Microsoft releases several Windows updates that are supposed to fix failed logins and other issues related to Kerberos authentication.
This patch wave follows the last Patch Tuesday. The company explains that these errors are linked to the “updates” offered during the major maintenance in November. One of the main problems is that Windows servers have a domain controller role with Kerberos authentication enabled.
In recent days, the errors have multiplied. It was postponed
- Domain connectivity issues, but also AD FS (Active Directory Federation Services) authentication,
- Authentication issues with gMSAs used for services such as Internet Services (IIS Web Server). gMSA stands for Group Managed Service Accounts,
- Remote desktop connections using domain users are not possible,
- difficulty accessing shared folders on workstations and file shares on servers.
- Cannot print if domain user authentication is used.
On the “General Public” segment, the good news is that all these errors are unlikely to cause many casualties. Why ? The PC must be part of a local domain.
This whole little world is fixed through new updates. System administrators are encouraged to download them now. The giant adds
This issue has been resolved in out-of-band updates released on November 17, 2022 for installation on all domain controllers (DCs) in your environment. You do not need to install an update or make changes to other servers or client devices in your environment to resolve this issue. If you have used any workarounds or workarounds for this issue, they are no longer needed and we recommend that you remove them.
Patches are part of cumulative updates and standalone updates. For download here are all necessary links.
Cumulative Updates:
Autonomous updates.