RC4 Disablement Phase Registry
Reads RC4DefaultDisablementPhase from each domain controller's remote registry. Flags controllers at conflicting phases — a common cause of post-patch authentication outages. Color-coded by phase in the report.
Microsoft's next Patch Tuesday starts Kerberos RC4 disablement on fully patched domain controllers. Environments without a remediation plan in place face unplanned authentication outages — for service accounts, SSO, and every Entra hybrid-joined device on the network.
Coverage
RC4 Detect analyzes your Active Directory environment across all known RC4 Kerberos attack surfaces, from individual service accounts to forest-level trust configurations.
Reads RC4DefaultDisablementPhase from each domain controller's remote registry. Flags controllers at conflicting phases — a common cause of post-patch authentication outages. Color-coded by phase in the report.
Queries the System event log on each DC for KDCSVC events 201–209 to verify RC4-off capability. Domain controllers running pre-Server 2016 or missing Event 205 are flagged as incapable — a hard blocker for RC4 elimination that must be resolved before April 14.
Enumerates all AD accounts with registered SPNs that permit RC4 Kerberos (AES not enforced). These accounts are offline-crackable via Kerberoasting. Reported with SPN, account age, and password last set.
Identifies accounts with Do not require Kerberos preauthentication set. These accounts expose encrypted AS-REP responses to offline cracking — no authentication required by the attacker.
Assesses golden ticket exposure by checking KRBTGT password age across all domains. Provides adaptive remediation guidance — 1 or 2 rotation cycles — based on your environment's replication topology.
Identifies when the Entra Connect seamless SSO computer account is RC4-only. This causes silent Kerberos handshake failures for hybrid-joined users, forcing manual password prompts — a widely overlooked RC4 dependency.
Reviews Group Policy Objects for Network security: Configure encryption types allowed for Kerberos. Flags policies that explicitly permit RC4_HMAC_MD5, DES, or leave encryption type enforcement absent.
Checks that Kerberos service ticket auditing is configured on all domain controllers. Missing audit policy prevents detection of RC4 ticket requests in-flight and blocks event-log-based capability verification.
Examines cross-domain and cross-forest trust objects for RC4 usage. Inter-forest Kerberos can silently fall back to RC4 when trusts lack AES enforcement, creating exposure that bypasses intra-domain hardening.
Sample report
Every RC4 Detect assessment delivers a forensic-grade HTML report — branded, timestamped, and scoped to your Active Directory forest. Below is a redacted example from a real engagement. Click any panel to expand.
Fully sortable & filterable. Every table can be sorted by any column and filtered by keyword — isolate the highest-risk accounts, oldest passwords, or most exposed trust relationships instantly.
Export to CSV. One-click download per table — hand raw findings directly to your ticketing system, SIEM ingestion pipeline, or remediation runbook.
The overall risk score weights findings by severity and exploitability. A score of 100 means active, unmitigated exposure to both Microsoft enforcement and adversarial attack.
TGS traffic analysis shows what proportion of live Kerberos authentication requests are still negotiating RC4 — the real-world signal of how much will break on April 14.
An aged KRBTGT leaves the Golden Ticket attack window dangerously wide. The report recommends 1 or 2 rotations based on your replication topology.
From Kerberoastable service accounts to NTLM fallback exposure — every finding is categorized, severity-rated, and mapped to a prioritized remediation step.
Process
From purchase to report in hand — a tightly controlled, auditable chain of custody for your sensitive AD data.
PresideTech issues a cryptographically signed, time-limited product key scoped to your forest FQDN and tier. The key expires in 7 days and can only be consumed once.
RSA-SHA256 signed · 7-day TTL
Run the self-contained collector on any domain-joined Windows host with read access to Active Directory. No installation required. No AD objects modified.
.NET 8 · single-file binary · no install
The collector queries Active Directory via LDAP, reads remote registry on DCs, and analyzes Windows Event Logs — all read-only. You select which domains and sites to include.
LDAP · Remote Registry · Event Log
Results are AES-256-CBC encrypted with an RSA-4096-OAEP key envelope and written to a file locally. Your AD data never crosses the network in plaintext.
AES-256-CBC · RSA-4096-OAEP · HMAC-SHA256
You transmit the encrypted file to PresideTech. Our analysts decrypt it using HSM-backed private keys, review findings, and deliver your HTML assessment report with prioritized remediation steps.
Azure Key Vault HSM · analyst reviewed
Data protection
We assess your environment with the same rigor we apply to securing the assessment itself.
AD data is encrypted before any file is written to disk. Nothing is transmitted to PresideTech infrastructure in plaintext — ever.
The RSA-4096 private key used to decrypt result files lives in Azure Key Vault HSM. It never leaves the hardware security module.
Each assessment key is scoped to a specific forest FQDN, expires in 7 days, and transitions to Consumed state after a single use. Replay is architecturally impossible.
Every key issuance, reservation, consumption, and analyst decryption event is recorded in a tamper-evident Azure Table Storage ledger with timestamps.
Assessment tiers
Every tier includes the full RC4 Detect analysis and analyst-reviewed remediation report. Tiers differ only by the number of domains examined within a forest. For geographically distributed environments with high-latency or low-bandwidth links between sites, we recommend purchasing one Standard assessment per site segment.
Standard
Up to 2 domains in forest
Covers most single-domain and root + child domain forests. For environments split across high-latency or low-bandwidth links, purchase one Standard per geo.
Enterprise
Up to 5 domains in forest
Multinational
Up to 12 domains in forest
Questions
Get assessed
There isn't time to remediate what you haven't mapped. Analyst capacity is limited — get in the queue now, understand your blast radius, and sequence your fixes before enforcement lands.