Microsoft confirms some Windows Server domain controllers can enter reboot loops after April 2026 patches


Microsoft has confirmed that some Windows Server domain controllers can enter repeated restart loops after installing the April 2026 security updates. The company says the issue affects domain controllers in environments with multiple domains in the forest that use Privileged Access Management, where LSASS can crash during startup and leave authentication and directory services unavailable.

The sample you shared gets the broad story right, but it is too narrow in one key area. This is not limited to Windows Server 2025. Microsoft’s Windows release health page says the confirmed reboot-loop issue affects Windows Server 2016, 2019, 2022, version 23H2, and 2025.

The trigger is the April 2026 security update for each affected server version. For Windows Server 2025, the update is KB5082063, released on April 14, 2026, and Microsoft’s support page now lists “Domain controllers might restart repeatedly after installing this update” as a known issue.

What Microsoft has confirmed

Microsoft says the restart loop happens after installing the April security update and rebooting. The affected domain controllers can hit LSASS crashes during startup, which then causes repeated restarts and can render the domain unavailable if the server cannot recover cleanly.

Microsoft also says the issue is specific to Windows Server environments and does not affect consumer PCs or typical personal devices. The scenario is tied to managed enterprise environments, especially those using PAM in multi-domain forests.

There is also no public one-click fix yet. Microsoft says administrators need to contact Microsoft Support for Business to obtain a mitigation, and that the company is working on a resolution it expects to release in the next few days.

The Windows Server 2025 side of the story

For Windows Server 2025 specifically, KB5082063 carries OS Build 26100.32690 and includes the monthly security fixes plus non-security improvements from the March preview update KB5078740. Microsoft’s release notes also confirm that the servicing stack update KB5082062, build 26100.32692, ships with this release.

Your sample also mentions another issue tied to Server 2025, and that part is supported by Microsoft. The company says a limited number of Windows Server 2025 systems may fail to install KB5082063 and can show error 0x800F0983 or 800F0983 during deployment, though Microsoft has not published a workaround yet on the main KB page.

The BitLocker warning is also real, but it needs tighter wording. Microsoft says only a limited number of systems are affected, and only when several specific conditions are all true, including BitLocker on the OS drive, a particular Group Policy configuration involving PCR7, and a device state where the 2023-signed Windows Boot Manager has not already become the default.

What KB5082063 does fix

Despite the known issues, KB5082063 still includes several real improvements. Microsoft says it changes the default DefaultDomainSupportedEncTypes value for Kerberos KDC operations to use AES-SHA1 for accounts without an explicit Active Directory encryption type definition, tied to CVE-2026-20833.

The update also improves SMB compression over QUIC, adds protections when opening Remote Desktop .rdp files by showing requested settings before connection, improves the Set-GPPrefRegistryValue PowerShell cmdlet, and disables the Windows Deployment Services “Hands-Free Deployment” feature by default as part of the hardening related to CVE-2026-0386.

Microsoft additionally says the release expands high-confidence targeting data for Secure Boot certificate rollout and addresses an issue where devices could enter BitLocker Recovery after Secure Boot updates. That matters because Secure Boot certificate expiry starts in June 2026, so Microsoft is clearly trying to prepare systems ahead of that transition.

What admins should do now

The most practical guidance right now is to pause broad deployment of the April security update on domain controllers in affected enterprise environments until Microsoft publishes the fix or gives you a case-specific mitigation. That is especially important for organizations using multi-domain forests with PAM, because Microsoft has tied the reboot-loop issue directly to that setup.

If you already installed the update and hit the problem, Microsoft’s official guidance is to contact Microsoft Support for Business for the mitigation. Public third-party reports say some administrators recovered by uninstalling the update, but Microsoft has not published that as the official universal workaround on the KB page, so it is better to present that only as anecdotal field reporting rather than settled vendor guidance.

Organizations that may also fall into the BitLocker-risk group should audit the relevant Group Policy before patching. Microsoft gives exact steps, including setting “Configure TPM platform validation profile for native UEFI firmware configurations” to “Not Configured,” then using gpupdate /force and BitLocker protector disable/enable commands to refresh the bindings.

Key details at a glance

ItemDetails
Main issueDomain controllers may restart repeatedly
TriggerApril 2026 security updates
Confirmed cause pathLSASS crashes during startup
Affected environmentsMulti-domain forests using PAM
Affected versionsWindows Server 2016, 2019, 2022, 23H2, 2025
Windows Server 2025 KBKB5082063
Server 2025 build26100.32690
Bundled SSUKB5082062, build 26100.32692
Extra known issueSome Server 2025 installs fail with 0x800F0983
Current Microsoft guidanceContact Microsoft Support for Business for mitigation

The table above is based on Microsoft’s release notes and Windows release health status pages.

FAQ

Is the reboot-loop issue limited to Windows Server 2025?

No. Microsoft says it affects Windows Server 2016, 2019, 2022, version 23H2, and 2025.

What causes the reboot loop?

Microsoft says affected domain controllers can experience LSASS crashes during startup after installing the April 2026 security update, which then leads to repeated restarts.

Has Microsoft released a fix yet?

Not yet. Microsoft says a mitigation is available through Microsoft Support for Business and that a full resolution is coming in the next few days.

Is the 0x800F0983 install failure part of the same problem?

It is a separate known issue tied to KB5082063 on a limited number of Windows Server 2025 systems. Microsoft is investigating it, but the reboot loop and the install failure are not described as the same fault.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages