Documentation forKiwi Syslog Server
Legacy KSS reached its End of Service Life on March 28, 2026. Users should migrate to the next generation of KSS. See the release history for the lastest version.

Secure configuration for KSS NG

This document describes best practices for securing KSS NG.

Disable TLS 1.0 and 1.1

Use a network scanner to map your network and see protocols available for communicating with KSS NG.

If TLS 1.0 and 1.1 are open, disable them directly on the Virtual Machine or server. This can be done using PowerShell or via IIScrypto.

# Disable TLS 1.0 on the Server
New-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server" -Force
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server" -Name "Enabled" -Value 0

# Disable TLS 1.1 on the Server
New-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server" -Force
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server" -Name "Enabled" -Value 0
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server" -Name "DisabledByDefault" -Value 1

Disable 3DES ciphers

3DES ciphers should also be disabled directly on the Virtual Machine or server, either with PowerShell or via IIScrypto.

# Disable 3DES cipher
New-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES 168" -Force
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES 168" -Name "Enabled" -Value 0

# Confirm change
Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES 168"