, permitting logins with bar code scans||{{Tech:C}}, {{Tech:PAM}}, {{Tech:Linux}}, {{Tech:CueCat}}||285||2000&lt;br /&gt;
|-&lt;br /&gt;
|[[Home Control]]||The project that marked my first significant work towards complete home and office automation systems||{{Tech:C}}, {{Tech:Win32}}, {{Tech:Serial}}, {{Tech:CP290}}||2,270||1996,1998&lt;br /&gt;
|-&lt;br /&gt;
|[[ResNet Online]]||I rewrote the old site for ease of use with more capabilities. Automatic port registration and heavy database integration saved the ResNet program a substantial amount of time while greatly improving customer/student satisfaction.||{{Tech:PHP}}, {{Tech:SNMP}}, {{Tech:MySQL}}, {{Tech:PHPLib}}||4,572||1999-2001&lt;br /&gt;
|-&lt;br /&gt;
|[[FAT Recover]]||Manual FAT filesystem recovery tool that I made to help with manual floppy disk recoveries and to salvage my dad&#039;s laptop when Windows totally crashed||{{Tech:C}}, {{Tech:Linux}}||246||2000&lt;br /&gt;
|-&lt;br /&gt;
|[[Bryant PRIDE web site]]||Web site for the [http://web.bryant.edu/~pride/ Bryant PRIDE] LGBT group. In the Fall of 1997, when I was a freshman at [http://www.bryant.edu/ Bryant University], I greatly enhanced the web site with several pages and JavaScripts. This also included a JavaScript-driven background {{Tech:MIDI}} music jukebox in a [http://en.wikipedia.org/wiki/Pop-under pop-under], which was unique for a web site at that time. While I was the web site&#039;s maintainer, it moved from static {{Tech:HTML}} to {{Tech:ASP}} and then to {{Tech:PHP}}.||{{Tech:JavaScript}}, {{Tech:PHP}}, {{Tech:VBScript}}, {{Tech:ASP}}||3,681||1997-2000&lt;br /&gt;
|-&lt;br /&gt;
|[[ActiveMail]]||Provides SMTP email sending, POP3 email downloading, and FTP authentication services to {{Tech:ASP}}, {{Tech:VisualBasic}}, and other {{Tech:COM}}-consuming programs||{{Tech:C++}}, {{Tech:COM}}, {{Tech:Win32}}, {{Tech:VisualBasic}}||4,691||1998-2000&lt;br /&gt;
|-&lt;br /&gt;
|[[CPU ID]]||A very simple program that displays information about the CPU that it happens to execute on||{{Tech:C}}, {{Tech:x86 Assembler}}, {{Tech:Win32}}||111||1999&lt;br /&gt;
|-&lt;br /&gt;
|[[Disk Imager]]||Reads, writes, verifies, and erases entire disks into/from [http://en.wikipedia.org/wiki/Disk_image raw image files]. This is similar in principle to [http://www.tux.org/pub/dos/rawrite/ rawrite.exe], but Disk Imager implements a graphical user interface.||{{Tech:C}}, {{Tech:Win32}}||520||1998&lt;br /&gt;
|-&lt;br /&gt;
|[[EzMIDI32]]||A 32-bit version of the ScreenWindow+EasyMIDI libraries that I wrote for Grapevine High School||{{Tech:C++}}, {{Tech:Win32}}||854||1998&lt;br /&gt;
|-&lt;br /&gt;
|[[LPD]]||Written for the [http://www.gcisd-k12.org/ Grapevine-Colleyville Independent School District (GCISD)] to allow employees to send [http://en.wikipedia.org/wiki/AS/400 AS/400] printouts to their local Windows printers. I wrote the piece that translates HP DeskJet 500 compatible instructions into a Windows GDI context.||{{Tech:C}}, {{Tech:Win32}}||1,850||1996-1998&lt;br /&gt;
|-&lt;br /&gt;
|[[PortProxy]]||[http://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP] connection forwarding [http://en.wikipedia.org/wiki/Windows_service service] that I wrote in college so that I could run servers from behind a firewall. When I put Linux onto resnet.bryant.edu, I no longer needed this program, but it&#039;s still cool if you are running [http://en.wikipedia.org/wiki/Microsoft_Windows Windows]. I also wrote a version that runs as a [http://en.wikipedia.org/wiki/System_tray system tray] application in [http://en.wikipedia.org/wiki/Windows_95 Windows 95].||{{Tech:C}}, {{Tech:Win32}}, {{Tech:Sockets}}||1,461||1999&lt;br /&gt;
|-&lt;br /&gt;
|[[ScreenWindowX]]||An {{Tech:ActiveX}} version of [[ScreenWindow]] that I created during the ActiveX hype. This gives [http://en.wikipedia.org/wiki/Internet_Explorer Internet Explorer] pages, [http://en.wikipedia.org/wiki/Component_Object_Model COM] clients, and [http://en.wikipedia.org/wiki/.NET_Framework .NET] applications an easy-to-use text console user interface control.||{{Tech:C++}}, {{Tech:COM}}, {{Tech:Win32}}, {{Tech:ActiveX}}||1,614||1998&lt;br /&gt;
|-&lt;br /&gt;
|[http://kjmouse.sourceforge.net/ KJMouse]||Busy cursor for {{Tech:Java}} that is similar to the launch feedback in [http://en.wikipedia.org/wiki/KDE KDE] 2.2||{{Tech:Java}}, {{Tech:JNI}}, {{Tech:Win32}}, {{Tech:X11}}, {{Tech:Cocoa}}||736||2001-2004&lt;br /&gt;
|-&lt;br /&gt;
|[[CatSetup]]||Scriptable install and uninstall utility for [http://en.wikipedia.org/wiki/Windows_3.1 16-bit Windows] that I wrote in the mid-1990s to ease the distribution of my software. Most of my software from 1994 to 2000 used CatSetup. I eventually switched to using [http://en.wikipedia.org/wiki/Nullsoft_Scriptable_Install_System NSIS] and, later, [http://dennisbareis.com/makemsi.htm MAKEMSI].||{{Tech:C}}, {{Tech:Win16}}||3,676||1994-1998&lt;br /&gt;
|-&lt;br /&gt;
|[[Trig Grapher]]||Plots [http://en.wikipedia.org/wiki/Trigonometry trigonometric functions] in a window. This was my first [http://en.wikipedia.org/wiki/Thread_%28computer_science%29 multi-threaded] {{Tech:Win32}} program, which I wrote in high school for fun. I later back-ported it to {{Tech:Win16}}.||{{Tech:C}}, {{Tech:Win32}}, {{Tech:Win16}}||1,441||1995-1996&lt;br /&gt;
|-&lt;br /&gt;
|[[256-Color SDK]]||Library that I wrote a to easily manage 256-color bitmaps on 256-color displays||{{Tech:C}}, {{Tech:Win16}}||704||1994&lt;br /&gt;
|-&lt;br /&gt;
|[[AudioCD Pictures]]||Displays predefined pictures as a playing CD reaches predefined moments||{{Tech:C}}, {{Tech:Win16}}||550||1994&lt;br /&gt;
|-&lt;br /&gt;
|[[BBS Ads]]||Simply a program that can advertise bulletin board systems, when they used to be popular||{{Tech:C}}, {{Tech:Win16}}||258||1993-1994&lt;br /&gt;
|-&lt;br /&gt;
|[[Bids-to-ASP]]||Converts American Airlines bidsheet files into Procomm Plus for DOS ASPect scripts||{{Tech:C}}, {{Tech:Win16}}||562||1994&lt;br /&gt;
|-&lt;br /&gt;
|[[Horses]]||A fun horse racing strategy game for Windows||{{Tech:C}}, {{Tech:Win16}}||3,348||1995,1997&lt;br /&gt;
|-&lt;br /&gt;
|[[KittyCat! Comm]]||[http://en.wikipedia.org/wiki/Bulletin_board_system Bulletin board system (BBS)] communications program with a [http://en.wikipedia.org/wiki/Dynamic_Data_Exchange dynamic data exchange (DDE)] based [http://en.wikipedia.org/wiki/Application_programming_interface application programming interface (API)] and support for [http://en.wikipedia.org/wiki/ANSI_escape_code ANSI text] and [http://en.wikipedia.org/wiki/Remote_imaging_protocol RIPscrip graphics]. This was never finished due to the Internet and the World Wide Web making it obsolete.||{{Tech:C}}, {{Tech:Win16}}||8,166||1994-1995&lt;br /&gt;
|-&lt;br /&gt;
|[[MCI SendString]]||Allows users to work with the [http://en.wikipedia.org/wiki/Media_Control_Interface Microsoft Windows media control interface (MCI)] with text rather than through pointing and clicking||{{Tech:C}}, {{Tech:Win16}}||212||1994&lt;br /&gt;
|-&lt;br /&gt;
|[[MeowyMIDI]]||A [http://en.wikipedia.org/wiki/SoundFont 1.0 sound font] with cat meows and purrs for [http://en.wikipedia.org/wiki/Sound_Blaster Sound Blaster] AWE32 and AWE64 audio cards||{{Tech:SoundFont}}, {{Tech:MIDI}}||0||1994-1995&lt;br /&gt;
|-&lt;br /&gt;
|[[PCL Page]]||Manipulate [http://en.wikipedia.org/wiki/Printer_Command_Language PCL]-compliant printers with this utility that works in both {{Tech:Win16}} and {{Tech:DOS}}||{{Tech:C}}, {{Tech:Win16}}, {{Tech:DOS}}||196||1995&lt;br /&gt;
|-&lt;br /&gt;
|[[ScreenWindow]]||Text console and {{Tech:MIDI}} library for {{Tech:Win16}} that I wrote so that students at [http://www.gcisd-ghs.org/ Grapevine High School] in first-year computer science class could use MIDI in their music projects using [http://en.wikipedia.org/wiki/Turbo_Pascal Borland&#039;s Turbo Pascal]. When they switched to teaching {{Tech:C++}}, I made a 32-bit version of the library that used {{Tech:Win32}}&#039;s native console rather than my own.||{{Tech:C++}}, {{Tech:C}}, {{Tech:Pascal}}, {{Tech:Win16}}, {{Tech:Win32}}, {{Tech:MIDI}}||2,953||1996-1997&lt;br /&gt;
|-&lt;br /&gt;
|[[AriesType]]||A [http://en.wikipedia.org/wiki/Touch_typing touch typing] education program that I made while I was a freshman in high school. It tied into the local [http://en.wikipedia.org/wiki/Novell_Netware Novell NetWare] network to be a multi-user application with different capabilities given to students, teachers, and system operators. AriesType also included basic local email and paging capabilities.||{{Tech:BASIC}}, {{Tech:DOS}}||4,364||1993-1994&lt;br /&gt;
|-&lt;br /&gt;
|[[IntMap]]||A small image library that I wrote for a Pascal project in high school to provide image drawing, movement, and rotation operations in DOS||{{Tech:Pascal}}, {{Tech:DOS}}, {{Tech:C}}||1,797||1995,1998&lt;br /&gt;
|-&lt;br /&gt;
|[[Jingle Bells]]||A first-year computer science course project to visually and audibly play a [http://en.wikipedia.org/wiki/Christmas_song traditional December holiday song], which I later ported to Windows using [[ScreenWindow]]||{{Tech:Pascal}}, {{Tech:DOS}}, {{Tech:C}}, {{Tech:Win16}}, {{Tech:Win32}}, {{Tech:MIDI}}||611||1994,1996&lt;br /&gt;
