You can add | out-null to each command to suppress the console outputĪfter running these commands, Azure AD Connect was installed as expected. New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'Enabled' -value '1' -PropertyType 'DWord' -Force New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'Enabled' -value '1' -PropertyType 'DWord' New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v9' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v9' -name 'SystemDefaultTlsVersions' -value '1' -PropertyType 'DWord' -Force New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v9' -Force New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v9' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force To easiest way to get these on your server is by using the following PowerShell commands: New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v9' -Force "SystemDefaultTlsVersions"=dword:00000001 Luckily it’s not that difficult to enable TLS 1.2 on a Windows 2019 server (although I am wondering why this is not enabled by default) by using the following registry keys: After configuring TLS 1.2, please run AADConnect Wizard to continue with installation and configuration.
![test tls 1.2 powershell test tls 1.2 powershell](https://www.alitajran.com/wp-content/uploads/2020/09/How-to-enable-TLS-1.2-on-Windows-Server-IIS-Crypto-templates.png)
![test tls 1.2 powershell test tls 1.2 powershell](http://eddiejackson.net/web_images/TLSRegKey1.png)
Please refer to this document to learn more about the steps you need to take to enable TLS 1.2 on your server. This installation requires TLS 1.2, but it was not enabled on the server.
![test tls 1.2 powershell test tls 1.2 powershell](https://charbelnemnom.com/wp-content/uploads/2018/08/How-To-Enable-TLS1.2-Protocol-SCDPM-3.jpg)
After starting I got the following error message:
#Test tls 1.2 powershell upgrade
Or better, I wanted to upgrade an existing Azure AD Connect version 1.x server to version 2.x.
#Test tls 1.2 powershell install
So, I installed a brand-new Windows 2019 server where I wanted to install Azure AD Connect version 2.x.