You can disable the weaker algorithms so that requests to any non-TLS 1.2 compliant HTTP server would fail where it used to work.

Edit the jre/lib/security/java.security file in the agent folder, using the following syntax:

jdk.tls.disabledAlgorithms=SSLv3, TLSv1, TLSv1.1, [other weak algos…]
Note: Keep in mind that this file is overwritten on upgrade, so you should have to have a process in place to reupdate this file after every upgrade.

Powershell users should consult their Windows administrator help disabling lower versions of TLS. For details on which versions of TLS are being used in Powershell, use the [enum]::GetNames([Net.SecurityProtocolType]) command.