Disable Cipher Suite in Server 2022 but still active

Sebastian Mann 6 Reputation points
2021-12-01T08:00:48.723+00:00

Hi,

I've created a new VM in Azure of type "Windows Server 2022 Datacenter Azure Edition" - Core - and disabled weak cipher suites using PowerShells Disable-TlsCipherSuite.
The VM is behind an azure LoadBalancer.

Afterwards I checked with ssllabs.com. But it showed me, that there are still some weak cipher suites active.
153929-image.png

So I went ahead and tried to explicitly disable the two weak cipher suites again using Disable-TlsCipherSuite.
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)

But PowerShell showed me, that these are already disabled.
When doing this in Server 2019 we had no problems at all. What am I missing here?

Any help appreciated.

Azure Virtual Machines
Azure Virtual Machines
An Azure service that is used to provision Windows and Linux virtual machines.
8,333 questions
Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
13,674 questions
Azure Load Balancer
Azure Load Balancer
An Azure service that delivers high availability and network performance to applications.
475 questions
{count} votes

7 answers

Sort by: Most helpful
  1. Jesse Vurgason-Graham 0 Reputation points Microsoft Employee
    2024-09-20T18:30:32.36+00:00

    Even if you do not have a domain policy, check this anyway:

    HKLM\SOFTWARE*Policies*\Microsoft\Cryptography\Configuration\SSL\00010002

    Apparently some Win2022 SKUs come with this prepopulated. Remove both EccCurves and Functions, so that the only value in the key is "(Default)"

    Then reboot and try again

    0 comments No comments

  2. Henric Rydh 0 Reputation points
    2025-02-07T21:13:35.7233333+00:00

    If anyone else is having this issue it seams Microsofta "Azure Edition" of Server 2022 has a policy set limiting the TLS Cipher Suites to ten different suites and the TLS ECC Curves to two different ones.

    I managed to work around the "Azure Edition" policy using a domain Group Policy, but I would guess a local policy should override it as well.

    Policy settings are found at: Computer Configuration > Administrative Templates > Network > SSL Configuration Settings

    I have not yet figured out how Microsoft is deploying their limiting policy or found any documentation about it.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.