<p>There is no “patch”. It’s a vulnerability in the protocol, not a bug in the implementation.</p>
<p>In Windows Server 2003 to 2012 R2 the SSL / TLS protocols are controlled by flags in the registry set at <code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols</code>.</p>
<p>To disable SSLv3, which the POODLE vulnerability is concerned with, create a subkey at the above location (if it’s not already present) named <code>SSL 3.0</code> and, under that, a subkey named <code>Server</code> (if it’s not already present). At this location (<code>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0\Server</code>) create a DWORD value named <code>Enabled</code> and leave it set at <code>0</code>.</p>
<p>Disabling SSL 2.0, which you should also be doing, is done the same way, except that you’ll be using a key named <code>SSL 2.0</code> in the above registry path.</p>
<p>I haven’t tested all versions, but I think it’s probably safe to assume that a reboot is necessary for this change to take effect.</p>