Pre-Enforcement outage prediction
Names every account that will fail after the authentication behavior flips - turns we'll find out when users complain into a triaged remediation list before the failure window opens.
Microsoft's April Patch Tuesday activated Kerberos RC4 disablement on fully patched domain controllers and will be enforced in July with no way to revert. Environments without a remediation plan in place face unplanned authentication outages — many accounts and services built up over years of operation might simply stop working, with no automatic fix and no grace period. The longer your environment has been running, the more silent RC4 dependencies have accumulated. The only way to know your true exposure is to look before the deadline forces you to find out the hard way. Our RC4 Assessment shows you which accounts are detected with valid AES keys prior to enforcement rather than just showing events about what only authenticated as RC4. Our assessment has a prioritized remediation plan that can also be leveraged when Cyber Insurance underwriters demand it.
Coverage
RC4 Detect analyzes your Active Directory environment across all known RC4 Kerberos attack surfaces, from individual service accounts to forest-level trust configurations.
Names every account that will fail after the authentication behavior flips - turns we'll find out when users complain into a triaged remediation list before the failure window opens.
Pulls per user keys so the report shows directly observed credential-store contents, not inferences - eliminates resetting accounts that are demonstrably fine and cuts the post-Enforcement remediation backlog to the accounts that actually need it.
For the residual population the event logs haven't proved out, classifies each account by password-age tier - converts an unknown bucket into a triaged reset list with the right urgency per tier.
Joins audit-mode log evidence back to specific accounts in every table — converts the audit-mode preview window from a pile of event entries into a per-account this one will break list operators can act on.
Per-endpoint, per-account aggregation of RC4 ticket counts - surfaces the specific workstations, appliances, and apps still negotiating RC4 so remediation effort lands on the actual sources, not a forest-wide guess.
Password age, AES key presence, and rotation history on every KRBTGT (including RODC variants) with risk-tiered remediation — exposes the silent invisible-forgery window most environments don't measure.
Per-service-account aggregation of events shows which client accounts and IPs requested each service ticket – allows understanding the landscape of some of the highest risk accounts, prioritizing remediation by real reachability instead of just privilege flags.
Checks each DC for audit settings, RC4 enforcement patch level and encryption enfoorcement setting of Legacy/Audit/Enforcement based on actual registry state, not assumptions — the only way to predict same-account-different-DC inconsistencies before they cause sporadic auth failures.
Sequenced steps (audit-mode first, then patches, then KRBTGT, then accounts, then re-rotate) with priority labels — replaces Microsoft says fix RC4 with a concrete in-order plan a sysadmin can execute without breaking auth in the middle.
Sample report
Every RC4 Detect assessment delivers a forensic-grade HTML report — branded, timestamped, and scoped to your Active Directory forest. Below is a redacted example from a real engagement. Click any panel to expand.
Fully sortable & filterable. Every table can be sorted by any column and filtered by keyword — isolate the highest-risk accounts, oldest passwords, or most exposed trust relationships instantly.
Export to CSV. One-click download per table — hand raw findings directly to your ticketing system, SIEM ingestion pipeline, or remediation runbook.
The overall risk score weights findings by severity and exploitability. A score of 100 means active, unmitigated exposure to both Microsoft enforcement and adversarial attack.
TGS traffic analysis shows what proportion of live Kerberos authentication requests are still negotiating RC4 — the real-world signal of how much will break on April 14.
An aged KRBTGT leaves the Golden Ticket attack window dangerously wide. The report recommends 1 or 2 rotations based on your replication topology.
From Kerberoastable service accounts to NTLM fallback exposure — every finding is categorized, severity-rated, and mapped to a prioritized remediation step.
Process
From purchase to report in hand — a tightly controlled, auditable chain of custody for your sensitive AD data.
PresideTech issues a cryptographically signed, time-limited product key scoped to your forest FQDN and tier. The key expires in 7 days and can only be consumed once.
RSA-SHA256 signed · 7-day TTL
Run the self-contained collector on any domain-joined Windows host with read access to Active Directory. No installation required. No AD objects modified.
.NET 8 · single-file binary · no install
The collector queries Active Directory via LDAP, reads remote registry on DCs, and analyzes Windows Event Logs — all read-only. You select which domains and sites to include.
LDAP · Remote Registry · Event Log
Results are AES-256-CBC encrypted with an RSA-4096-OAEP key envelope and written to a file locally. Your AD data never crosses the network in plaintext.
AES-256-CBC · RSA-4096-OAEP · HMAC-SHA256
You transmit the encrypted file to PresideTech. Our analysts decrypt it using keys stored in Azure Key Vault, review findings, and deliver your HTML assessment report with prioritized remediation steps.
Azure Key Vault · analyst reviewed
Data protection
We assess your environment with the same rigor we apply to securing the assessment itself.
AD data is encrypted before any file is written to disk. Nothing is transmitted to PresideTech infrastructure in plaintext — ever.
The RSA-4096 private key used to decrypt result files is stored in Azure Key Vault. It never exists outside of the vault.
Each assessment key is scoped to a specific forest FQDN, expires in 7 days, and transitions to Consumed state after a single use. Replay is architecturally impossible.
Every key issuance, reservation, consumption, and analyst decryption event is recorded in a tamper-evident Azure Table Storage ledger with timestamps.
Assessment tiers
Every tier covers a single Active Directory domain and delivers an analyst-reviewed remediation report. Already have Professional? Upgrade to unlock the full Enterprise analysis for the same domain.
Professional
Single domain
$5,995
Enterprise
Single domain
$9,995
Professional → Enterprise Upgrade
Existing Professional customers
$4,995
Questions
Get assessed
There isn't time to remediate what you haven't mapped. Analyst capacity is limited — get in the queue now, understand your blast radius, and sequence your fixes before enforcement lands.