Microsoft is phasing out the RC4 encryption method used in Kerberos to address vulnerability CVE‑2026‑20833, which allows attackers to exploit weak encryption for offline cracking of service account passwords. The transition timeline includes an initial phase starting January 13, 2026, with new Kerberos audit events and optional registry controls to identify RC4 usage. In April 2026, domain controllers will default to AES‑SHA1, disabling fallback to RC4. By July 2026, Microsoft will remove Audit mode and enforce Enforcement mode, eliminating RC4 from the Kerberos protocol. Organizations are advised to update Active Directory Domain Controllers, monitor System event logs for new audit events, address KDCSVC events, and activate Enforcement mode to enhance security against RC4-related vulnerabilities.