-
Notifications
You must be signed in to change notification settings - Fork 168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG?]: TLS Security fix for Battle.net not working #489
Comments
I think a better idea to prevent this issue going forward is to make this into a sub-category that can be easily applied with an additional prompt. Asking the user if they have Battle.net client installed should be better instead of auto-detecting whether to apply the fix by assuming a fixed installation path. |
Thanks for the very quick response! I've applied this too and works as well. Also, happy new year! 🥳 |
Anytime, Happy new year! 🤗 |
During the compliance checking, MDM results that are not used by the module are no longer collected, improving the performance and speed, especially on lower end hardware. Adjusted the TLS Category's Intune Json config to match the new schema. Added a new sub-category for the TLS category, called "TLS for BattleNet". When selected, the TLS category will deploy the group policy that has the extra cipher suite TLS_RSA_WITH_AES_256_CBC_SHA which is less secure but required for BattleNet client to connect to its servers. Fixes -> [BUG?]: TLS Security fix for Battle.net not working #489 This means BattleNet client is no longer automatically detected on the system because there are times when it's installed in non-default location. Now the user is in control to decide whether to use the extra cipher suite or not. WDACConfig module is no longer used/installed for Downloads Defense Measures category. All the necessary logic for policy creation is now implemented natively. This substantially improves the performance and allows for full offline usage of this category and its sub-categories. This also facilitates the deprecation of the WDACConfig module which is replaced with the new modern AppControl Manager.
I just implemented this: https://github.com/HotCakeX/Harden-Windows-Security/releases/tag/Hardening-Module-v.0.7.1 |
Tools category
Harden Windows Security Module
Does Your System Meet The Requirements?
Is your Windows Installation Genuine?
Did You Read The Frequently Asked Questions?
Please Explain The Bug
On the TLS Security section, a Battle.net client known issue is linked suggesting a currently non-working fix:
Running this command in an elevated PowerShell terminal, and re-checking using:
Get-TlsCipherSuite
shows that
TLS_RSA_WITH_AES_256_CBC_SHA
is still not within the list of cipher suites currently used.This may be due to the fact that the current TLS Security policies are now applied using the Registry instead of PowerShell cmdlets.
Solution:
To fix this issue, I had to use the Registry Editor and manually go to:
and modify the
Functions
value and change the data like so:appending
TLS_RSA_WITH_AES_256_CBC_SHA
at the very end.Now, rerunning
Get-TlsCipherSuite
gives us theTLS_RSA_WITH_AES_256_CBC_SHA
cipher suite at the very end of the list, and the Battle.net client can now finally connect to the internet.I came to this solution by using a Registry.Pol Viewer and looking at the registry.pol for the Battle.net client.
Environment:
E:\Battle.net
)Error Details
No response
The text was updated successfully, but these errors were encountered: