๐ ~1 min read
Table of contents
Symptom & Impact
Service accounts fail logon after addition to Protected Users group on Windows Server 2022 disrupts operations and prevents the affected service from meeting its SLA until remediated.
Environment & Reproduction
The issue reproduces on Windows Server 2022 hosts where the security subsystem is in use, typically following configuration drift or recent updates.
Get-ADUser -Identity svcAccount -Properties memberOf
klist purge
Root Cause Analysis
The defect stems from misaligned protected users group settings, missing prerequisites, or a corrupted state that blocks normal operation.
Quick Triage
Confirm the service is running and capture current configuration state before applying any change.
klist tickets
Get-ADUser svcAccount -Properties msDS-SupportedEncryptionTypes
Step-by-Step Diagnosis
Walk the security stack from configuration to runtime, collecting logs and counters that point at the failing component.
Get-WinEvent -LogName Security | Where Id -in 4625,4771 | Select -First 20
klist sessions

Solution โ Primary Fix
Apply the corrected configuration and restart dependent services so the protected users group component re-initialises cleanly.
Still having issues? Our IT Consulting team can diagnose and resolve this for you. Get in touch for a free consultation.
Remove-ADGroupMember -Identity 'Protected Users' -Members 'svcAccount' -Confirm:$false
Set-ADUser -Identity svcAccount -KerberosEncryptionType AES128,AES256
klist purge -li 0x3e7

Solution โ Alternative Approaches
Where the primary fix is blocked by policy or downtime windows, use the alternative configuration path or staged rollout below.
Set-ADAccountControl -Identity svcAccount -DoesNotRequirePreAuth $false
gpupdate /force
Verification & Acceptance Criteria
Confirm the service reports healthy state and end-to-end functionality succeeds against a representative workload.
Get-ADGroupMember 'Protected Users' | Select SamAccountName
Get-WinEvent -LogName Security | Where {$_.Id -eq 4624 -and $_.Properties[5].Value -eq 'svcAccount'}
Rollback Plan
If the fix introduces regressions, revert configuration to the pre-change baseline and restart the service to restore prior behaviour.
Add-ADGroupMember -Identity 'Protected Users' -Members 'svcAccount'
klist purge
Prevention & Hardening
Bake the validated protected users group configuration into baseline GPOs or DSC and add a monitoring check for early detection.
Get-ADUser -Filter * -Properties memberOf | Where {$_.memberOf -like '*Protected Users*'}
Set-ADUser -Identity svcAccount -ServicePrincipalNames @{Add='HOST/svcAccount.contoso.com'}
Related Errors & Cross-Refs
Related: other security failures, dependent service errors, and downstream client-side symptoms.
Related tutorial: View the step-by-step tutorial for Windows Server 2022.
View all Windows Server 2022 tutorials on the Tutorials Hub โ
Browse all common problems & solutions on the Tutorials Hub.
References & Further Reading
Microsoft Learn documentation for Windows Server 2022 and the relevant component, plus internal runbooks.
Need Expert Help?
If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today โ we respond within one business day.