disable multiple-neutral-1 view-off search multiple-circle view arrow-left-1 cog check-1 wench add-square single-neutral-actions close close single-neutral add-circle-bold rating-star love-it arrow-down-1 move-to-top smiley-indifferent smiley-happy arrow-up-1 floppy-disk lock-2 arrow-down-2 view-1 list-bullets smiley-unhappy expand-6 smiley-sad-1 lock-unlock-1 smiley-unhappy filter-1 copy-paste send-email-1 check-circle-1 diagram-fall-down cog-1 envelope-letter download-thick-bottom add-circle messages-bubble-square archive alert-diamond alarm-bell-1 ticket-1 open-quote information-circle flying-insect-honey pencil-1 remove-circle add attachment-1 smiley-indifferent pencil-1 network-browser hyperlink-2 time-clock-circle close-quote hierarchy-9 navigation-menu common-file-stack shield-warning file-code button-record credit-card-1 pencil-write synchronize-arrows-1 undo bin-paper-1 folder-file-1 ticket-1 envelope-letter expand-6 time-clock-midnight rating-star smiley-smile-1_1 navigation-menu-horizontal book-star archive keyboard-arrow-down headphones-customer-support keyboard-arrow-up arrow-right-1 tags-double smiley-sad-1 smiley-happy remove-square-1 layout-module-1 analytics-pie-2 social-media-twitter multiple-users-1 drawer-send print-text smiley-thrilled

Solution for TLS 1.2 outlook connection issue (windows 7 / windows 10)

How to Allow Outlook to Connect via TLSv1.1/TLSv1.2
Maybe you've tried the patches and registry edits and this did't work.

The problem apparently lies with Outlook’s interaction with Windows, and not in Outlook itself.  (Mozilla’s Thunderbird actually works fine connecting to IMAP/POP via TLS1.1/1.2 (using STARTTLS) out of the box (even on WinXP!), but at the time of this writing it has a bug in it that won’t allow you to import your data from Outlook, which at least for now, probably makes switching from Outlook to Thunderbird not an option.)

On the client machine with Outlook on it, check this registry key:


Under the Protocols key, add two new keys, if not already there: One called “TLS 1.1” and one called “TLS 1.2“.

Inside both of these keys, add another key called “Client“.

Now create a DWORD value in each Client key called “DisabledByDefault” whose value is 00000000.

Now restart the computer and then relaunch Outlook.
You should now be able to connect to that PCI compliant IMAP/POP server that’s only running TLSv1.1 and TLSv1.2 protocols.  (That is, assuming you only disabled the SSLv3.0 & TLSv1.0 protocols themselves, and not their associated ciphers too when trying to pass certification! (You don’t want or need to do this, because TLSv1.1 uses the same ciphers as SSLv3.0, so disabling SSLv3.0 ciphers renders TLSv1.1 useless, and it doesn’t help your PCI compliance.

To help users simplify the steps we added a registry patch file.
Please download the winrar zip below in the attachment section.

*Use this configuration option at your own risk!

See related external article link: