Problem Description:
Workaround: 1.Server 2008 (R2) according to AppScan revision proposed access address: http://msdn.microsoft.com/en-us/library/windows/desktop/bb870930 (v =vs.85). aspx said how to modify the SSL password suite priority and status, there is a bunch of encryption, it is difficult to know which to retain, which to remove (in fact, appscan inside already have hints which should be removed);
After some data search, there is a software tool called IIS Crypto , specifically to solve the above problems; Software Address: https://www.nartac.com/Products/IISCrypto/Default.aspx Run the software set his recommended encryption method, and then restart the system, scan again, it will not report this vulnerability.
reference materials: 1. http://msdn.microsoft.com/en-us/library/windows/desktop/bb870930 (v=vs.85). aspx 2. Http://security.stackexchange.com/questions/48325/identify-and-disable-weak-cipher-suites
3.https://www.nartac.com/products/iiscrypto/default.aspx