All posts
Azure Networking Security Windows Server

Strange Internet Explorer TLS Error

· Mike Hosker

A freshly built VM was displaying TLS error pages in Internet Explorer when accessing sites like https://portal.office.com, despite those sites being whitelisted in Azure Firewall and the firewall logs showing allows (not denies).

Internet Explorer TLS error page

Network captures showed no firewall issues. The problem only affected this one machine, which made misconfiguration seem unlikely. After extensive troubleshooting, Microsoft support identified the root cause: SCHANNEL protocol configuration.

The Fix

The resolution involved modifying registry keys under:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols

Changes required

Disable SSL 2.0 and SSL 3.0 (Server subkeys):

SCHANNEL\Protocols\SSL 2.0\Server
  Enabled = 0
  DisabledByDefault = 1

SCHANNEL\Protocols\SSL 3.0\Server
  Enabled = 0
  DisabledByDefault = 1

Enable TLS 1.0, 1.1, and 1.2 — and critically, remove the DisabledByDefault flags from TLS 1.1 and 1.2:

SCHANNEL\Protocols\TLS 1.0\Client
  Enabled = 1
  DisabledByDefault = 0

SCHANNEL\Protocols\TLS 1.1\Client
  Enabled = 1
  DisabledByDefault = 0

SCHANNEL\Protocols\TLS 1.2\Client
  Enabled = 1
  DisabledByDefault = 0

After applying the registry changes and rebooting, access was restored.

Key Takeaway

Always back up the parent registry key before making SCHANNEL changes:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL

Right-click → Export to save a .reg backup you can restore if something goes wrong.

The lesson here is that what looks like a network or firewall problem can turn out to be a protocol configuration issue. If firewall logs show allows but TLS errors persist, SCHANNEL is worth investigating — especially on freshly provisioned or migrated VMs where the protocol registry keys may have been set to non-defaults.