Disable Weak Ciphers/Protocols in Expert Assist
We need the ability to disable the use Weak/Outdated ciphers. We have disabled 3DES, TLS 1.0 and 1.1 on all of our windows systems, however TLS 1.0, TLS 1.1 and 3DES still appear on our security scans on port 2000. EA is NOT utilizing the security configuration that the Windows system is configured for. For example TLSRSAWITHNULLSHA256 is showing as an active cipher on port 2000 when that cipher is disabled on the windows system. Please provide a method to select what ciphers EA will use.

-
Oscar commented
I was able to test this on my own and even when disabling TLS 1.0 and 1.2 and also setting 1 single Cipher as showing in the attached pictures, by running a scan with NMAP, port 2000 is still using TLS 1.0, 1.1 as well as other ciphers that are supposed to be disabled.