|-&lt;br /&gt;
|[[SLOS-DOS]]||A small interpreted toy operating environment written in BASIC for DOS. Programs are written in a trivial and limited scripting language.||{{Tech:BASIC}}, {{Tech:DOS}}||1,277||1993&lt;br /&gt;
|-&lt;br /&gt;
|[[SLOS-Win]]||Windows version of [[SLOS-DOS|SLOS]], a small interpreted toy operating environment written in BASIC for DOS. Programs are written in a trivial and limited scripting language.||{{Tech:C++}}, {{Tech:Win16}}||1,679||1993&lt;br /&gt;
|-&lt;br /&gt;
|[[TSNHead]]||Kept track of how much time my brothers and I spent on [http://en.wikipedia.org/wiki/The_Sierra_Network The Sierra Network (TSN)]||{{Tech:BASIC}}, {{Tech:DOS}}||291||1992&lt;br /&gt;
|-&lt;br /&gt;
|[[TrackTrek]]||A track meet program that &amp;quot;keeps track&amp;quot; of events and allows others to view scores in realtime. This was my first {{Tech:Java}} program. This was more of a self-driven academic exercise as the project was never finished.||{{Tech:Java}}, {{Tech:AWT}}||3,690||1996-1998&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.moonlightdesign.org/thunderforce/ Thunderforce]||An open-source Mozilla Thunderbird extension for Salesforce.com. This project is now abandoned due to other priorities and interests.||{{Tech:JavaScript}}, {{Tech:XPCOM}}, {{Tech:C++}}, {{Tech:XUL}}, {{Tech:Subversion}}, {{Tech:MediaWiki}}||5,411||2007-2009&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Software and project contributions===&lt;br /&gt;
I contributed to the following projects:&lt;br /&gt;
{|class=&amp;quot;software sortable&amp;quot;&lt;br /&gt;
!Name&lt;br /&gt;
!Description&lt;br /&gt;
!Technologies&lt;br /&gt;
!SLOC&lt;br /&gt;
!Year&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.mozilla.org/ Mozilla]||[https://www.moonlightdesign.org/startfirefox/ Workaround code] for a shutdown bug in Firefox ([https://bugzilla.mozilla.org/show_bug.cgi?id=239223 bug 239223]) and helped others find the cause of a [https://bugzilla.mozilla.org/show_bug.cgi?id=245742 NTLM authentication crash] in a pre-Firefox build|| ||156||2005&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.samba.org/ Samba]||[https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=134570 Patch] to allow the use of 32-bit user and group IDs in smbmnt|| ||11||2004&lt;br /&gt;
|-&lt;br /&gt;
|[http://pan.rebelbase.com/ Pan]||Contributed a small multi-threaded bugfix to a function that was crashing on several important dialog boxes in version 0.6.3|| ||small||1999&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.php.net/ PHP]||Contributed the [http://us.php.net/snmpset snmpset()] function to [http://cvs.php.net/viewvc.cgi/php3/functions/?pathrev=php_3_0_12 PHP 3.0.12] and [http://cvs.php.net/viewvc.cgi/php-src/ext/snmp/?pathrev=php_4_0b2-2 PHP4 Beta2] so that [[ResNet Online]] could turn on the ResHall ports when students registered their computers||{{Tech:C}}, {{Tech:Net-SNMP}}, {{Tech:CVS}}||172||1999&lt;br /&gt;
|-&lt;br /&gt;
|[http://spruce.sourceforge.net/ Spruce]||Contributed several small usability patches and a fix for a thread-based crash that brought down Spruce while checking messages in previous versions||{{Tech:C}}, {{Tech:GLib}} threads, {{Tech:GTK+}}||200||2000&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.opensuse.org/ Novell openSUSE]||Fixed bugs related to [https://bugzilla.novell.com/show_bug.cgi?id=343891 LVM on a USB boot drive] and [https://bugzilla.novell.com/show_bug.cgi?id=410736 J-Pilot thinking that the username is always wrong on 64-bit platforms], and added a [https://bugzilla.novell.com/show_bug.cgi?id=328116 workaround for Bluetooth DUND issues]. [https://bugzilla.novell.com/buglist.cgi?query_format=advanced&amp;amp;short_desc_type=allwordssubstr&amp;amp;short_desc=&amp;amp;long_desc_type=fulltext&amp;amp;long_desc=&amp;amp;bug_file_loc_type=allwordssubstr&amp;amp;bug_file_loc=&amp;amp;status_whiteboard_type=allwordssubstr&amp;amp;status_whiteboard=&amp;amp;keywords_type=anywords&amp;amp;keywords=&amp;amp;emailassigned_to1=1&amp;amp;emailreporter1=1&amp;amp;emailinfoprovider1=1&amp;amp;emailcc1=1&amp;amp;emaillongdesc1=1&amp;amp;emailtype1=exact&amp;amp;email1=novell%40moonlightdesign.org&amp;amp;emailassigned_to2=1&amp;amp;emailreporter2=1&amp;amp;emailqa_contact2=1&amp;amp;emailcc2=1&amp;amp;emailtype2=substring&amp;amp;email2=&amp;amp;bugidtype=include&amp;amp;bug_id=&amp;amp;votes=&amp;amp;chfieldfrom=&amp;amp;chfieldto=Now&amp;amp;chfieldvalue=&amp;amp;cmdtype=doit&amp;amp;order=Reuse+same+sort+as+last+time&amp;amp;field0-0-0=noop&amp;amp;type0-0-0=noop&amp;amp;value0-0-0= Full bug list].||{{Tech:C}}||small||2007-2008&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.bryant.edu/ Bryant University]||During the Spring of 1998, I enhanced Bryant&#039;s main page with rollovers and images. Other miscellaneous pages were also updated, and the [http://www.moonlightdesign.org/dirlist/ DirList] project was started originally as a web directory for Bryant.||{{Tech:JavaScript}}, {{Tech:HTML}}||small||1998-1999&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Lines of code were computed using [http://www.dwheeler.com/sloccount/ SLOCCount] and, for extensions not supported by SLOCCount, &amp;lt;code&amp;gt;find . -iname \*\\.js -print0 -or -iname \*\\.bs2 -print0 -or -iname \*\\.idl -print0 -or -iname \*\\.asp -print0 -or -iname \*\\.clp -print0 -or -iname \*\\.xul -print0 -or -iname \*\\.bas -print0 -or -iname \*\\.exc -print0| xargs -0 -Ixxx cat xxx| grep &amp;quot;[a-zA-Z0-9]&amp;quot;|wc -l&amp;lt;/code&amp;gt;. SLOC counts that relate to San Francisco AIDS Foundation software that has not been made open-source were computed during my final months of employment; Carnegie Mellon University asked for those numbers as part of the admission process. Generated code is excluded from the SLOC counts. With generated code, such as the [[Reggie/CIS]] code generated from [http://java.sun.com/j2se/1.4.2/docs/guide/rmi-iiop/toJavaPortableUG.html idlj], the SLOC counts balloon significantly.&lt;br /&gt;
&lt;br /&gt;
==Employment History==&lt;br /&gt;
&lt;br /&gt;
===[http://www.salesforce.com/ Salesforce.com]===&lt;br /&gt;
*&#039;&#039;&#039;Senior Member of the Technical Staff: [http://developer.force.com/sites Force.com Sites], Core Infrastructure, Security, and [http://wiki.developerforce.com/index.php/Web_Services_API API] Teams&#039;&#039;&#039;&lt;br /&gt;
*January 2007 to present&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**Brought attention to specific [http://en.wikipedia.org/wiki/Cross-site_scripting cross-site scripting (XSS)] vulnerabilities by writing a Firefox Firebug extension that looked for improper string escaping in a test org that had been specially populated with attack strings by another tool and having quality engineers from every functional team test the system with the Firebug extension running. This led to the identification and resolution of a large number of vulnerabilities, thus making Salesforce.com even more secure. A security research firm later commended Salesforce.com&#039;s security, saying that they couldn&#039;t find any XSS or cross site request forgery (CSRF) vulnerabilities, despite looking for them over the course of several days.&lt;br /&gt;
**Championed an improvement to an anti-phishing feature&#039;s design successfully, and that improvement is patent-pending&lt;br /&gt;
**Resolved customer cases related to the [http://wiki.apexdevnet.com/index.php/Web_Services_API application programming interface] (API) and [http://en.wikipedia.org/wiki/Secure_Sockets_Layer secure sockets layer] (SSL), quickly becoming a go-to person for HTTPS and SSL&lt;br /&gt;
**Improved an internal production testing tool&#039;s scheduling of tests by adding prerequisite expressions to increase test parallelization&lt;br /&gt;
**Built the initial security testing framework for [http://wiki.apexdevnet.com/index.php/Partner_Access_Controls package access controls], which helped quickly bring that feature to market with confidence in its quality and security&lt;br /&gt;
**Designed and began to implement a Thunderbird add-on for Salesforce.com: [https://www.moonlightdesign.org/thunderforce Thunderforce]&lt;br /&gt;
**Enhanced the user interface of, added Apache Ant build files to, significantly improved the configuration system of, and added multiple-window browser screenshots to an internal production testing tool that is used by multiple teams&lt;br /&gt;
**Created and automated anti-phishing and security test scenarios&lt;br /&gt;
**Automated HTTPS troubleshooting with an internal utility for support representatives that substantially reduced the number of escalated HTTPS cases&lt;br /&gt;
**Ensured that new releases of the core product did not break older API versions through gold files and automated testing&lt;br /&gt;
**Established a methodology for determining equivalence partition coverage in the test cases for the [http://www.salesforce.com/us/developer/docs/api/Content/sforce_api_calls_soql.htm Salesforce.com object query language (SOQL)]&lt;br /&gt;
**Assisted developers and quality engineers with installing and maintaining [http://www.opensuse.org/ Novell openSUSE Linux] on their primary desktops&lt;br /&gt;
&lt;br /&gt;
