Hi WillAftring - you say:
Kerb3961 still leverages existing Kerberos etype configuration group policy: https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos. However, it no longer honors the legacy registry key path of:
HKEY_LOCAL_MACHINE\CurrentControlSet\Control\Lsa\Kerberos\Parameters
REG_DWORD SupportedEncryptionTypes
So where does Windows Server 2025 now look to see what encryption types it's allowed to use, if not that path? From my understanding that value controls which encryption types the machine will accept for Kerberos tickets (whatever is set here is propagated to the msDS-SupportedEncryptionType attribute on the machine account), and is different to DefaultDomainSupportedEncTypes which controls which encryption types to use if the machine doesn't specify a value on msDS-SupportedEncryptionType.
Eg if we want to be able to configure our DCs to only support AES encryption even if a client claims to only support RC4 via it's msDS-SupportedEncryptionType attribute, where do we do that?