Important Reminder: Check Your Service Accounts for RC4 Kerberos Before April Updates

0
40
Asked By TechWizard42 On

I wanted to give everyone a heads-up about an urgent issue regarding service accounts in our environments. We've discovered that several of our service accounts are still using RC4 Kerberos encryption, and as many of you might know, Microsoft's April update will break these accounts.

Starting April 2026, Microsoft is changing the default encryption type for accounts with a null value in msDS-SupportedEncryptionTypes from RC4 to AES-SHA1, with this change becoming permanent by July. If you don't act, authentication for those accounts will just stop, leading to serious disruptions, especially for legacy apps and NAS devices that haven't been updated in a long time.

To check the encryption types for your service accounts, you can run a simple PowerShell command against the Security log on your domain controllers. Be on the lookout for '0x17' in the ticket encryption type field, as that indicates the use of RC4. For accounts still using RC4, you need to set msDS-SupportedEncryptionTypes to 24 and purge old Kerberos tickets to ensure smooth operation after the update.

Also, Microsoft has provided helpful scripts on GitHub to audit and manage these accounts. Be proactive about this as it could save you from major headaches in the future!

6 Answers

Answered By KerberosHacker87 On

Keep in mind that if any service accounts haven’t had their passwords updated since before your domain functional level was raised to 2008R2, simply modifying msDS-SupportedEncryptionTypes won’t work. You'll need to reset those passwords twice.

Answered By OldSchoolSysAdmin On

You need to be careful; if your account still allows RC4, you’ll be vulnerable after the update. Changing to 24 is the right move to secure those accounts.

Answered By ScriptSage88 On

Here’s a handy link to the scripts mentioned in the post. As for running them, you typically only need to run them on one domain controller, but there's a parameter to check across all DCs if needed, although it can be slow and prone to crashes.

Answered By ServerGuru21 On

Great post! I wish I had your advice when encountering similar issues in the past; it was tough to resolve. Cheers for sharing this info!

Answered By LostInTranslation93 On

I’m a bit confused. I see one of my service accounts showing '0x17', and msDS-SupportedEncryptionTypes is set to '16'. Does this mean I'm still at risk? Should I change it to '24'?

Answered By SecurityNerd99 On

I've been working on a site to help explain Kerberos, especially with the RC4 updates coming out. It covers a lot, including valid keys, encryption negotiation, and even some tools to decode ticket information. Check it out for a better understanding!

HackerHistorian -

Awesome resource! Thanks for sharing that; it's so much clearer than the official docs.

PasswordProtector -

This is super helpful! I'll definitely use this for my setup.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.