Unless you actually have a server running on that port, and I’ve never watched MSFS to see what it listens on so that might be right, the port forwarding’s isn’t going to be doing anything.
In the same way you don’t need to port forward anything and still use a web browser.
If you forwarded port 443 to your computers IP address, this may be doing nothing at all, and you have actually made yourself potentially vulnerable by doing so.
Your post is sufficiently vague as to cause concern.
These are private IPs, so nothing to worry about:
[FlightSimulator.exe]
TCP 192.168.1.207:63811 52.238.250.44:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:63812 13.86.37.202:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:63813 134.170.179.79:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:63815 52.155.217.156:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:63817 40.91.76.181:443 TIME_WAIT
TCP 192.168.1.207:63818 52.252.254.179:443 TIME_WAIT
TCP 192.168.1.207:63820 40.91.76.181:443 TIME_WAIT
TCP 192.168.1.207:63821 52.251.19.158:443 TIME_WAIT
TCP 192.168.1.207:63822 52.251.19.158:443 TIME_WAIT
TCP 192.168.1.207:63831 40.91.76.181:443 TIME_WAIT
TCP 192.168.1.207:63832 40.91.76.181:443 TIME_WAIT
TCP 192.168.1.207:63833 40.91.76.181:443 TIME_WAIT
TCP 192.168.1.207:63834 44.241.159.216:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:63837 51.140.223.191:443 ESTABLISHED
Can not obtain ownership information
TCP 192.168.1.207:63839 13.107.246.13:443 TIME_WAIT
TCP 192.168.1.207:63840 13.107.246.13:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:63841 40.91.85.241:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:63842 40.91.85.241:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:63845 104.40.0.196:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:63847 13.107.246.13:443 ESTABLISHED
[FlightSimulator.exe]
TCP 192.168.1.207:64864 3.235.73.121:443 CLOSE_WAIT
Plenty of outgoing HTTPS connections, but no listeners on 443:
TCP [::]:135 [::]:0 LISTENING
TCP [::]:445 [::]:0 LISTENING
TCP [::]:5357 [::]:0 LISTENING
TCP [::]:5426 [::]:0 LISTENING
TCP [::]:10801 [::]:0 LISTENING
TCP [::]:49664 [::]:0 LISTENING
TCP [::]:49665 [::]:0 LISTENING
TCP [::]:49666 [::]:0 LISTENING
TCP [::]:49667 [::]:0 LISTENING
TCP [::]:49701 [::]:0 LISTENING
TCP [::1]:501 [::]:0 LISTENING
So this is likely a case of seeing what one wants to see.