To report encrypted/unencrypted sessions...
SELECT session_id,
connect_time,
Net_transport,
protocol_type,
encrypt_option,
auth_scheme,
client_net_address
FROM sys.dm_exec_connections
You can configure an Extended Event Session to report on connections and show which SSL/TLS protocol they are using...
The method below works in:
SQL2016 SP1+
SQL2014 SP3+
SQL2012 SP4+
CREATE EVENT SESSION [tls] ON SERVER
ADD EVENT sqlsni.trace(
WHERE (([sqlserver].[like_i_sql_unicode_string]([text],N'%Handshake%'))))
ALTER EVENT SESSION [tls] ON SERVER
ADD TARGET package0.ring_buffer(SET max_events_limit=(100000),max_memory=(10240))
WITH (MAX_MEMORY=10240 KB,STARTUP_STATE=ON)
GO
ALTER EVENT SESSION [tls] ON SERVER STATE = START;
ALTER EVENT SESSION [tls] ON SERVER STATE = STOP;
Your connections will not be able to use TLS 1.2 unless it is enabled in your build.
For Windows 7 SP1, and Windows 2008 R2 SP1, you may also need an updated version of .Net 3.5.1 For Windows 8 RTM and Windows 2012 RTM, you may also need an updated version of .Net 3.5For Windows 8.1, and Windows 2012 R2 SP1, you may also need an updated version of .Net 3.5 SP1 (see links in KB3135244 docs)The following SQL Server builds, and later, support TLS 1.2...
SQL2019 - Any build
SQL2017 - Any build
SQL2016 - Any build
SQL2014 SP3 - Any Build
SQL2014 SP2 - Any Build
SQL2014 SP1 - CU5 - 12.0.4439.1+
SQL2014 RTM - CU12 - 12.0.2564.0+
SQL2012 SP3 - CU1 - 11.0.6518.0+
SQL2012 SP2 - CU10 - 11.0.5644.2+
For TLS1.2 support you need to be on one of the following builds or later...
10.50.6542.0+ (x86/x64)
10.50.4047.0+ (IA64)
10.50.4344.0+ (IA64)
For TLS1.2 support you need to be on one of the following builds or later...
10.0.6547.0+ (x86/x64)
10.0.5545.0+ (IA64)
10.0.5896.0+ (IA64)
SELECT SERVERPROPERTY('productversion')