Windows 365 DR Plus & DES Removal: Enhancing Enterprise Resilience

  • Thread Author

Windows 365 DR Plus & DES Removal: Advancements in Enterprise Resilience​

In a bid to bolster enterprise resilience, Microsoft is rolling out two significant updates that will reshape how organizations handle outages and secure their systems. On one front, Windows 365 Disaster Recovery Plus is entering public preview, promising to slash downtime and streamline Cloud PC recovery. On the other, Microsoft is set to remove the aging DES encryption from Kerberos authentication in upcoming Windows releases—an essential move toward modernized security. Let’s dive deep into both developments and explore what they mean for IT admins and businesses.

Rapid Recovery with Windows 365 Disaster Recovery Plus​

Microsoft’s latest preview release, Windows 365 Disaster Recovery Plus, aims to transform how enterprises manage interruptions. Here’s what you need to know:

Key Features and Benefits​

  • Dramatically Reduced Recovery Time:
    Enterprises can now restore access to their Windows 365 Cloud PCs in just 30 minutes—compared to the previous four-hour window. This improvement can make all the difference during unexpected outages.
  • Enhanced Business Continuity:
    The new add-on is designed for organizations with up to 50,000 Cloud PCs per region. By ensuring a rapid rebound from outages, it minimizes disruption and boosts productivity.
  • Configuration Through Microsoft Intune:
    IT admins can activate, configure, and monitor Disaster Recovery Plus directly from the Microsoft Intune admin center. The setup involves:
  • Navigating to Devices > Windows 365 > User Settings > Optional Business Continuity and Disaster Recovery.
  • Enabling the additional Disaster Recovery Plus option.
  • Selecting network options such as Microsoft Hosted Network or Azure Network Connect (ANC) and choosing a geographical backup location.
  • A Complement to Existing Services:
    Previously, the Windows 365 cross-region disaster recovery service allowed enterprises to maintain business continuity during regional outages by creating temporary Cloud PC copies. However, that service featured limitations—temporary PCs were deleted upon deactivation and did not preserve certain data. Disaster Recovery Plus addresses these limitations by focusing on rapid restoration while ensuring that system settings and user data are securely managed.

Expert Analysis​

For organizations dependent on cloud-based workspaces, every minute of downtime can translate into lost productivity and heightened risk. The new DR Plus add-on, with its 30-minute recovery objective, is a welcome innovation. IT admins can now manage recovery strategies more proactively while also monitoring system health through the Cloud PC optional business continuity and disaster recovery report available in Intune. Transitioning to this new tool can be a decisive factor during critical interruptions, making disaster recovery a smoother and more efficient process.
Summary: Windows 365 Disaster Recovery Plus represents a significant leap in business continuity by cutting recovery time drastically and providing a more comprehensive toolset to manage Cloud PC outages.

Strengthening Security by Removing DES Encryption​

In parallel with its disaster recovery innovations, Microsoft is also fortifying its security posture by phasing out the outdated DES encryption from Kerberos authentication protocols in upcoming releases.

What’s Changing?​

  • Eliminating Vulnerable Algorithms:
    The Data Encryption Standard (DES), introduced in 1977 and used within Kerberos since its early days, will be removed from Windows 11 version 24H2 and Windows Server 2025. This change is scheduled to take effect with Windows Updates rolled out on or after September 9, 2025.
  • Transition Through Phases:
    Currently operating under a “Compatibility Mode,” DES has been disabled by default since Windows 7 and Windows Server 2008 R2—but remained available if manually enabled. After the cut-off date, systems will shift to a “DES in Kerberos Disabled Mode,” fully discontinuing support for DES across Kerberos functionalities.

Implications for IT Environments​

  • Mitigating Security Vulnerabilities:
    DES, once a stalwart in encryption standards, has grown increasingly susceptible to breaches. Its removal is a critical measure under Microsoft’s Secure Future Initiative (SFI) aimed at eliminating legacy encryption that poses security risks.
  • Administrative Recommendations:
    Organizations need to:
  • Identify DES Usage:
    Use PowerShell scripts to scan for Kerberos Key Distribution Service (KDCSVC) events (Event IDs 4768 and 4769) in security logs.
  • Reconfigure Legacy Systems:
    Update group policies in Active Directory to ensure that accounts do not rely on DES. This includes unchecking the “Use only Kerberos DES encryption types for this account” option and transitioning to stronger ciphers like AES.
  • Planning for a Seamless Transition:
    IT admins are advised to start this transition process proactively. For instance, updating passwords for accounts created on older domain controllers (e.g., Windows Server 2003) will help ensure compatibility with AES encryption—a safer standard moving forward.

