{"id":21247,"date":"2025-12-03T09:00:00","date_gmt":"2025-12-03T17:00:00","guid":{"rendered":""},"modified":"2026-02-19T17:21:49","modified_gmt":"2026-02-20T01:21:49","slug":"beyond-rc4-for-windows-authentication","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/windows-server\/blog\/2025\/12\/03\/beyond-rc4-for-windows-authentication\/","title":{"rendered":"Beyond RC4 for Windows authentication"},"content":{"rendered":"\n

As organizations face an evolving threat landscape, strengthening Windows authentication is more critical than ever. The deprecation of RC4 (Rivest Cipher 4) encryption in Kerberos is a shift toward modern, resilient security standards. RC4, once a staple for compatibility, is susceptible to attacks like Kerberoasting<\/a> that can be used to steal credentials and compromise networks. It is crucial to discontinue using RC4.<\/p>\n\n\n\n

By mid-2026, we will be updating the domain controller default assumed supported encryption types. The assumed supported encryption types is applied to service accounts that do not have an explicit configuration defined. Secure Windows authentication does not require RC4; AES-SHA1 can be used across all supported Windows versions since it was introduced in Windows Server 2008. If existing RC4 use is not addressed before the default change is applied, authentication relying on the legacy algorithm will no longer function. This blog post helps IT professionals transitioning to AES-SHA1 encryption by offering steps to detect and address remaining RC4 usage.<\/p>\n\n\n\n

For additional details on our Windows Update rollout strategy, check out this page on how to manage Kerberos KDC usage of RC4<\/a>.<\/p>\n\n\n\n

\n
Learn more about how you can strengthen Windows authentication<\/a><\/div>\n<\/div>\n\n\n\n

Detect RC4 usage with new tools<\/h2>\n\n\n\n

Aside from the Windows Update rollout of changes to domain controller default assumed supported encryption types, RC4 should be completely disabled in domain environments to maximize security. Legacy applications or interoperability with non-Windows devices may still necessitate the use of RC4, and such dependencies will need to be identified and addressed.<\/p>\n\n\n\n

To support the identification of RC4 usage, we have enhanced existing information within the Security Event Log and developed new PowerShell auditing scripts. These enhancements are available in Windows Server versions 2019, 2022, and 2025.<\/p>\n\n\n\n

New fields within existing Kerberos Events<\/h3>\n\n\n\n

The Security Event Log on Key Distribution Centers (KDC) logs when a client requests a ticket during authentication and when they request access to a specific service within the domain:<\/p>\n\n\n\n