When you attempt to associate with a PC that does not have
the CredSSP encryption prophet remediation mistake update, the Remote Desktop
Connection will show the a blunder message telling that you that a validation
mistake has happened due to CredSSP encryption prophet remediation.
In March, Microsoft discharged a security update to address
vulnerabilities for the Credential Security Support Provider convention
(CredSSP) utilized by Remote Desktop Protocol (RDP) associations for Windows
customers and Windows Server.
Beforehand, you had the option to associate remotely from
the refreshed machine to machines without the update. Be that as it may, with
the most recent update discharged this May, Microsoft solidified security, and
you can never again interface with machines without the update.
You will confront the CredSSP encryption prophet remediation
blunder on the off chance that you have applications or administrations, for
example, the Remote Desktop Connection that utilization CredSSP on a refreshed
machine. Confirmation won't work and you will get this mistake message:
An
authentication error has occurred. The function requested is not supported.
Remote computer: This could be due to CredSSP encryption oracle remediation.
RDP
authentication failed
To unravel this issue, you need to introduce the report on
the servers. Be that as it may, on the off chance that you have to associate
with a PC that hasn't got the update, you can downsize the insurance level to
Vulnerable. You can do this either by means of Group Policy or by changing the
vault.
The Group Policy setting you need is Encryption Oracle
Remediation. It gives three security levels:
- Force Updated Clients: This is the largest amount of insurance since it requires applying the update to all customers you will speak with utilizing CredSSP. In this manner, don't pick this choice before applying the update to the majority of your customers and servers.
- Mitigated: This level squares applications, for example, the Remote Desktop Connection to associate with servers that don't have the update. Be that as it may, administrations that utilization CredSSP will work.
- Vulnerable:This is the most reduced degree of assurance. It will enable you to interface with servers remotely utilizing RDP. Be that as it may, it will open the servers to assaults.
To set the security level to Vulnerable by means of Group
Policy, pursue these means:
- Execute gpedit.msc.
- Navigate to the following path: Computer Configuration > Administrative Templates > System > Credentials Delegation.
- Edit the following setting: Encryption Oracle Remediation.
- Set it to Enabled, and set the protection level to Vulnerable.
Change the
protection level to Vulnerable
This will effect after restart your computer.