In Windows 2008 R2 and 2012, how do you enforce TLS-only and how do you demonstrate that posture?
I am in IP Compliance and have a strong background in practical system administration and support. I have however been too far away from windows administration and support for long enough that I don't know the answer to this question any longer and wouldn't know the 2012 analog anyway, and I do not have test systems available for me to poke around in.
So for PCI compliance, all versions of SSL have been deprecated and retired by NIST as strong encryption, which makes TLS the de facto replacement for SSL. Most implementations of SSL default to TLS anyway when possible, but I need to know how to enforce TLS-only.
I have been searching the google, but no matter how I seem to word the question, I get a cloud of "how to enable" type material which I am not at all interested in. In our unix environments it a simple matter (I am a unix head anyway) but how does one enforce TLS only on windows systems. For one, unfortunately I am the leading technical expert at my company whilst not in a technical role, and I'll have to prove this out to our Directory of Infrastructure that this needs to happen (if so), but additionally I must be able to prove our systems are compliant and need a configuration dump or output from a command that shows which ciphers and methods are available for connection attempts.
So, in windows 2008 R2 and 2012, how do you enforce TLS-only and how do you demonstrate that posture?