===[http://www.sfaf.org/ San Francisco AIDS Foundation]===&lt;br /&gt;
*&#039;&#039;&#039;Database Administrator and Software Engineer&#039;&#039;&#039;&lt;br /&gt;
*September 2000 to July 2005&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**Maintained a [[Reggie/CIS|large 200-user multi-tenant three-tiered system]] used by all Ryan White CARE-funded AIDS service organizations in San Francisco in collaboration with the Department of Public Health AIDS Office of San Francisco and two direct partners. That involved all aspects of the software development lifecycle as well as server and client deployments, network maintenance, and top-tier user support.&lt;br /&gt;
**Gathered requirements for new features collaboratively with stakeholders, designed those features, coded them, tested them, and deployed them&lt;br /&gt;
**Assisted the other database administrator with the foundation&#039;s customized [[SFAF CRM|customer relationship management]] (CRM) and [[DonorPerfect Online|donor relationship management]] systems&lt;br /&gt;
**Implemented large parts of the data conversion and customization of the Foundation&#039;s purchased donor relationship management system&lt;br /&gt;
**Secured the Internet-facing presence of the donor relationship management system using a locked-down Apache configuration and strict URL regular expressions&lt;br /&gt;
**Obviated a need for Crystal Reports by implementing web-based [[PDF Access Reports|PDF reports]] using Microsoft Access, a customized PHP build to run as a COM server, and a custom-built COM object for use by ASP on the reporting server, saving a significant amount of money&lt;br /&gt;
**Migrated client operating system data during the Windows XP transition using a [[Home Profiler|multi-platform profile migration tool]] that I wrote&lt;br /&gt;
**Planned, deployed, and provided training for Mozilla Firefox as the default web browser to all foundation users and created [https://www.moonlightdesign.org/urllock IE URL Lock] for business-related sites that only worked in Internet Explorer&lt;br /&gt;
**Evaluated, purchased, and managed the licenses of software related to Reggie/CIS&lt;br /&gt;
**Maintained the Cisco network equipment, including the PIX firewall&#039;s access control lists (ACLs) and routers&#039; virtual local area network (VLAN) ACLs&lt;br /&gt;
**Cut unsolicited commercial email (UCE or SPAM) drastically and added virtual private networking (VPN) using Astaro Secure Linux (ASL) in the demilitarized zone (DMZ) behing the Cisco PIX firewall&lt;br /&gt;
**Administered databases, servers, and the organization&#039;s backup system&lt;br /&gt;
&lt;br /&gt;
===[http://www.ariesnet.com/ Ariesnet]===&lt;br /&gt;
*&#039;&#039;&#039;Intranet Developer&#039;&#039;&#039;&lt;br /&gt;
*May 1999 to August 1999 and May 2000 to July 2000&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**Developed specifications for a statistical employee rating system to help Ariesnet move towards building teams of virtual at−home employees&lt;br /&gt;
**Helped Ariesnet build their secure intranet system using PHP and MySQL&lt;br /&gt;
**Administered the intranet system&#039;s Linux server as well as the development test server using the CVS versioning software&lt;br /&gt;
&lt;br /&gt;
===[http://www.bryant.edu/ Bryant University]===&lt;br /&gt;
*&#039;&#039;&#039;ResNet Consultant&#039;&#039;&#039;&lt;br /&gt;
**January 1999 to May 2000&lt;br /&gt;
**&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
***Shortened residence hall computer registration port activation turnaround times from two weeks to one second with a [[ResNet Online|custom-written Linux-based PHP web site]]&lt;br /&gt;
***Provided in-person network and computer support to students living in the university&#039;s residence halls&lt;br /&gt;
*&#039;&#039;&#039;Internet Developer&#039;&#039;&#039;&lt;br /&gt;
**January 1998 to May 1998 and September 1998 to May 1999&lt;br /&gt;
**&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
***Implemented the university’s first web-based faculty and student directory using the common gateway interface (CGI)&lt;br /&gt;
***Wrote an ODBC driver and Microsoft Access database for its administration. This lives on as the [https://www.moonlightdesign.org/dirlist/ DirList2] open-source project&lt;br /&gt;
&lt;br /&gt;
===[http://www.gcisd-k12.org/ Grapevine-Colleyville Independent School District]===&lt;br /&gt;
*&#039;&#039;&#039;Student Intern&#039;&#039;&#039;&lt;br /&gt;
*January 1996 to August 1997&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**Provided hardware and software support, winning an employee award for exceptional service&lt;br /&gt;
**Worked with wide-area network configurations&lt;br /&gt;
**Wrote a [[LPD|networked printer driver]] to save thousands of dollars in licenses by allowing printing from their AS/400s to local printers&lt;br /&gt;
&lt;br /&gt;
==Education and Training==&lt;br /&gt;
&lt;br /&gt;
===[http://www.cmu.edu Carnegie Mellon University]===&lt;br /&gt;
*&#039;&#039;&#039;[http://www.mse.cs.cmu.edu/ Master of Software Engineering]&#039;&#039;&#039;, [http://www.isri.cmu.edu/index.jsp Institute of Software Research]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Pittsburgh%2C_Pennsylvania Pittsburgh, Pennsylvania]&lt;br /&gt;
*&#039;&#039;&#039;Graduation:&#039;&#039;&#039; December 2006&lt;br /&gt;
*&#039;&#039;&#039;Masters group project:&#039;&#039;&#039; [[Serendipity|Bosch Security Configuration Assistant]], which is an [http://www.eclipse.org/ Eclipse-based] application that generates three-dimensional security plans for buildings using the [http://en.wikipedia.org/wiki/Jess_programming_language Jess] [http://en.wikipedia.org/wiki/Rule_engine rule engine] and three-dimensional visualization&lt;br /&gt;
*&#039;&#039;&#039;Project roles:&#039;&#039;&#039; Technology support manager and, via rotation, planning manager, software process manager, project risk manager, and quality manager&lt;br /&gt;
*&#039;&#039;&#039;Focus areas studied:&#039;&#039;&#039; Fault tolerant, distributed, real-time systems; software project management; formal models and analysis of software systems; software architecture; and software requirements elicitation methods&lt;br /&gt;
*&#039;&#039;&#039;Accomplishments&#039;&#039;&#039;&lt;br /&gt;
**As a team, we met and exceeded our client&#039;s original picture of success by the end of the project&#039;s one-year time frame.&lt;br /&gt;
**I reduced the status meeting data collection time to less than 30 minutes through automation and used historical data to reduce our estimation error.&lt;br /&gt;
**As the support manager, I kept our [http://fedoraproject.org/ RedHat Fedora Core] server and software available, secure, usable, and backed up using only one hour per week of my time on average throughout the project.&lt;br /&gt;
*&#039;&#039;&#039;[http://www.cmu.edu/hub/reg/grading.html Quality point average]:&#039;&#039;&#039; Graduated with 4.03 out of 4.00, which is a weighted grade point average (GPA), due to earning several A+ grades&lt;br /&gt;
&lt;br /&gt;
===[http://www.bryant.edu/ Bryant University]===&lt;br /&gt;
*&#039;&#039;&#039;[http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Undergraduate%20Programs/ Bachelor of Science in Business Administration]&#039;&#039;&#039;&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Smithfield%2C_Rhode_Island Smithfield, Rhode Island]&lt;br /&gt;
*&#039;&#039;&#039;Graduation:&#039;&#039;&#039; May 2000&lt;br /&gt;
*[http://www.aacsb.edu/ AACSB] [http://www.aacsb.edu/members/Omd/Profile_page2.asp?LinkId=38588&amp;amp;CallingPage=InstLists Accredited]&lt;br /&gt;
*&#039;&#039;&#039;Focus areas studied:&#039;&#039;&#039; [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Computer%20Information%20Systems Computer information systems] with a minor in [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Applied%20Statistics applied business statistics]&lt;br /&gt;
*&#039;&#039;&#039;[http://en.wikipedia.org/wiki/GPA#United_States Grade point average]:&#039;&#039;&#039; Graduated [http://en.wikipedia.org/wiki/Summa_cum_laude summa cum laude] with a GPA of 3.96 out of 4.00&lt;br /&gt;
*&#039;&#039;&#039;Leadership:&#039;&#039;&#039; Served as president of [http://web.bryant.edu/~pride Bryant PRIDE] for more than a year and conducted a [http://en.wikipedia.org/wiki/Linux Linux] installation event&lt;br /&gt;
&lt;br /&gt;
===Certification===&lt;br /&gt;
*&#039;&#039;&#039;[https://www.redhat.com/training/rhce/courses/ RedHat Certified Engineer]&#039;&#039;&#039; (RHCE for 6.2): [https://www.redhat.com/training/certification/verify/ 806200565301847]&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2282</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2282"/>
