MC1254512 – (Updated) Second deployment phase for Kerberos RC4 hardening begins with the April 2026 Windows security update

cloudscout.one Icon

check before: 2026-04-01

Product:

Windows

Platform:

Online, Windows Desktop, World tenant

Status:

Change type:

Admin impact

Links:

Details:

Updated March 20, 2026: Added additional guidance for devices using Azure Files SMB with Active Directory-based authentication and Azure Virtual Desktop.


Windows updates released April 2026 and later introduce the second deployment phase of protections for a Kerberos information disclosure vulnerability (CVE-2026-20833). In this phase, domain controllers change default Kerberos ticket behavior for accounts that do not have an explicit Kerberos encryption configuration, shifting to AES-SHA1-only by default. Environments with remaining RC4 dependencies may experience authentication issues unless those dependencies are remediated or explicitly configured.


When this will happen:
April 2026 - Enforcement Phase with manual rollback: Default Kerberos behavior changes so domain controllers use AES-SHA1-only encryption for accounts without explicit encryption type settings, and Enforcement mode is enabled by default on Windows domain controllers. Audit mode remains available as a manual rollback option until July 2026.
July 2026 - Enforcement Phase: Audit mode is removed, leaving Enforcement mode as the only option.

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2026-03-18

updated:
2026-04-17

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

summary for non-techies**

XXXXXXX ... free basic plan only

Direct effects for Operations**

Authentication Failures
Environments with remaining RC4 dependencies may experience authentication issues due to the shift to AES-SHA1-only encryption for accounts without explicit settings.
   - roles: System Administrator, Network Engineer
   - references: https://learn.microsoft.com/windows-server/security/kerberos/detect-remediate-rc4-kerberos, https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833

Access Disruption
Devices using Azure Files SMB with Active Directory-based authentication may face access disruptions if RC4 dependencies are not addressed before the Enforcement phase.
   - roles: Cloud Administrator, IT Support
   - references: https://aka.ms/rc4azurefiles, https://learn.microsoft.com/troubleshoot/windows-server/windows-security/kerberos-protocol-registry-kdc-configuration-keys " target="_blank" rel="nofollow noopener noreferrer">https://learn.microsoft.com/troubleshoot/windows-server/windows-security/kerberos-protocol-registry-kdc-configuration-keys

Increased Support Tickets
Users may report issues related to authentication and access, leading to an increase in support tickets and user dissatisfaction.
   - roles: Help Desk Technician, IT Support
   - references: https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc, https://learn.microsoft.com/windows-server/security/kerberos/detect-remediate-rc4-kerberos " target="_blank" rel="nofollow noopener noreferrer">https://learn.microsoft.com/windows-server/security/kerberos/detect-remediate-rc4-kerberos

Interoperability Issues
Non-Windows devices may not successfully accept Kerberos authentication after the Enforcement phase begins, leading to potential compatibility issues.
   - roles: System Administrator, Network Engineer
   - references: https://learn.microsoft.com/troubleshoot/windows-server/windows-security/kerberos-protocol-registry-kdc-configuration-keys, https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBL " target="_blank" rel="nofollow noopener noreferrer">https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBL

Configuration Management Challenges
The need to validate and potentially reconfigure accounts for msds-SupportedEncryptionTypes may lead to increased workload and complexity in configuration management.
   - roles: System Administrator, Security Analyst
   - references: https://learn.microsoft.com/windows-server/security/kerberos/detect-remediate-rc4-kerberos, https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833

Configutation Options**

XXXXXXX ... paid membership only

Opportunities**

XXXXXXX ... free basic plan only

Potentional Risks**

XXXXXXX ... paid membership only

IT Security**

XXXXXXX ... paid membership only

explanation for non-techies**

XXXXXXX ... free basic plan only

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



change history

DatePropertyoldnew
2026-03-21MC prepareMonitor the System event log for Kerberos-related events indicating RC4 dependencies or insecure encryption configurations. If event log data shows RC4 reliance, remediate by moving to stronger encryption or explicitly configuring the account's msds-SupportedEncryptionTypes attribute where RC4 is still required. Complete these actions before July 2026, when Audit mode is removed and Enforcement mode becomes the only available option.


Note: Audit events related to this change are only generated when Active Directory is unable to issue AES‑SHA1 service tickets or session keys. The absence of audit events does not guarantee that all non-Windows devices will successfully accept Kerberos authentication after the April 2026 Enforcement phase begins. Validate non-Windows interoperability through testing before broadly enabling this behavior.


Additional information:
Read the full hardening guidance: How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833.
Learn about RC4 usage in Windows and its risks: Detect and remediate RC4 usage in Kerberos.
Learn more about the related vulnerability: CVE-2026-20833.
https://learn.microsoft.com/troubleshoot/windows-server/windows-security/kerberos-protocol-registry-kdc-configuration-keys
https://learn.microsoft.com/windows-server/security/kerberos/detect-remediate-rc4-kerberos
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833
https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc
https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBL
https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBN
Monitor the System event log for Kerberos-related events indicating RC4 dependencies or insecure encryption configurations. If event log data shows RC4 reliance, remediate by moving to stronger encryption or explicitly configuring the account's msds-SupportedEncryptionTypes attribute where RC4 is still required. Complete these actions before July 2026, when Audit mode is removed and Enforcement mode becomes the only available option.


