Hello @Bill Whipple
Your Windows Server 2022 (21H2) servers are intermittently losing drive mappings, and you’ve correlated this with an LSA error (Event ID 40970) that states:
"The Security System has detected a downgrade attempt when contacting the 3-part SPN" … "The encryption type requested is not supported by the KDC. (0xc00002fd)"
This means that when those servers or their logon scripts try to authenticate using Kerberos (for example, when connecting to their mapped network shares via a Group Policy drive mapping), the client is requesting an encryption type that your updated Domain Controllers (now running Windows Server 2025 functional level) no longer support. In our environment, Windows Server 2025 has been hardened to allow only newer, stronger encryption types (such as AES128 or AES256), while older methods (like RC4) might be disallowed.
When the client requests an outdated encryption type, Kerberos rejects the request, and authentication for things like drive mappings fails—resulting sometimes in a “cannot logon from this Workstation” error and then a subsequent Group Policy processing error (Event ID 1030). A reboot forces a refresh of credentials, which is why sometimes the mappings come back temporarily.
Steps to Resolve the Issue
- Verify and Update Kerberos Encryption Policies
- Check Group Policy Settings: Go to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options in your Group Policy Management Editor. Look for the policy: "Network security: Configure encryption types allowed for Kerberos" – Make sure that it allows only strong encryption types (AES128 and AES256) and does not include older or deprecated types such as RC4 or DES.
- Local Registry Settings (if needed): On a problem server, open the Registry Editor and navigate to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters
If you have a value named SupportedEncryptionTypes, its value must represent the bitmask for the allowed encryptions. To allow AES128 (0x8) and AES256 (0x10) for example, the combined value would be (0x8 + 0x10 = 0x18). Note: If this value is missing or set to an old bitmask that includes RC4, update accordingly. Always back up the registry before making changes.
- Examine the Service Principal Names (SPNs)
- Run the command:
on the affected servers and on your Domain Controllers. Confirm that the SPNs (especially for LDAP, CIFS, etc.) are properly registered. Sometimes duplicate or misconfigured SPNs can prompt Kerberos to negotiate using fallback encryption types.setspn -L <ServerName>
- Run the command:
- Force a Group Policy Update and Credential Refresh
- On the affected servers, run:
gpupdate /force
- Also, consider logging off and back on (or scheduling a reboot after your changes); this ensures that any cached Kerberos tickets are refreshed with the correct encryption settings.
- On the affected servers, run:
- Check for Windows Updates
- Ensure that all Windows Server 2022 (21H2) servers have the latest updates and hotfixes. Microsoft periodically releases updates to align Kerberos implementations and encryption settings. It’s possible that a recent update has tightened the encryption defaults on your DCs, necessitating changes on the clients.
- Monitor and Validate
- After implementing the above changes, monitor the Event Viewer for any recurrence of Event ID 40970 or Group Policy Event ID 1030 errors.
- Validate that drive mappings are stable over the next few days. If the issue persists, a more detailed packet capture (using tools like Network Monitor or Wireshark) might reveal which authentication requests are requesting unsupported encryption.
😊 If my answer helped you resolve your issue, please consider marking it as the correct answer. This helps others in the community find solutions more easily. Thanks!