		<updated>2015-03-07T17:01:18Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Steven Lawrance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
Welcome to Moonlight Design -- the personal web site of [[Henry Lamb]] and [[Steven Lawrance]]&lt;br /&gt;
&lt;br /&gt;
==Henry Lamb==&lt;br /&gt;
[[Henry Lamb]] is a professional [http://en.wikipedia.org/wiki/Restaurant restaurateur] trained in both [http://www.baychef.com/programs/hospitality_and_restaurant.asp restaurant management] and [http://www.baychef.com/programs/culinary_arts.asp culinary arts] at the [http://www.baychef.com/ California Culinary Academy]. For a few years from the late 1990s to the early 2000s, Henry was a [http://en.wikipedia.org/wiki/Graphic_designer graphic designer] trained at the [http://www.artinstitutes.edu/sanfrancisco/ Art Institute of San Francisco] and the [http://www.academyart.edu/ Academy of Art University]&lt;br /&gt;
&lt;br /&gt;
Visit Henry&#039;s new wine site: [http://glassofgrape.com/ Glass of Grape]&lt;br /&gt;
&lt;br /&gt;
==Steven Lawrance==&lt;br /&gt;
[[Steven Lawrance]] is an active practitioner of [http://en.wikipedia.org/wiki/Software_engineering software engineering] and [http://en.wikipedia.org/wiki/Open-source_software open-source software enthusiast] trained in [http://www.mse.cs.cmu.edu/ software engineering] at [http://www.mse.cs.cmu.edu/ Carnegie Mellon University] and [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Undergraduate%20Programs/ business administration] with [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Computer%20Information%20Systems computer information systems] at [http://www.bryant.edu/ Bryant University]&lt;br /&gt;
&lt;br /&gt;
[[Steven Lawrance#Software Project Experience|Check out the list of software that Steven has either written or contributed to]]&lt;br /&gt;
&lt;br /&gt;
|valign=&amp;quot;top&amp;quot; width=&amp;quot;25%&amp;quot;|&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://www.moonlightdesign.org/urllock/ IE URL Lock]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[http://gnucashtoqif.sourceforge.net/ GnuCashToQIF]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;4&amp;quot;&amp;gt;[[TLS-SSL-Protocols|TLS/SSL Protocol Group Policy Template]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[https://www.moonlightdesign.org/dirlist DirList] [[CompactOnDelete]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[[PortProxy]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Serendipity|Team Serendipity]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Disk Imager]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[[ScreenWindowX]]&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;small&amp;gt;[https://www.moonlightdesign.org/wireless/ Guest wireless network sign-up] (local network only)&amp;lt;/small&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2281</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2281"/>
		<updated>2014-10-31T14:10:34Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
Welcome to Moonlight Design -- the personal web site of [[Henry Lamb]] and [[Steven Lawrance]]&lt;br /&gt;
&lt;br /&gt;
==Henry Lamb==&lt;br /&gt;
[[Henry Lamb]] is a professional [http://en.wikipedia.org/wiki/Restaurant restaurateur] trained in both [http://www.baychef.com/programs/hospitality_and_restaurant.asp restaurant management] and [http://www.baychef.com/programs/culinary_arts.asp culinary arts] at the [http://www.baychef.com/ California Culinary Academy]. For a few years from the late 1990s to the early 2000s, Henry was a [http://en.wikipedia.org/wiki/Graphic_designer graphic designer] trained at the [http://www.artinstitutes.edu/sanfrancisco/ Art Institute of San Francisco] and the [http://www.academyart.edu/ Academy of Art University]&lt;br /&gt;
&lt;br /&gt;
Visit Henry&#039;s new wine site: [http://glassofgrape.com/ Glass of Grape]&lt;br /&gt;
&lt;br /&gt;
==Steven Lawrance==&lt;br /&gt;
[[Steven Lawrance]] is an active practitioner of [http://en.wikipedia.org/wiki/Software_engineering software engineering] and [http://en.wikipedia.org/wiki/Open-source_software open-source software enthusiast] trained in [http://www.mse.cs.cmu.edu/ software engineering] at [http://www.mse.cs.cmu.edu/ Carnegie Mellon University] and [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Undergraduate%20Programs/ business administration] with [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Computer%20Information%20Systems computer information systems] at [http://www.bryant.edu/ Bryant University]&lt;br /&gt;
&lt;br /&gt;
[[Steven Lawrance#Software Project Experience|Check out the list of software that Steve has either written or contributed to]]&lt;br /&gt;
&lt;br /&gt;
|valign=&amp;quot;top&amp;quot; width=&amp;quot;25%&amp;quot;|&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://www.moonlightdesign.org/urllock/ IE URL Lock]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[http://gnucashtoqif.sourceforge.net/ GnuCashToQIF]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;4&amp;quot;&amp;gt;[[TLS-SSL-Protocols|TLS/SSL Protocol Group Policy Template]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[https://www.moonlightdesign.org/dirlist DirList] [[CompactOnDelete]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[[PortProxy]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Serendipity|Team Serendipity]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Disk Imager]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[[ScreenWindowX]]&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;small&amp;gt;[https://www.moonlightdesign.org/wireless/ Guest wireless network sign-up] (local network only)&amp;lt;/small&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2280</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2280"/>
		<updated>2014-10-31T14:09:40Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
Welcome to Moonlight Design -- the personal web site of [[Henry Lamb]] and [[Steven Lawrance]]&lt;br /&gt;
&lt;br /&gt;
==Henry Lamb==&lt;br /&gt;
[[Henry Lamb]] is a professional [http://en.wikipedia.org/wiki/Restaurant restaurateur] trained in both [http://www.baychef.com/programs/hospitality_and_restaurant.asp restaurant management] and [http://www.baychef.com/programs/culinary_arts.asp culinary arts] at the [http://www.baychef.com/ California Culinary Academy]. For a few years from the late 1990s to the early 2000s, Henry was a [http://en.wikipedia.org/wiki/Graphic_designer graphic designer] trained at the [http://www.artinstitutes.edu/sanfrancisco/ Art Institute of San Francisco] and the [http://www.academyart.edu/ Academy of Art University]&lt;br /&gt;
&lt;br /&gt;
Visit Henry&#039;s new wine site: [http://glassofgrape.com/ Glass of Grape]&lt;br /&gt;
&lt;br /&gt;
==Steven Lawrance==&lt;br /&gt;
[[Steven Lawrance]] is an active practitioner of [http://en.wikipedia.org/wiki/Software_engineering software engineering] and [http://en.wikipedia.org/wiki/Open-source_software open-source software enthusiast] trained in [http://www.mse.cs.cmu.edu/ software engineering] at [http://www.mse.cs.cmu.edu/ Carnegie Mellon University] and [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Undergraduate%20Programs/ business administration] with [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Computer%20Information%20Systems computer information systems] at [http://www.bryant.edu/ Bryant University]&lt;br /&gt;
&lt;br /&gt;
[[Steven Lawrance#Software Project Experience|Check out the list of software that Steve has either written or contributed to]]&lt;br /&gt;
&lt;br /&gt;
|valign=&amp;quot;top&amp;quot; width=&amp;quot;25%&amp;quot;|&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://www.moonlightdesign.org/urllock/ IE URL Lock]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[http://gnucashtoqif.sourceforge.net/ GnuCashToQIF]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;4&amp;quot;&amp;gt;[[TLS-SSL-Protocols|TLS/SSL Protocol Group Policy Template]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[https://www.moonlightdesign.org/dirlist DirList] [[CompactOnDelete]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[[PortProxy]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Serendipity|Team Serendipity]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Disk Imager]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[[ScreenWindowX]]&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;small&amp;gt;[https://www.moonlightdesign.org/wireless/ Guest wireless network sign-up] (local network only)&amp;lt;/small&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
[https://www.moonlightdesign.org/msy.pdf test]&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2279</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2279"/>
		<updated>2014-10-20T13:40:49Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Configure Without Group Policies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page also includes registry merge files for convenience.&lt;br /&gt;