Note: Audit events related to this change are only generated when Active Directory is unable to issue AES‑SHA1 service tickets or session keys. The absence of audit events does not guarantee that all non-Windows devices will successfully accept Kerberos authentication after the April 2026 Enforcement phase begins. Validate non-Windows interoperability through testing before broadly enabling this behavior.


Additional information:
Read the full hardening guidance: How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833.
Learn about RC4 usage in Windows and its risks: Detect and remediate RC4 usage in Kerberos.
Learn more about the related vulnerability: CVE-2026-20833.
https://aka.ms/rc4azurefiles
https://learn.microsoft.com/troubleshoot/windows-server/windows-security/kerberos-protocol-registry-kdc-configuration-keys
https://learn.microsoft.com/windows-server/security/kerberos/detect-remediate-rc4-kerberos
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833
https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc
https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBL
https://support.microsoft.com/topic/1ebcda33-720a-4da8-93c1-b0496e1910dc#ID0EDDBN
2026-03-21MC Last Updated03/17/2026 20:57:262026-03-20T20:58:32Z
2026-03-21MC MessagesWindows updates released April 2026 and later introduce the second deployment phase of protections for a Kerberos information disclosure vulnerability (CVE‑2026‑20833). In this phase, domain controllers change default Kerberos ticket behavior for accounts that do not have an explicit Kerberos encryption configuration, shifting to AES‑SHA1-only by default. Environments with remaining RC4 dependencies may experience authentication issues unless those dependencies are remediated or explicitly configured.


When this will happen:
April 2026 - Enforcement Phase with manual rollback: Default Kerberos behavior changes so domain controllers use AES‑SHA1-only encryption for accounts without explicit encryption type settings, and Enforcement mode is enabled by default on Windows domain controllers. Audit mode remains available as a manual rollback option until July 2026.
July 2026 - Enforcement Phase: Audit mode is removed, leaving Enforcement mode as the only option.
Updated March 20, 2026: Added additional guidance for devices using Azure Files SMB with Active Directory-based authentication and Azure Virtual Desktop.


Windows updates released April 2026 and later introduce the second deployment phase of protections for a Kerberos information disclosure vulnerability (CVE‑2026‑20833). In this phase, domain controllers change default Kerberos ticket behavior for accounts that do not have an explicit Kerberos encryption configuration, shifting to AES‑SHA1-only by default. Environments with remaining RC4 dependencies may experience authentication issues unless those dependencies are remediated or explicitly configured.


When this will happen:
April 2026 - Enforcement Phase with manual rollback: Default Kerberos behavior changes so domain controllers use AES‑SHA1-only encryption for accounts without explicit encryption type settings, and Enforcement mode is enabled by default on Windows domain controllers. Audit mode remains available as a manual rollback option until July 2026.
July 2026 - Enforcement Phase: Audit mode is removed, leaving Enforcement mode as the only option.
2026-03-21MC End Time03/17/2027 20:57:252027-03-20T20:58:29Z
2026-03-21MC Start Time03/17/2026 20:57:252026-03-20T20:58:29Z
2026-03-21MC How AffectBeginning with the April 2026 Windows security update, domain controllers will default to issuing AES‑SHA1-encrypted tickets for accounts that do not explicitly define supported encryption types. Environments with service accounts, applications, or devices that still require RC4-based Kerberos tickets may see authentication or connection failures unless those dependencies are addressed. Kerberos-related events in the System event log can help identify and address misconfigurations or remaining dependencies that are likely to become incompatible as enforcement progresses.Beginning with the April 2026 Windows security update, domain controllers will default to issuing AES‑SHA1-encrypted tickets for accounts that do not explicitly define supported encryption types. Environments with service accounts, applications, or devices that still require RC4-based Kerberos tickets may see authentication or connection failures unless those dependencies are addressed. Kerberos-related events in the System event log can help identify and address misconfigurations or remaining dependencies that are likely to become incompatible as enforcement progresses.


Note: For devices using Azure Files SMB with Active Directory-based authentication, address any RC4 dependencies before the Enforcement phase begins to reduce the risk of access disruption as Audit mode is removed in July 2026. Follow the steps in the official documentation to help maintain uninterrupted access to Azure Files and Azure Virtual Desktop.
2026-03-21MC Title30-Day Reminder: Second deployment phase for Kerberos RC4 hardening begins with the April 2026 Windows security update(Updated) Second deployment phase for Kerberos RC4 hardening begins with the April 2026 Windows security update
2026-03-21MC CategoryPlan For ChangePrevent Or Fix Issue

Last updated 2 days ago ago

Leave a Reply

Share to MS Teams

Login to your account

Welcome Back, We Missed You!