CVE-2016-0800, also known as the DROWN attack, is an attack against servers that still support the old SSLv2 protocol. The only reason a server would still offer to use SSLv2 would be for possible compatibility reasons with 20-year-old PCs ( -> there is no reason to use or offer SSLv2 any more). From a configuration side you can disable the v2 protocol by adding -SSLv2 to the list of protocols being used.
Where and how you configure this depends on the software, but using all -SSLv2 -SSLv3 is fine with most modern servers and clients, Mozilla has a fantastic overview for configuring SSL and TLS.
If you want to check a bunch of your hosts remotely, you can use the sslv2 script included with nmap like this:
1 | nmap --open --script sslv2 hostname |
Where hostname would be either a FQDN, or an IP, or an IP range. You can swap out sslv2 with ssl-enum-ciphers to see all SSL /TLS ciphers and protocols the server offers.