&lt;br /&gt;
==Configure With Group Policies==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can theoretically improve security further, but when this was tested in Windows 8 with Internet Explorer 11, Internet Explorer 11 wouldn&#039;t start up successfully until TLS 1.0 was enabled in Schannel. As a result, TLS 1.0 will need to be left enabled in Windows Schannel, even if it&#039;s disabled in Internet Explorer.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Recommended.reg Recommended: TLS 1.2, 1.1, and 1.0]&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Best.reg Windows 7 Best Security: TLS 1.2 only]&lt;br /&gt;
**A significant number of web sites on the Internet won&#039;t work at this time with this configuration.&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file. Internet Explorer 11 doesn&#039;t start in Windows 8 when TLS 1.0 is disabled in Schannel.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Good.reg Windows 7 Good Security: TLS 1.2 and 1.1]&lt;br /&gt;
**A significant number of web sites on the Internet won&#039;t work at this time with this configuration.&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file. Internet Explorer 11 doesn&#039;t start in Windows 8 when TLS 1.0 is disabled in Schannel.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-Vista-XP.reg Windows Vista/XP: TLS 1.0 Only]&lt;br /&gt;
**Don&#039;t use this on Windows 7, Windows Server 2008 R2, or newer as it disables TLS 1.1 and TLS 1.2 in Internet Explorer.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Insecure.reg Insecure: SSL 3.0 and TLS 1.0]&lt;br /&gt;
**Don&#039;t use this unless if absolutely necessary. This configuration opens up your https connections to attack and should be considered equivalent to having no encryption.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Highly-Insecure.reg Highly Insecure: SSL 3.0 only]&lt;br /&gt;
**Don&#039;t use this unless if absolutely necessary. This configuration opens up your https connections to attack and should be considered equivalent to having no encryption.&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2278</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2278"/>
		<updated>2014-10-20T13:39:45Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Configure Without Group Policies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page also includes registry merge files for convenience.&lt;br /&gt;
&lt;br /&gt;
==Configure With Group Policies==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can theoretically improve security further, but when this was tested in Windows 8 with Internet Explorer 11, Internet Explorer 11 wouldn&#039;t start up successfully until TLS 1.0 was enabled in Schannel. As a result, TLS 1.0 will need to be left enabled in Windows Schannel, even if it&#039;s disabled in Internet Explorer.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Recommended.reg Recommended: TLS 1.2, 1.1, and 1.0]&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Best.reg Windows 7 Best Security: TLS 1.2 only]&lt;br /&gt;
**A significant number of web sites on the Internet won&#039;t work at this time with this configuration.&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file. Internet Explorer 11 doesn&#039;t start in Windows 8 when TLS 1.0 is disabled in Schannel.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Good.reg Windows 7 Good Security: TLS 1.2 and 1.1]&lt;br /&gt;
**A significant number of web sites on the Internet won&#039;t work at this time with this configuration.&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file. Internet Explorer 11 doesn&#039;t start in Windows 8 when TLS 1.0 is disabled in Schannel.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-Vista-XP.reg Windows Vista/XP: TLS 1.0 Only]&lt;br /&gt;
**Don&#039;t use this on Windows 7, Windows Server 2008 R2, or newer as it disables TLS 1.1 and TLS 1.2 in Internet Explorer.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Insecure.reg Insecure: SSL 3.0 and TLS 1.0]&lt;br /&gt;
**Don&#039;t use this unless if absolutely necessary. This configuration opens up your https connections to attack and should be equivalent to having no encryption.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Highly-Insecure.reg Highly Insecure: SSL 3.0 only]&lt;br /&gt;
**Don&#039;t use this unless if absolutely necessary. This configuration opens up your https connections to attack and should be equivalent to having no encryption.&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2277</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2277"/>
		<updated>2014-10-18T22:54:09Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Configure With Group Policies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page also includes registry merge files for convenience.&lt;br /&gt;
&lt;br /&gt;
==Configure With Group Policies==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can theoretically improve security further, but when this was tested in Windows 8 with Internet Explorer 11, Internet Explorer 11 wouldn&#039;t start up successfully until TLS 1.0 was enabled in Schannel. As a result, TLS 1.0 will need to be left enabled in Windows Schannel, even if it&#039;s disabled in Internet Explorer.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Recommended.reg Recommended: TLS 1.2, 1.1, and 1.0]&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Best.reg Windows 7 Best Security: TLS 1.2 only]&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file. Internet Explorer 11 doesn&#039;t start in Windows 8 when TLS 1.0 is disabled in Schannel.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Good.reg Windows 7 Good Security: TLS 1.2 and 1.1]&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file. Internet Explorer 11 doesn&#039;t start in Windows 8 when TLS 1.0 is disabled in Schannel.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-Vista-XP.reg Windows Vista/XP: TLS 1.0 Only]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Insecure.reg Insecure: SSL 3.0 and TLS 1.0]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Highly-Insecure.reg Highly Insecure: SSL 3.0 only]&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2276</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2276"/>
		<updated>2014-10-18T22:47:18Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Configure Without Group Policies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page also includes registry merge files for convenience.&lt;br /&gt;
&lt;br /&gt;
==Configure With Group Policies==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Recommended.reg Recommended: TLS 1.2, 1.1, and 1.0]&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Best.reg Windows 7 Best Security: TLS 1.2 only]&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file. Internet Explorer 11 doesn&#039;t start in Windows 8 when TLS 1.0 is disabled in Schannel.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Good.reg Windows 7 Good Security: TLS 1.2 and 1.1]&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file. Internet Explorer 11 doesn&#039;t start in Windows 8 when TLS 1.0 is disabled in Schannel.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-Vista-XP.reg Windows Vista/XP: TLS 1.0 Only]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Insecure.reg Insecure: SSL 3.0 and TLS 1.0]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Highly-Insecure.reg Highly Insecure: SSL 3.0 only]&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2275</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2275"/>
		<updated>2014-10-18T22:23:37Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Configure Without Group Policies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page also includes registry merge files for convenience.&lt;br /&gt;
&lt;br /&gt;
==Configure With Group Policies==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Recommended.reg Recommended: TLS 1.2, 1.1, and 1.0]&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Best.reg Windows 7 Best Security: TLS 1.2 only]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Good.reg Windows 7 Good Security: TLS 1.2 and 1.1]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-Vista-XP.reg Windows Vista/XP: TLS 1.0 Only]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Insecure.reg Insecure: SSL 3.0 and TLS 1.0]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Highly-Insecure.reg Highly Insecure: SSL 3.0 only]&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer with this file.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2274</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2274"/>
		<updated>2014-10-18T22:23:17Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page also includes registry merge files for convenience.&lt;br /&gt;
&lt;br /&gt;