Expert Analysis​

Disabling DES is a necessary evolution in a landscape where cyber threats are more sophisticated than ever. By removing DES from Kerberos authentication, Microsoft is not only closing a security gap but also encouraging organizations to modernize their encryption practices. This change underscores the importance of staying ahead of vulnerabilities by adopting stronger encryption standards and ensuring that legacy configurations do not hinder security.
Summary: The removal of DES encryption reinforces Microsoft’s commitment to a secure ecosystem, providing a critical nudge for enterprises to adopt modern, robust encryption methods to protect sensitive data.

Implications for Enterprise IT: Business Continuity and Cybersecurity in Focus​

While the two updates address different aspects of IT management, they converge on a single theme: enhancing enterprise resilience.
  • Integrating Recovery and Security:
    The new Disaster Recovery Plus add-on offers organizations a reliable tool for rapid recovery from outages, ensuring that operations continue with minimal disruption. Simultaneously, the removal of DES encryption is a proactive move to strengthen security, safeguarding systems from potential breaches that exploit outdated protocols.
  • Proactive IT Management:
    Both updates underscore the importance of forward-thinking IT administration. As enterprises manage cloud resources and secure sensitive data, having streamlined recovery mechanisms and robust encryption protocols becomes indispensable.
  • A Dual Approach to Risk Management:
    Embracing these changes means that enterprises not only reduce downtime during unexpected outages but also mitigate risks from potential security vulnerabilities. This dual approach is particularly critical in today’s digital landscape, where continuity and cybersecurity go hand in hand.
Summary: Combining rapid disaster recovery with strengthened security measures positions organizations to tackle both operational and cyber risks effectively, ensuring sustainable business continuity.

Practical Steps for IT Administrators​

For Windows 365 Disaster Recovery Plus​

  • Access Microsoft Intune:
    Open the Intune admin center and navigate to Devices > Windows 365 > User Settings > Optional Business Continuity and Disaster Recovery.
  • Enable the Add-on:
    Select the “Disaster Recovery Plus” option and define your network and geographical preferences.
  • Bulk Device Action:
    Use the Bulk device action feature (found under Devices > All devices) to activate or deactivate the DR Plus add-on for targeted user groups.
  • Monitor Recovery Status:
    Regularly review the Cloud PC optional BCDR status report under Reports > Cloud PC overview to ensure that recovery settings are optimally functioning.

For DES Removal in Windows 11/Server​

  • Assessment:
    Use PowerShell scripts to scan for Kerberos events (IDs 4768 and 4769) and identify any lingering reliance on DES.
  • Policy Updates:
    In Active Directory Users and Computers, ensure the DES option is unchecked. Adjust Group Policy settings under Network Security to restrict outdated encryption.
  • System Updates:
    Prepare for the transition by testing compatibility with AES encryption and updating systems accordingly—especially those originating from legacy configurations.
  • Documentation and Testing:
    Maintain thorough documentation of modifications and institute a rollback plan in case any issues arise during the transition.
Summary: IT admins can manage these changes through careful planning, regular monitoring, and proactive configuration adjustments to safeguard their enterprise environments.

Conclusion​

Microsoft’s simultaneous rollout of Windows 365 Disaster Recovery Plus and the planned removal of DES encryption mark a pivotal moment for enterprise IT strategy. Faster Cloud PC recovery times and a sharpened security framework work hand in hand to reduce downtime and mitigate cyber risks. By understanding and implementing these updates, organizations can ensure they are not only resilient in the face of operational disruptions but also fortified against emerging security challenges.
These updates—whether enabling rapid disaster recovery or enhancing encryption standards—are essential components in today’s dynamic IT landscape, reinforcing that a secure, well-prepared enterprise is the foundation for future success.
Stay proactive, stay secure, and embrace these advancements as steps toward a robust and reliable IT ecosystem.

Sources: