Server admins should now disable SSLv3.  The protocol is now only required by less than 1% of active internet clients and browsers.

The registry values are manually set by running regedit as administrator, then checking these values:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Server

Set DWORD “Enabled” to 0

DIsable SSLv3 Server Registry Value

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Client\

Set DWORD “DisabledByDefault” to 1

DIsable SSLv3 Client Registry Value