Action Required for Early Azure Virtual Desktop Deployments - RC4 Azure Files for FSLogix will stop working
Early adopters of Azure Virtual Desktop (AVD) are facing an important security-related change that should not be ignored.
If you are using FSLogix profiles on Azure Files with Active Directory authentication- especially from early AVD deployments- this likely applies to you.
π Background: Whatβs the issue?
Using Azure Files with FSLogix with on-premises Active Directory required complex PowerShell scripts (yes, those painful ones π). Early setups relied on RC4 encryption in a Kerberos context.
π The problem: RC4 is now considered outdated and insecure.
Microsoft is taking action and notifying customers:
β Starting July 2026, RC4 will be disabled by default in Windows

β οΈ What are the risks?
If your environment still relies on RC4, you may experience:
- β Azure Files shares failing to mount
- β AVD users unable to log in
- β Authentication failures across your environment
π Worst case: A complete outage of your AVD environment while users cannot login or only with temporary profiles
π₯ Who is affected?
You should review your setup if:
- You use Azure Files with SMB + on-prem AD DS
- Your storage accounts were created during early AVD/WVD deployments
π‘ Why this matters
This change is not theoretical- it has a defined timeline.
π Recommended deadline: June 2026
If no action is taken:
- After Windows updates β Users may not be able to log in
- FSLogix profiles β May become inaccessible
π οΈ Remediation Steps
Prerequisites:
- A domain-joined machine
- Administrative privileges
- PowerShell access
- Required modules installed
1. Install RSAT tools (if needed)
Add-WindowsCapability βonline βName "Rsat.ActiveDirectory.DS-LDS.Tools~~~~0.0.1.0"
2. Identify affected objects
Run the following command with access to AD:
Get-ADObject -LDAPFilter "(&(servicePrincipalName=*.file.core.windows.net)(!(msDS-SupportedEncryptionTypes=*)))" -Properties servicePrincipalName, msDS-SupportedEncryptionTypes | Select-Object Name, ObjectClass, servicePrincipalName, msDS-SupportedEncryptionTypes
π Result interpretation:
- β
Empty result β Youβre good
- β οΈ Entries found β Action required
3. Install AzFilesHybrid module
Install-Module -Name AzFilesHybrid
4. Connect to Azure
Connect-AzAccount
5. Update encryption to AES256
Run for each affected storage account (use your resource group name and storage account name):
Update-AzStorageAccountAuthForAES256 -ResourceGroupName "SharedServices" -StorageAccountName "wvduserdata"
π Adjust parameters to match your environment.
6. Verify remediation
Run the query again:
Get-ADObject -LDAPFilter "(&(servicePrincipalName=*.file.core.windows.net)(!(msDS-SupportedEncryptionTypes=*)))" -Properties servicePrincipalName, msDS-SupportedEncryptionTypes | Select-Object Name, ObjectClass, servicePrincipalName, msDS-SupportedEncryptionTypes
π Goal:
No results = successfully remediated β
π Further Reading
Microsoft documentation:
https://learn.microsoft.com/en-us/troubleshoot/azure/azure-storage/files/security/files-troubleshoot-smb-authentication?tabs=azure-portal#azure-files-on-premises-ad-ds-authentication-support-for-aes-256-kerberos-encryption
π Conclusion
This is not a βnice to haveβ fix-it is critical for the future stability and security of your AVD environment.
π Taking action early means:
- Avoiding outages
- Staying compliant
- Reducing last-minute pressure before the deadline
