Hey, seeing TLS 1.0/1.1 and 3-DES in a sslscan report on a storage account is not a vulnerability.
Even if the TLS handshake "succeeds", Azure blocks everything at the application layer if you have set the Minimum TLS Version to 1.2 (as you already have). Clients trying TLS 1.0/1.1 get an HTTP 400 right away on the first request.
Most scanners stop at the handshake and don't interpret the HTTP response, so they report "TLS 1.0 support" even though it's not actually usable.
If you want to prove it to an auditor:
curl --tls-max 1.0 https://<account>.blob.core.windows.net/ -v
--Response: HTTP 400 - TLS version not permitted
It's just an "optical trick" of the scanning tools. Your storage is compliant.