RC4-ADAssessment

4.14.0-preview0001

PowerShell toolkit for assessing DES and RC4 Kerberos encryption usage in Active Directory. Discovers RC4/DES dependencies across DC encryption, trusts, KRBTGT, service accounts, KDC registry, KDCSVC events, and Security event logs — with inline remediation commands and assessment comparison for tracking progress toward the July 2026 RC4 removal deadline.

Minimum PowerShell version

5.1

This is a prerelease version of RC4-ADAssessment.

Installation Options

Copy and Paste the following command to install this package using PowerShellGet More Info

Install-Module -Name RC4-ADAssessment -AllowPrerelease

Copy and Paste the following command to install this package using Microsoft.PowerShell.PSResourceGet More Info

Install-PSResource -Name RC4-ADAssessment -Prerelease

You can deploy this package directly to Azure Automation. Note that deploying packages with dependencies will deploy all the dependencies to Azure Automation. Learn More

Manually download the .nupkg file to your system's default download location. Note that the file won't be unpacked, and won't include any dependencies. Learn More

Owners

Copyright

(c) Jan Tiedemann. All rights reserved.

Package Details

Author(s)

  • Jan Tiedemann

Tags

ActiveDirectory Kerberos RC4 DES AES Encryption Security Assessment Remediation

Functions

Invoke-RC4Assessment Invoke-RC4AssessmentComparison Invoke-RC4ForestAssessment

Dependencies

This module has no dependencies.

Release Notes

## [4.14.0-preview0001] - 2026-04-27

### Added

- Context-aware `Get-EncryptionTypeString` with `-Context` parameter (`msds`,
 `ddset`, `gpo`) — same bitmask is now decoded differently per context (#30)
- AES256-HMAC-SK (bit `0x20`) decoding in `Get-EncryptionTypeString` (#25)
- Feature flag decoding (bits 16-19: FAST, Compound-Identity, Claims,
 Resource-SID-Compression) for `msds` context
- Enforcement block detection (`TicketEncryptionType = 0xFFFFFFFF`) in
 `Get-TicketEncryptionType` and `Get-EventLogEncryptionAnalysis` with per-DC
 counter and affected-account tracking (#27)

### Changed

- `Get-KdcRegistryAssessment` reads `RC4DefaultDisablementPhase` from the correct
 Policies registry path instead of `Services\Kdc` (#23)
- `Get-AccountEncryptionAssessment` RODC group lookup uses well-known RID 521
 instead of English display name — works on non-English DCs (#24)
- `RC4DefaultDisablementPhase` assessment messages updated for post-April 2026
 semantics: `not set` = implicit enforcement, Phase 0/1 = rollback states (#28)
- Phase 1 description clarifies per-request KDCSVC event logging (#29)
- GPO encryption type callers pass `-Context gpo`, DDSET callers pass
 `-Context ddset` for accurate bitmask decoding

### Fixed

- `Get-EncryptionTypeString` no longer labels bit 31 as "Future" universally —
 "Future encryption types" at the GPO level is bits 5-30 (`0x7FFFFFE0`),
 not bit 31 (#30)
- README/FAQ/QUICK_START: "No reboot required" corrected to "KDC restart
 required" for `RC4DefaultDisablementPhase` (#26)
- README/FAQ: Phase value table updated — `not set` is now enforcement (not
 same as 0) after April 2026 CU (#28)
- QUICK_START: Registry path in remediation snippet corrected to Policies path (#23)

FileList

Version History

Version Downloads Last updated
4.14.0-previ... (current version) 3 4/27/2026
4.13.0 161 4/17/2026
4.13.0-previ... 4 4/17/2026
4.13.0-previ... 3 4/17/2026
4.12.0 14 4/16/2026
4.12.0-previ... 2 4/16/2026
4.11.0 4 4/16/2026
4.11.0-previ... 2 4/16/2026
4.10.0 21 4/15/2026
4.10.0-previ... 3 4/15/2026
4.9.0 16 4/15/2026
4.9.0-previe... 3 4/15/2026
4.8.0 7 4/15/2026
4.8.0-previe... 3 4/15/2026
4.8.0-previe... 2 4/14/2026
4.8.0-previe... 2 4/14/2026
4.8.0-previe... 2 4/14/2026
4.7.0 14 4/13/2026
4.7.0-previe... 3 4/13/2026
4.7.0-previe... 3 4/10/2026
4.6.0 15 4/10/2026
4.6.0-previe... 2 4/10/2026
4.5.0 26 4/7/2026
4.5.0-previe... 2 4/7/2026
4.5.0-previe... 2 4/7/2026
4.5.0-previe... 2 4/7/2026
4.5.0-previe... 2 4/7/2026
4.4.0 4 4/7/2026
4.4.0-previe... 2 4/7/2026
4.4.0-previe... 2 4/7/2026
4.4.0-previe... 5 4/7/2026
4.4.0-previe... 5 4/7/2026
4.3.0 24 4/7/2026
4.3.0-previe... 4 4/7/2026
4.3.0-previe... 4 4/7/2026
4.3.0-previe... 4 4/7/2026
4.2.0 15 4/7/2026
4.2.0-previe... 4 4/7/2026
4.2.0-previe... 7 4/7/2026
4.2.0-previe... 5 3/31/2026
4.2.0-previe... 2 3/31/2026
4.1.2 39 3/31/2026
4.1.1 7 3/30/2026
4.1.0-previe... 2 3/30/2026
4.1.0-previe... 2 3/30/2026
4.0.0 18 3/30/2026
4.0.0-previe... 2 3/30/2026
4.0.0-previe... 2 3/30/2026
Show more