Note
1) Only the following Windows 10 versions can be modified to support TLS 1.3 by the time of writing document: Windows 10 Version 2004, 20H2, 21H1, and 21H2.
2) TLS 1.3 is an experimental feature in Windows 10, therefore, even though you can modify the Windows registry to support TLS 1.3, it does not guarantee that TLS 1.3 always works in Windows 10.
For Windows 10 (Version 2004 or later) to enable the TLS 1.3 support, you will need to modify the Windows registry. Different keys must be added depending on whether Windows 10 is used as the client or the server; if Windows 10 is used as both the client and the server, then both keys must be added.
For client (when Windows 10 is used as the client):
1) Copy the following scripts to a file and save the file with the file extension .reg (for example, enable.reg):
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client] "DisabledByDefault"=dword:00000000 "Enabled"=dword:00000001
2) Double click the .reg file.
This will create the TLS 1.3 registry key for client and will take effect when Windows 10 is used as the client.
For server (when Windows 10 is used as the server):
1) Copy the following scripts to a file and save the file with the file extension .reg (for example, enable.reg):
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Server] "DisabledByDefault"=dword:00000000 "Enabled"=dword:00000001
2) Double click the .reg file.
This will create the TLS 1.3 registry key for server and will take effect when Windows 10 is used as the server.
For more information, refer to https://docs.microsoft.com/windows-server/security/tls/tls-registry-settings.