==Configure With Group Policies==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Recommended.reg Recommended: TLS 1.2, 1.1, and 1.0]&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Best.reg Windows 7 Best Security: TLS 1.2 only]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Good.reg Windows 7 Good Security: TLS 1.2 and 1.1]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-Vista-XP.reg Windows Vista/XP: TLS 1.0 Only]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Insecure.reg Insecure: SSL 3.0 and TLS 1.0]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Highly-Insecure.reg Highly Insecure: SSL 3.0 only]&lt;br /&gt;
**TLS 1.0 remains enabled in Windows Schannel, but it&#039;s off in Internet Explorer in this file.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2273</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2273"/>
		<updated>2014-10-18T22:15:02Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page also includes registry merge files for convenience.&lt;br /&gt;
&lt;br /&gt;
==Configure With Group Policies==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Recommended.reg Recommended: TLS 1.2, 1.1, and 1.0]&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Best.reg Windows 7 Best Security: TLS 1.2 only]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-7-Good.reg Windows 7 Good Security: TLS 1.2 and 1.1]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Windows-Vista-XP.reg Windows Vista/XP: TLS 1.0 Only]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Insecure.reg Insecure: SSL 3.0 and TLS 1.0]&lt;br /&gt;
*[https://www.moonlightdesign.org/dl/TLS-SSL-Highly-Insecure.reg Highly Insecure: SSL 3.0 only]&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2272</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2272"/>
		<updated>2014-10-18T22:03:48Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page includes registry merge files.&lt;br /&gt;
&lt;br /&gt;
==Configure With Group Policies==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*Recommended: TLS 1.2, 1.1, and 1.0&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*Windows 7 Best Security: TLS 1.2 only&lt;br /&gt;
*Windows 7 Good Security: TLS 1.2 and 1.1&lt;br /&gt;
*Windows Vista/XP: TLS 1.0 Only&lt;br /&gt;
*Insecure: SSL 3.0 and TLS 1.0&lt;br /&gt;
*Highly Insecure: SSL 3.0 only&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2271</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2271"/>
		<updated>2014-10-18T22:03:23Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
To handle systems that are not covered by group policies, this page includes registry merge files.&lt;br /&gt;
&lt;br /&gt;
==Include in a Group Policy==&lt;br /&gt;
To use the group policies, you&#039;ll need to install the policy template file. The policy template includes two group policy targets for configuration: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Installation===&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;br /&gt;
&lt;br /&gt;
==Configure Without Group Policies==&lt;br /&gt;
To quickly configure a computer that doesn&#039;t have group policies, it is possible to use a registry merge file. The following files implement their stated configuration scenarios:&lt;br /&gt;
*Recommended: TLS 1.2, 1.1, and 1.0&lt;br /&gt;
**Compatible with all versions of Windows that implement TLS 1.0, including those that don&#039;t implement TLS 1.1 and 1.2.&lt;br /&gt;
*Windows 7 Best Security: TLS 1.2 only&lt;br /&gt;
*Windows 7 Good Security: TLS 1.2 and 1.1&lt;br /&gt;
*Windows Vista/XP: TLS 1.0 Only&lt;br /&gt;
*Insecure: SSL 3.0 and TLS 1.0&lt;br /&gt;
*Highly Insecure: SSL 3.0 only&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2270</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2270"/>
		<updated>2014-10-18T18:42:57Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* TLS/SSL Protocols */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Group Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button, as shown in the screenshot below. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2269</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2269"/>
		<updated>2014-10-18T18:42:31Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* TLS/SSL Protocols */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Group Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2268</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2268"/>
		<updated>2014-10-18T18:42:00Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* TLS/SSL Protocols */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Group Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer-SSLv3Client.png|650px]]&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2267</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2267"/>
		<updated>2014-10-18T18:02:51Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note that Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Group Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2266</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=Main_Page&amp;diff=2266"/>
		<updated>2014-10-18T18:01:03Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
Welcome to Moonlight Design -- the personal web site of [[Henry Lamb]] and [[Steven Lawrance]]&lt;br /&gt;
&lt;br /&gt;
==Henry Lamb==&lt;br /&gt;
[[Henry Lamb]] is a professional [http://en.wikipedia.org/wiki/Restaurant restaurateur] trained in both [http://www.baychef.com/programs/hospitality_and_restaurant.asp restaurant management] and [http://www.baychef.com/programs/culinary_arts.asp culinary arts] at the [http://www.baychef.com/ California Culinary Academy]. For a few years from the late 1990s to the early 2000s, Henry was a [http://en.wikipedia.org/wiki/Graphic_designer graphic designer] trained at the [http://www.artinstitutes.edu/sanfrancisco/ Art Institute of San Francisco] and the [http://www.academyart.edu/ Academy of Art University]&lt;br /&gt;
&lt;br /&gt;
Visit Henry&#039;s new wine site: [http://glassofgrape.com/ Glass of Grape]&lt;br /&gt;
&lt;br /&gt;
==Steven Lawrance==&lt;br /&gt;
[[Steven Lawrance]] is an active practitioner of [http://en.wikipedia.org/wiki/Software_engineering software engineering] and [http://en.wikipedia.org/wiki/Open-source_software open-source software enthusiast] trained in [http://www.mse.cs.cmu.edu/ software engineering] at [http://www.mse.cs.cmu.edu/ Carnegie Mellon University] and [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Undergraduate%20Programs/ business administration] with [http://www.bryant.edu/wps/wcm/connect/Bryant/Academics/Areas%20of%20Study/Computer%20Information%20Systems computer information systems] at [http://www.bryant.edu/ Bryant University]&lt;br /&gt;
&lt;br /&gt;
[[Steven Lawrance#Software Project Experience|Check out the list of software that Steve has either written or contributed to]]&lt;br /&gt;
&lt;br /&gt;
|valign=&amp;quot;top&amp;quot; width=&amp;quot;25%&amp;quot;|&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[https://www.moonlightdesign.org/urllock/ IE URL Lock]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;[http://gnucashtoqif.sourceforge.net/ GnuCashToQIF]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;4&amp;quot;&amp;gt;[[TLS-SSL-Protocols|TLS/SSL Protocol Group Policy Template]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[https://www.moonlightdesign.org/dirlist DirList] [[CompactOnDelete]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;3&amp;quot;&amp;gt;[[PortProxy]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Serendipity|Team Serendipity]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;2&amp;quot;&amp;gt;[[Disk Imager]]&amp;lt;/font&amp;gt; &amp;lt;font size=&amp;quot;1&amp;quot;&amp;gt;[[ScreenWindowX]]&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;small&amp;gt;[https://www.moonlightdesign.org/wireless/ Guest wireless network sign-up] (local network only)&amp;lt;/small&amp;gt;&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2265</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2265"/>
		<updated>2014-10-18T17:57:35Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* TLS/SSL Protocols */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Group Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;br /&gt;
&lt;br /&gt;
Please note that users can update this setting within Internet Explorer&#039;s configuration options. This policy won&#039;t overwrite their customizations unless if this policy is changed to another value or if all policies are reapplied to that user, such as with &#039;gpupdate /force&#039;.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2264</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2264"/>
		<updated>2014-10-18T17:55:34Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* Include in a Policy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Group Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2263</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2263"/>
		<updated>2014-10-18T17:55:20Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
====Add the Policy Template====&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
====Show All Policy Settings====&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
