Starting mid-2026, Microsoft will update the default settings for Windows Server's Kerberos Key Distribution Center (KDC), phasing out RC4 encryption. This change is aimed at enhancing security for organizations using Windows Servers 2008 and later.

Why the Change is Needed

RC4 encryption, once popular for its compatibility, is now considered vulnerable to attacks. Microsoft will default to AES-SHA1, a more secure encryption, to help prevent credential theft and network breaches. Organizations should ensure that no systems rely on RC4 to avoid future authentication failures.

Transition Tools and Recommendations

Microsoft offers new tools to help identify systems using RC4. Enhanced Security Event Logs and PowerShell scripts in Windows Server 2019 onward assist IT professionals in detecting RC4 dependencies. The List-AccountKeys.ps1 and Get-KerbEncryptionUsage.ps1 scripts can automate the detection process.

Common issues include accounts without AES-SHA1 support or devices depending solely on RC4. Resetting account passwords or setting proper encryption policies in Active Directory (AD) can resolve these.

Policy and Compliance Steps

Using Windows Admin Center, administrators can audit security baselines to configure compliant encryption policies, which exclude RC4. Supported policies include AES128-SHA96 and AES256-SHA96 encryption types. These settings ensure systems remain fully functional once RC4 is disabled by default.

Adopting AES-SHA1 across supported versions strengthens Windows authentication. Microsoft encourages reviewing their guidance for a smooth transition.

CC Cyber Cafe Admin

CC Cyber Cafe Admin download for free to PC or mobile

Streamline operations with user management, billing, and detailed reporting for enhanced efficiency.

4
570 reviews
3903 downloads

News and reviews about CC Cyber Cafe Admin

10 Dec 2025

Windows to Disable RC4 by Default: Security Update

Microsoft will phase out RC4 encryption in Kerberos for Windows Servers by mid-2026 to enhance security.

Read more