I found a solution from the below 2 links
thatnavguy.wordpress.com/.../
stackoverflow.com/.../how-to-disable-tls-1-0-on-windows-server-2012-having-4-5-net-framework-using-re
We have NAV 2013 R2 (No CU for this versions after 2018) and OS is Windows Server 2012 R2.
Pasting the steps followed here
Make sure you backup the registry first before attempting to do this.
Also make sure that you have at least Microsoft .NET Framework 4.5.2 installed on the server.
1. First step is to turn on support for TLS 1.2 by creating TLS1.2 Server and Client folders in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\
-Create Key TLS 1.2. Under it Create 2 keys Client and Server
-For both folders, create a new DWORD value named DisabledByDefault and set the value to 0. Create again a new DWORD value named Enabled and set the value to 1.
2. Browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp.
- create a new DWORD value named DefaultSecureProtocols and set the value to 800.
On a 64-bit version, you also need to do it on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp.
3. Browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft.NETFramework\v4.0.30319.
- create a new DWORD value named SchUseStrongCrypto and set the value to 1.
On a 64-bit version, you also need to do it on HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft.NETFramework\v4.0.30319 .
Once you finished with all the above steps, restart the server. This worked for me
If step 3 does not have the path in registry follow the below steps (which was the case in my test server)
Open PowerShell run as administrator: [Net.ServicePointManager]::SecurityProtocol
Notice the response is Ssl3, Tls
Run the following 2 commands in PowerShell
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\.NetFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -Type DWord
Set-ItemProperty -Path 'HKLM:\SOFTWARE\Wow6432Node\Microsoft\.NetFramework\v4.0.30319' -Name 'SchUseStrongCrypto' -Value '1' -Type DWord
Close PowerShell, reopen as admin, run: [Net.ServicePointManager]::SecurityProtocol
Output is: Tls, Tls11, Tls12