Hello NicusorAdrianPelivan-5582,
Thank you for posting in our Q&A forum.
Whether this 2012R2 server in one domain or in workgroup, if this machine is in one domain, maybe the domain policy overwrites the cipher suite order.
If this machine is only in workgroup instead of in any domain, please tell us the way you configured cipher suite order
(Local group policy or Registry).
Local Group policy
Computer Configuration > Administrative Templates > Network > SSL Configuration Settings.
OR Registry
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography\Configuration\Local\SSL\00010002
Please check the cipher suite order via PS command and check the result.
Get-TlsCipherSuite
For more information, please refer to links below.
https://learn.microsoft.com/en-us/windows-server/security/tls/manage-tls
Meanwhile (I think it is important), different Windows versions support different TLS cipher suites and priority order. See Cipher Suites in TLS/SSL (Schannel SSP) for the default order supported by the Microsoft Schannel Provider in different Windows versions.
https://learn.microsoft.com/en-us/windows/win32/secauthn/cipher-suites-in-schannel
Cipher suites can only be negotiated for TLS versions which support them. The highest supported TLS version is always preferred in the TLS handshake.
For example, SSL_CK_RC4_128_WITH_MD5 can only be used when both the client and server do not support TLS 1.2, 1.1 & 1.0 or SSL 3.0 since it is only supported with SSL 2.0.
We can check cipher suites are enabled and in this priority order by default by the Microsoft Schannel Provider and cipher suites are supported by the Microsoft Schannel Provider, but not enabled by default in the following link.
https://learn.microsoft.com/en-us/windows/win32/secauthn/tls-cipher-suites-in-windows-8-1
Hope the information above is helpful.
Best Regards,
Daisy Zhou
============================================
If the Answer is helpful, please click "Accept Answer" and upvote it.