Add secure TLS ciphers (which are not labeled weak by SSLLABS) to internal HTTPS Azure URLs
Per www.ssllabs.com/ssltest internal Azure HTTPS URLs are only using weak TLS ciphers and not yet using stronger ciphers like TLSECDHERSAWITHAES256GCMSHA384 and TLSECDHERSAWITHAES128GCMSHA256. Said stronger ciphers are ironically being used by Microsoft's public facing URLs like portal.Azure.com. Please enable these 2 newer and stronger ciphers within Azure internal HTTPS sites.
Context: Organizations like the one I work for only allow TLS ciphers labeled as strong by the majority of the Information Security community. Because of this the Microsoft Monitoring Agents on our servers cannot communicate with Azure over the HTTPS URL they were given by Azure. Why because no secure cipher exists for the communication as we've disabled all weak ciphers. This means we cannot use Azure Log Analytics nor the Azure Update Management Portal to push patches.