Microsoft Confirms Windows Domain Controller Restart Loops Following April 2026 Security Updates

Microsoft has officially acknowledged a critical issue affecting Windows Server environments where domain controllers are entering persistent restart loops following the installation of the April 2026 security updates. The problem, which stems from crashes within the Local Security Authority Subsystem Service (LSASS), has created significant disruptions for enterprise IT departments relying on specific Active Directory configurations. According to reports from the field and official documentation from Microsoft’s release health dashboard, the instability is primarily triggered by the KB5082063 update, rendering some directory services unavailable and preventing user authentication across affected domains.
The Local Security Authority Subsystem Service is a core component of the Windows operating system, responsible for managing user logins, password changes, and the creation of access tokens. Because LSASS is integral to the security and identity architecture of Windows, any failure within the process forces the operating system to initiate a protective shutdown and subsequent reboot. In the context of a domain controller—the server responsible for responding to security authentication requests—an LSASS crash effectively paralyzes the network’s ability to verify identities and grant access to resources.
Technical Scope and Affected Environments
The current wave of LSASS crashes is not universal but is highly specific to certain infrastructure configurations. Microsoft’s investigation reveals that the issue predominantly impacts non-Global Catalog (non-GC) domain controllers. In an Active Directory environment, a Global Catalog server is a domain controller that stores a full copy of all objects in its host domain and a partial, read-only copy of all objects in all other domains in the forest. Non-GC domain controllers, which hold a more limited scope of data, appear to be the primary victims of this update-induced instability.
Furthermore, the vulnerability is linked to environments utilizing Privileged Access Management (PAM). PAM is a robust security framework designed to safeguard administrative credentials and provide "just-in-time" access to sensitive systems. Ironically, organizations that have implemented these advanced security protocols to harden their infrastructure are currently the most vulnerable to this specific service failure.
The list of affected operating systems is extensive, covering nearly the entire modern Windows Server ecosystem:
- Windows Server 2025
- Windows Server 2022
- Windows Server 23H2
- Windows Server 2019
- Windows Server 2016
Microsoft has clarified that this issue is unlikely to impact personal devices or consumer-grade hardware, as these systems typically do not function as domain controllers or utilize the enterprise-specific PAM features that trigger the crash.

Chronology of Recent Windows Server Update Challenges
The April 2026 incident is the latest in a series of similar challenges involving Windows Server security updates over the past several years. IT administrators have noted a recurring pattern where updates released in the spring—particularly in the months of March and April—have led to significant authentication and stability issues.
In March 2024, Microsoft was forced to release emergency out-of-band (OOB) updates after the standard monthly security patches caused domain controllers to crash. Only a month later, in April 2024, another set of updates triggered widespread NTLM authentication failures and reboot loops. The cycle continued into 2025, when the April updates caused authentication problems that were not fully resolved until a subsequent fix was deployed in June of that year.
The repetition of these issues has led to increased scrutiny of Microsoft’s "Patch Tuesday" testing protocols for legacy and complex server environments. While the patches are essential for mitigating zero-day vulnerabilities and maintaining a high security posture, the resulting downtime from infrastructure crashes creates a difficult balancing act for system administrators who must weigh the risk of a cyberattack against the risk of a self-inflicted system outage.
Concurrent Issues with KB5082063
The LSASS crash is not the only problem currently plaguing the April 2026 update cycle. Microsoft is simultaneously investigating two other significant issues related to the KB5082063 update.
First, a subset of Windows Server 2025 users has reported that the update fails to install entirely. The installation process typically reaches a certain percentage before rolling back, leaving the system without the latest security protections. This failure to update creates a "security gap," as administrators cannot patch known vulnerabilities until the installation bug is resolved.
Second, Microsoft has issued a warning regarding BitLocker recovery prompts. Some Windows Server 2025 devices, after deploying the April updates, have unexpectedly prompted users for a BitLocker recovery key during the boot process. This occurs when the system detects a change in the boot environment that it perceives as a potential security threat. For administrators who do not have their recovery keys readily accessible, this can result in permanent data loss or prolonged downtime while keys are retrieved from Active Directory or cloud backups.
Official Response and Mitigation Strategies
As of the current reporting period, a permanent, automated fix for the LSASS restart loops has not yet been released. Microsoft’s engineering teams are reportedly working on a high-priority resolution, likely to be delivered via a subsequent cumulative update or an out-of-band patch.

In the interim, Microsoft has advised affected organizations to contact Microsoft Support for Business. While the company has not publicly detailed a universal workaround—likely because the mitigation may involve sensitive registry changes or configuration shifts that vary by environment—they have indicated that specific measures can be applied to stabilize domain controllers even after the April 2026 update has been installed.
Industry experts suggest that administrators who have not yet deployed the April updates should exercise caution. Standard best practices in these scenarios include:
- Staged Deployment: Testing the update on a single non-critical domain controller before rolling it out to the entire production environment.
- Backups and Snapshots: Ensuring that full system state backups and virtual machine snapshots are taken immediately prior to update installation to allow for rapid recovery.
- Key Documentation: Verifying that all BitLocker recovery keys are documented and accessible in the event of a lockout.
- Monitoring: Implementing enhanced monitoring of the LSASS process and system event logs (specifically Event ID 1015 and 1000) to detect early signs of service failure.
Analysis of Implications for Enterprise Security
The recurring nature of domain controller failures following security updates highlights a growing tension in the world of enterprise IT. On one hand, the threat landscape is more dangerous than ever, with state-sponsored actors and ransomware groups constantly looking for unpatched vulnerabilities in Active Directory—the "keys to the kingdom" for most corporations. On the other hand, the complexity of Active Directory, especially when combined with modern security layers like Privileged Access Management, makes it increasingly difficult for Microsoft to guarantee that a patch won’t have unintended consequences.
The fact that PAM-enabled environments are the ones suffering most in this instance is particularly concerning. PAM is a cornerstone of the Zero Trust architecture that Microsoft itself promotes. When the implementation of security best practices leads to system instability, it can inadvertently discourage organizations from adopting those very practices, as stability often takes precedence over theoretical security risks in a high-stakes business environment.
Furthermore, the persistent issues with Windows Server 2025—Microsoft’s latest server operating system—suggest that the "early adopter" phase remains fraught with risk. The combination of installation failures, BitLocker bugs, and LSASS crashes within the same update cycle may lead many organizations to delay their migration to Windows Server 2025 until the platform reaches a higher level of maturity and update reliability.
Conclusion
The April 2026 update cycle has proven to be a significant hurdle for Windows Server administrators. With domain controllers being the backbone of corporate identity and security, any disruption to their operation has a ripple effect across the entire organization, potentially locking out thousands of users and halting business operations.
While Microsoft works toward a permanent solution, the incident serves as a stark reminder of the necessity of robust patch management policies. Organizations must move away from automated "apply-all" update strategies for critical infrastructure, instead favoring a lab-tested, phased approach that accounts for the specific nuances of their Active Directory configuration. As the industry awaits the final fix, the focus remains on stabilization and the prevention of further "restart loops" that threaten to bring enterprise productivity to a standstill.







