TLS 1.2, an internet security protocol, is quickly becoming an industry security standard. You can learn more here. In order to provide greater security and stability, all connections used by QuickBooks Desktop to access Intuit services will need to meet certain system requirements after May 31, 2018. If these requirements are not met, services that include but not limited to the following will be impacted:
- All connected services such as payroll, payments, online banking etc.
- QuickBooks Desktop activation on a new computer
- Password reset tool
- Services that require Intuit account credentials (One Intuit Identity - OII) such as My apps, secure webmail, contributed reports etc.
- Intuit Data Protect (IDP)
- Help pages
- Ordering checks and supplies
- VAT efiling (UK)
- If you are not sure which of the following requirements need to be met you can run the TLS 1.2 Readiness tool. The tool updates your system to become TLS 1.2 compliant provided it meets all Windows Operating System, Internet Explorer and .Net requirements listed below.
- To prevent any issues with these services and others that may not be listed, please make sure that the following requirements are met.
Make sure the QuickBooks Desktop version you are using is updated to the latest release.
The operating system needs to be Windows 7 or later. Appropriate operating systems include:
Visit Microsoft’s Windows store for purchase information and help with upgrading your operating system.
While you may be using another browser as you personal browser, QuickBooks Desktop uses features of Internet Explorer. Please make sure that you have installed Internet Explorer 11 for the best security, and continuing updates by Microsoft.
The .Net version will need to be 4.5.2 or greater. Please update to a later version of .Net as needed.
|Internet Explorer Group Policy||
If prompted by an error message, you may need to talk to your IT person/department to allow TLS 1.2 protocol in Internet Explorer.
If prompted by an error message, you may need to run QuickBooks with elevated privileges. This is to ensure correct Internet security settings are established.