====TLS/SSL Protocols====&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2262</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2262"/>
		<updated>2014-10-18T17:52:34Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: /* User Policy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2261</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2261"/>
		<updated>2014-10-18T17:45:18Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting only Internet Explorer 8 or higher.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting also works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2260</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2260"/>
		<updated>2014-10-18T17:38:18Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting Internet Explorer 8.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|370px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|370px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting also works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|375px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2259</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2259"/>
		<updated>2014-10-18T17:36:17Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting Internet Explorer 8.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|400px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|400px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|650px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|400px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|475px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|400px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|650px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting also works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|400px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2258</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2258"/>
		<updated>2014-10-18T17:34:46Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you. The computer policies in this policy template are also useful to IT administrators whom are targeting Internet Explorer 8.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|425px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|350px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|300px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of users. The user policy won&#039;t have an effect if it applies only to computers and not to users.&lt;br /&gt;
&lt;br /&gt;
Right-click on the User Configuration | Administrative Templates folder. Alternatively, right-clicking on the Computer Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|425px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|350px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the User Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-User.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|300px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the User Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User.png|600px]]&lt;br /&gt;
&lt;br /&gt;
Edit the policy setting and choose the Enabled radio button.&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then choose the Recommended item. Although those operating systems don&#039;t implement TLS 1.1 and 1.2, enabling TLS 1.1 and 1.2 is properly ignored by those older operating systems while being enabled on Windows 7, Windows Server 2008 R2, and newer operating systems.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier, then the Windows Vista/XP option is feasible as that enables only TLS 1.0, but it&#039;s typically best to choose Recommended as that will allow upgraded systems to prefer TLS 1.1 and 1.2.&lt;br /&gt;
&lt;br /&gt;
If all systems on your network run Windows 7, Windows Server 2008 R2, or newer operating systems, then the Recommended setting also works, but the Windows 7 Best Security and Windows 7 Good Security items provide stronger security. If you choose Windows 7 Best Security, then only TLS 1.2 will be used, and that will give your secure connections maximum protection against known attacks. If some web sites that your organization use support TLS 1.1 as their highest protocol, then the Windows 7 Good Security item enables TLS 1.1 while preferring TLS 1.2. Some web sites may support only TLS 1.0 as their strongest option, and working with such web sites requires choosing the Recommended item.&lt;br /&gt;
&lt;br /&gt;
The Insecure and Highly Insecure items should never be used for medium or long term production use. They are present primarily for testing and as a short-term fallback if needed. Don&#039;t use them unless if it&#039;s absolutely necessary for a short time period. While enabled, your secure connections will effectively be as secure as using no encryption at all, even if Internet Explorer is using TLS 1.0 or higher. It&#039;s possible for a downgrade attack to cause Internet Explorer or the remote server to drop down to SSL 3.0, and disabling SSL 3.0 entirely is an effective mitigation against a downgrade attack to SSL 3.0.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-User-IE.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Click OK when done. After clicking OK, this group policy is ready to get picked up by users upon their next application of the user group policies. Having the users log out and back in or having the users run gpupdate.exe will cause them to pick up the change.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2257</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2257"/>
		<updated>2014-10-18T17:15:57Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do that.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
Please note Microsoft has a group policy setting for disabling TLS/SSL protocols in Internet Explorer, as described in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 their recommendations], but it doesn&#039;t work reliably with Internet Explorer 6 or 7. As a result, Microsoft noted in their policy template that it works only with Internet Explorer 8 and higher. If you run Internet Explorer 6 or 7, then the group policy template described on this page is a tenable option for you.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|425px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|350px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|300px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;br /&gt;
&lt;br /&gt;
===User Policy===&lt;br /&gt;
The User policy configures Internet Explorer and has been tested with versions 6 and higher. If you are targeting only Internet Explorer 8 or higher, it is recommended that you instead use the group policy for disabling TLS/SSL protocols as documented in the &amp;quot;Disable SSL 3.0 and enable TLS 1.0, TLS 1.1, and TLS 1.2 for Internet Explorer in Group Policy&amp;quot; section of [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommendations for mitigating the POODLE attack]. Microsoft&#039;s built-in group policy, however, doesn&#039;t work reliably with Internet Explorer 6 and 7.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2256</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2256"/>
		<updated>2014-10-18T17:06:14Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle On Downgraded Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do this.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|425px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|350px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|300px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2255</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2255"/>
		<updated>2014-10-18T17:05:17Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle on Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do this.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|425px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|350px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|300px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2254</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2254"/>
		<updated>2014-10-18T17:04:50Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle on Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do this.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|425px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|350px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Filtering dialog, uncheck the &amp;quot;Only show policy settings that can be fully managed&amp;quot; checkbox. Click OK.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering.png|400px]]&lt;br /&gt;
&lt;br /&gt;
Open the TLS/SSL Protocols folder within the Computer Configuration | Administrative Templates folder. A list of policy settings should appear. If it is empty, then the view filtering might be hiding them. Please follow the instructions above if that is happening.&lt;br /&gt;
&lt;br /&gt;
[[File:Policies-Computer.png|600px]]&lt;br /&gt;
&lt;br /&gt;
