HI team,
The management server is still responding on weak ciphers and depreciated TLS ver 1 & 1.1
Plugin | Plugin Name | Family | Severity | Protocol | Port | Exploit? | Repository | Plugin Output | Synopsis |
157288 | TLS Version 1.1 Protocol Deprecated | Service detection | Medium | TCP | 443 | No | Individual Scan | Plugin Output: TLSv1.1 is enabled and the server supports at least one cipher. | The remote service encrypts traffic using an older version of TLS. |
153953 | SSH Weak Key Exchange Algorithms Enabled | Misc. | Low | TCP | 22 | No | Individual Scan | Plugin Output: The following weak key exchange algorithms are enabled :
diffie-hellman-group1-sha1 | The remote SSH server is configured to allow weak key exchange algorithms. |
104743 | TLS Version 1.0 Protocol Detection | Service detection | Medium | TCP | 443 | No | Individual Scan | Plugin Output: TLSv1 is enabled and the server supports at least one cipher. | The remote service encrypts traffic using an older version of TLS. |
As suggested, we updated the ssl.conf file content as mentioned in the SK article sk147272:

Sshd config file content changed as per sk106031

can i get how can remediate this ?
the modification done by SMS and SG also and still its shows like this.
may i know am i did any wrong ?what is the next plan of action