Hi bswhipp,
Yes, checking the msDS-SupportedEncryptionTypes attribute is the correct approach. A value of 28 means the computer account is configured to support the combined encryption types represented by the bitmask:
[] 4 for RC4_HMAC
[] 8 for AES128_CTS_HMAC_SHA1_96
- 16 for AES256_CTS_HMAC_SHA1_96
In decimal, 4 + 8 + 16 = 28, so that indicates your computer accounts are set for RC4, AES128, and AES256. This is typically what you'd expect unless you or a policy has specifically modified this to exclude certain encryption types.
Regarding Group Policy settings:
[] There isn’t usually a specific GPO for configuring Kerberos encryption types. These settings are generally managed via Active Directory attributes (like msDS-SupportedEncryptionTypes) or, in more advanced setups, through registry modifications (for example at HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters on the domain controllers or member servers).
[] In your case, if you haven’t manually set anything in GPOs related to Kerberos or encryption, then the default behavior is being applied.
Since you’re seeing an error about “The encryption type is not supported by the KDC” on your Windows 2022 member servers, it could be that the Windows 2025 domain controllers are now enforcing stricter policies. One troubleshooting step could be to test changing the msDS-SupportedEncryptionTypes on a test computer to only include AES (AES128 and AES256). That would be a value of 8 + 16 = 24 instead of 28 (thereby excluding RC4).
However, please be very careful with this change and test it in a non-production environment first, since removing RC4 may impact clients or services that still rely on it.
I hope this helps clarify what you’re seeing and where to look. Let me know if you have any more questions or need further assistance!