If you have Windows XP, Vista, 2008 (without R2), 2003, 2000, NT4, or earlier systems, then enable TLS 1.0 for client and server use while disabling PCT 1.0, SSL 2.0, and SSL 3.0 for client and server use. The screenshot above shows what this configuration looks like.&lt;br /&gt;
&lt;br /&gt;
The Group Policy Editor makes configuration convenient with the Next Setting button. Starting with the first setting, position the dialog box such that the recommendation for that setting at the top of the &amp;quot;Description:&amp;quot; line is visible. Apply that recommendation to every setting in this list, clicking Next Setting to navigate to the next setting. Click OK when done. After clicking OK, this group policy is ready to get picked up by computers upon their next application of the computer group policies to their local computer. Running gpupdate.exe on the computers that have this group policy assigned to them will cause them to pick up the change before gpupdate.exe returns.&lt;br /&gt;
&lt;br /&gt;
If your network is comprised entirely of Windows Server 2008 R2, Windows 7, or newer operating systems, then disabling TLS 1.0 can improve security further, though the author of this template hasn&#039;t yet tried disabling TLS 1.0 at the computer level in such a network.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2253</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2253"/>
		<updated>2014-10-18T16:52:42Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle on Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do this.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
This template implements [https://technet.microsoft.com/en-us/library/security/3009008.aspx#sectionToggle3 Microsoft&#039;s recommended registry settings to disable SSLv3].&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible policy template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This policy template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
To get started, either create a new group policy or edit an existing group policy that applies to groups of computers. The computer policy won&#039;t have an effect if it applies only to users and not to computers.&lt;br /&gt;
&lt;br /&gt;
Right-click on the Computer Configuration | Administrative Templates folder. Alternatively, right-clicking on the User Configuration | Administrative Templates folder also works as it yields the same end-result. Click on the &amp;quot;Add/Remove Templates...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate1.png|600px]]&lt;br /&gt;
&lt;br /&gt;
In the Add/Remove Templates dialog, click on the &amp;quot;Add...&amp;quot; button if the TLS-SSL-Protocols policy template isn&#039;t listed.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate2.png|350px]]&lt;br /&gt;
&lt;br /&gt;
Select the TLS-SSL-Protocols.adm file and click the Open button.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate3.png|425px]]&lt;br /&gt;
&lt;br /&gt;
The Add/Remove Templates dialog should now list the TLS-SSL-Protocols policy template. Press the Close button to continue.&lt;br /&gt;
&lt;br /&gt;
[[File:AddTemplate4.png|350px]]&lt;br /&gt;
&lt;br /&gt;
By default, the Group Policy Editor doesn&#039;t display policy settings that live outside of the group policy registry trees. The settings in this policy template live outside of the group policy registry trees, so you will need to change the view filtering. To do this, right-click on the Computer Configuration | Administrative Templates folder, click on the View submenu, and click on the &amp;quot;Filtering...&amp;quot; menu item.&lt;br /&gt;
&lt;br /&gt;
[[File:Filtering-Computer.png|600px]]&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2252</id>
		<title>TLS-SSL-Protocols</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=TLS-SSL-Protocols&amp;diff=2252"/>
		<updated>2014-10-18T16:28:03Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: Initial page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As a way to mitigate the [https://www.openssl.org/~bodo/ssl-poodle.pdf Padding Oracle on Legacy Encryption (POODLE) attack], information technology (IT) administrators can disable all protocols older than TLSv1 via ActiveDirectory group policies. This page describes how to do this.&lt;br /&gt;
&lt;br /&gt;
Using the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible administrative template] with the group policy editor allows IT administrators to deploy computer-level policies that disable legacy protocols within Windows Schannel and deploy user-level policies that disable legacy protocols within Internet Explorer. Note that a computer-level disable policy for a protocol overrides Internet Explorer&#039;s configuration for that protocol.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
Save the [https://www.moonlightdesign.org/dl/TLS-SSL-Protocols.adm Windows Server 2003 compatible administrative template] as TLS-SSL-Protocols.adm within your Windows INF folder. This is typically &amp;lt;code&amp;gt;C:\Windows\INF&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==Include in a Policy==&lt;br /&gt;
This administrative template includes two group policy targets: Computer and User.&lt;br /&gt;
&lt;br /&gt;
===Computer Policies===&lt;br /&gt;
The Computer policies configure the Windows Schannel protocol support, which impacts client software and server software with dedicated settings for each. Internet Explorer, email software, and any program that connects to the local network or Internet and uses Windows Schannel for securing its connections are affected by the client policies. Internet Information Server, .NET server software, and any program that listens for and accepts secure connections from the local network or Internet and uses Windows Schannel for securing connections are affected by the server policies.&lt;br /&gt;
&lt;br /&gt;
Mozilla Firefox, Google Chrome, and Java, however, use their own software for securing connections and aren&#039;t affected by the client policies. Similarly, Java and software that uses OpenSSL (Apache, etc) or other non-Schannel software aren&#039;t affected by the server policies.&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:Policies-Computer-SSLv3Client.png&amp;diff=2251</id>
		<title>File:Policies-Computer-SSLv3Client.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:Policies-Computer-SSLv3Client.png&amp;diff=2251"/>
		<updated>2014-10-18T16:18:31Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:Policies-User-IE.png&amp;diff=2250</id>
		<title>File:Policies-User-IE.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:Policies-User-IE.png&amp;diff=2250"/>
		<updated>2014-10-18T16:18:20Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:Policies-Computer.png&amp;diff=2249</id>
		<title>File:Policies-Computer.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:Policies-Computer.png&amp;diff=2249"/>
		<updated>2014-10-18T16:18:00Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:Policies-User.png&amp;diff=2248</id>
		<title>File:Policies-User.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:Policies-User.png&amp;diff=2248"/>
		<updated>2014-10-18T16:17:43Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:Filtering.png&amp;diff=2247</id>
		<title>File:Filtering.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:Filtering.png&amp;diff=2247"/>
		<updated>2014-10-18T16:17:30Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:Filtering-Computer.png&amp;diff=2246</id>
		<title>File:Filtering-Computer.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:Filtering-Computer.png&amp;diff=2246"/>
		<updated>2014-10-18T16:17:21Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:Filtering-User.png&amp;diff=2245</id>
		<title>File:Filtering-User.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:Filtering-User.png&amp;diff=2245"/>
		<updated>2014-10-18T16:17:10Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:AddTemplate4.png&amp;diff=2244</id>
		<title>File:AddTemplate4.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:AddTemplate4.png&amp;diff=2244"/>
		<updated>2014-10-18T16:16:51Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:AddTemplate3.png&amp;diff=2243</id>
		<title>File:AddTemplate3.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:AddTemplate3.png&amp;diff=2243"/>
		<updated>2014-10-18T16:16:26Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:AddTemplate2.png&amp;diff=2242</id>
		<title>File:AddTemplate2.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:AddTemplate2.png&amp;diff=2242"/>
		<updated>2014-10-18T16:16:15Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
	<entry>
		<id>https://www.moonlightdesign.org/wiki/index.php?title=File:AddTemplate1.png&amp;diff=2241</id>
		<title>File:AddTemplate1.png</title>
		<link rel="alternate" type="text/html" href="https://www.moonlightdesign.org/wiki/index.php?title=File:AddTemplate1.png&amp;diff=2241"/>
		<updated>2014-10-18T16:15:59Z</updated>

		<summary type="html">&lt;p&gt;Stevenlawrance: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stevenlawrance</name></author>
	</entry>
</feed>