In the article, we will explain how to solve CredSSP encryption or Oracle remediation. If you attempt to start a remote session using Remote Desktop Connection and get the error message “CredSSP encryption oracle remediation”. This issue occurs if you try to establish an insecure RDP connection, and the unsafe RDP connection is blocked by an encrypting “Oracle Remediation Policy Configuration” on the server or client device. This setup defines how to make an RDP session using CredSSP and whether insecure remote desktop connections will be allowed. Using the Windows group policy settings changes explained below to roll back the changes to the vulnerable state to permit RDP access Refer to this link for additional information on fixing CredSSP Encryption Oracle Remediation Error
To Fix This Issue
You need to Install MS kb4103723, a Windows security update from April, on your computer. This is reputed to happen automatically if Windows Update Services is running correctly, but sometimes this isn’t happening.
Remote Desktop Connection
An authentication error has occurred
The function requested isn’t supported
Remote computer name or IP Address
This could be due to
CredSSP Encryption Oracle Remediation
For more information, visit Microsoft

This problem is because the Windows update was not installed either on the server or on the client’s computer.
How to Fix Error CredSSP Encryption Oracle Remediation
To fix the error, we need to uninstall the Windows update and rollback to the older version. But rolling back to the previous version isn’t a best practice. We need to fix this authentication error by modifying the Windows group policy in the local device to use the vulnerable setting.
Hold Windows + R key to open the run box.
Enter gpedit.msc and then hit Enter

Expand Computer Configuration, and then Administrative Template.
Expand the System and then choose Credential Delegation.
Double-click on Encryption Oracle Remediation Settings to open.

In the Encryption Oracle Remediation page, choose to enable and change the protection level to vulnerable, and then choose OK.

Open the command prompt, type gpupdate /force, and then hit enter.

Check your remote desktop connection it will be working perfectly.
Conclusion
This is just a temporary fix and defeats the purpose of the patching. However, we have to make sure that future updates must be installed when Microsoft released Windows updates so that the vulnerability isn’t exposed.


