PSA: check msDS-SupportedEncryptionTypes on your service accounts before April patch Tuesday

Posted by hardeningbrief@reddit | sysadmin | View on Reddit | 25 comments

We found 11 service accounts still using RC4 Kerberos in our environment. Microsoft's April update is going to break them.

Sharing this because I almost missed it.

With the April 2026 cumulative update, Microsoft is changing the default encryption for any account where msDS-SupportedEncryptionTypes is null. Those accounts have always quietly fallen back to RC4. After April they default to AES-SHA1. July makes it permanent.

The failure mode is bad. Authentication just stops. If you have NAS devices, old line of business apps, or service accounts nobody has looked at in years, you'll find out when something stops working.

To check yours, run this against the Security log on your domain controllers:

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4768,4769} -MaxEvents 20 |

Where-Object { $_.Message -match '0x17' } |

Format-List TimeCreated, Id, Message

0x17 in the ticket encryption type field means RC4. Anything that comes back needs attention before April.

Microsoft also put two scripts on GitHub under microsoft/Kerberos-Crypto. List-AccountKeys.ps1 shows what encryption keys each account actually has. Get-KerbEncryptionUsage.ps1 -Encryption RC4 finds active RC4 tickets. Between those two you get a clear picture fast.

To fix an account: set msDS-SupportedEncryptionTypes to 24 (AES128 + AES256 bitmask), then run klist purge on the affected machine to drop the old ticket and force a new one.

GPO side is quick.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options > Network security: Configure encryption types allowed for Kerberos. Check AES128, AES256, Future encryption types.

Leave RC4 and DES alone. If you have something genuinely ancient that can't do AES, isolate those accounts in a separate OU with their own GPO. Don't leave RC4 on domain-wide.

The actual security issue underneath all this is Kerberoasting. Any authenticated domain user, no special rights, can request a service ticket for any SPN. RC4 ticket means it can go offline to Hashcat and crack in minutes. Service accounts tend to have wide permissions and passwords that haven't rotated since the account was created. That combination is how one stale ticket becomes a full domain compromise.

Watch Event IDs 201 and 202 in the System log on your DCs. Those showed up with the January 2026 update specifically to flag accounts that will break in April. If you're seeing them, you have work to do.

Audit takes maybe 30 minutes if your environment isn't huge. GPO change is 5 minutes. Worth doing before Microsoft makes the decision for you.