A Microsoft cloud service that enables deployment of Azure services across hybrid and multicloud environments.
Hello @Jason Kopp
This is a known Azure Arc onboarding failure mode and your symptoms line up very closely with a machine‑specific TLS / cipher suite hardening issue, not a subnet or generic firewall problem.
From your description:
-
azcmagent checkreaches login.microsoft.com - It Cannot reach his.arc.azure.com / gbl.his.arc.azure.com
- Error: wsarecv: An existing connection was forcibly closed by the remote host Proxy Status="proxy is not used"
- Same subnet → other servers connect fine
- OS = Windows Server 2022, TLS = 1.2 enabled
This combination rules out:
- Azure outage
- Subscription / tenant issue
- Subnet‑level firewall routing
- Missing TLS 1.2
It strongly indicates the remote Azure Arc service is closing the TLS handshake for this server only.
Over‑restricted TLS cipher suite configuration on the failing server — usually due to:
- Security baseline / hardening
- Custom SSL cipher order
- Domain GPO overriding local defaults
Azure Arc endpoints (including his.arc.azure.com) require modern TLS 1.2 / TLS 1.3 cipher suites. If none of the acceptable ciphers are offered by the client, Azure closes the connection, which surfaces as:
wsarecv: An existing connection was forcibly closed by the remote host
Other servers on the same subnet work because cipher suites are evaluated per machine, not per subnet.
A single server can:
- Have a stricter GPO
- Miss required cipher suites
- Run a hardened image
Even with identical networking.
To confirm:
On the failing Windows Server 2022, run:
Get-TlsCipherSuite | Select-Object Name
Ensure at least one of these exists:
TLS_AES_256_GCM_SHA384
TLS_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
These are the cipher families Azure Arc endpoints are known to accept on modern Windows hosts.
As a workaround try the below following resolutions:
If any are missing, enable them (no reboot required in most cases):
Enable-TlsCipherSuite -Name "TLS_AES_256_GCM_SHA384"
Enable-TlsCipherSuite -Name "TLS_AES_128_GCM_SHA256"
Enable-TlsCipherSuite -Name "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"
Enable-TlsCipherSuite -Name "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
If SSL Cipher Suite Order is managed via GPO, compare with a working Arc-connected server and update the policy to include the above ciphers.
Retest After enabling:
azcmagent check
azcmagent connect ...
You should now see:
-
his.arc.azure.com -
gbl.his.arc.azure.comreachable over HTTPS
So, this issue was caused by an overly restrictive TLS cipher suite configuration on the affected Windows Server 2022 host. Azure Arc endpoints rejected the TLS handshake and forcibly closed the connection. Restoring supported TLS 1.2 / 1.3 cipher suites resolved the connectivity issue.
Kindly let us know if the solution provided worked for you.
If you need any further assistance, please feel free to reach out.
If you found the comment helpful, please consider clicking "Upvote it".
Thanks,
Suchitra.