TLS Setting in Internet Options
From Lucca's Wiki
TLS Settings in Internet Options (Windows) – Application Impact Chart[edit]
This page explains which applications are affected by the TLS protocol checkboxes located in:
Control Panel → Internet Options → Advanced → Security
These settings control the Windows SChannel / WinINet TLS stack.
Applications Affected by Internet Options TLS Settings[edit]
These applications rely on Windows SChannel or WinINet and are directly affected by enabling or disabling TLS versions.
| Application | Uses Windows TLS Settings? | Notes |
|---|---|---|
| Internet Explorer | Yes | Fully controlled by Internet Options |
| Microsoft Edge (Legacy EdgeHTML) | Yes | Legacy Edge only |
| Control Panel Web Views | Yes | Built on IE engine |
| Windows Update | Yes | Uses Windows crypto stack |
| PowerShell (Windows PowerShell 5.1 and older) | Yes | Uses .NET Framework |
| .NET Framework Applications (default config) | Yes | Unless explicitly overridden |
| Microsoft Office (older builds) | Yes | Web services and activation |
| Remote Desktop Gateway | Yes | Uses SChannel |
| IIS (when using SChannel) | Yes | Server-side encryption |
| Outlook (older builds / certain auth flows) | Yes | Especially Exchange on-prem |
| WinHTTP-based Applications | Yes | Common in enterprise apps |
| SQL Server (native encryption) | Yes | Uses Windows crypto |
Applications NOT Affected by Internet Options TLS Settings[edit]
These applications use their own TLS implementation (BoringSSL, NSS, OpenSSL, etc.) and are NOT controlled by Internet Options.
| Application | Uses Windows TLS Settings? | Reason |
|---|---|---|
| Google Chrome | No | Uses BoringSSL |
| Mozilla Firefox | No | Uses NSS |
| Microsoft Edge (Chromium) | Mostly No | Uses Chromium TLS (still relies on Windows certificate store) |
| Opera | No | Chromium-based |
| Brave | No | Chromium-based |
| Discord | No | Electron (Chromium) |
| Slack | No | Electron-based |
| Zoom | No | Custom TLS stack |
| Steam | No | Uses OpenSSL |
| FileZilla | No | Own TLS library |
| Git (default config) | No* | Uses OpenSSL unless configured for SChannel |
| Java Applications (default JRE) | No | Uses Java TLS stack |
| Docker Desktop | No | Own TLS implementation |
| Node.js Applications | No | Uses OpenSSL |
Mixed or Conditional Cases[edit]
| Application | Depends? | Explanation |
|---|---|---|
| .NET Core / .NET 5+ | Usually Yes | Defaults to SChannel on Windows |
| PowerShell 7+ | Yes | Uses .NET Core |
| Git for Windows | Maybe | If configured with http.sslBackend=schannel |
| Python (requests library) | Usually No | Uses OpenSSL |
| WSL (Linux applications) | No | Uses Linux TLS stack |
Best Practice Recommendation (2026)[edit]
For Windows 10 / Windows 11 systems:
- Enable TLS 1.2
- Enable TLS 1.3
- Disable TLS 1.0
- Disable TLS 1.1
Older TLS versions should only be enabled for legacy system compatibility.
Quick Rule of Thumb[edit]
- Built into Windows → Affected
- .NET Framework app → Usually affected
- Chromium / Electron-based → Not affected
- Cross-platform open-source app → Usually not affected