Hi budda - I can see why that can be confusing.
If you have devices in your environment that cannot support AES (legacy system like 2003, XP, etc) you have to be careful when enabling AES on service accounts. For example if you are using an IIS pool account (SPN enabled service account) on a 2003 server and and you enable AES on that service account, the KDC will begin to encrypt tickets for that account with AES and IIS will not be able to use those tickets. If you have no devices that are incapable of AES then then is no need to be cautious hence the "ramp us your efforts" statement.
Disabling RC4 in the operating system of a device will prevent it from accepting a RC4 Kerberos ticket which is why you want to make sure the tickets consumed by a device are AES before you apply the policy to disable RC4.
Generically speaking the order of events should look like this. However, you could address invidual devices and accounts but that requires fully understanding where service accounts are being use to host services.
- Ensure all devices support AES by leveraging the 4768 events (advertised e-types)
- Enable AES on all SPN enabled service accounts
- Use 4768 and 4769 events to confirm no tickets or session key are falling back to RC4
- Disable RC4 on devices