Anavem
Languagefr
Server room with red emergency lighting and error status indicators on equipment

Windows Domain Controllers Hit by Restart Loops After April Patches

Microsoft confirms Windows domain controllers are experiencing continuous restart loops following April 2026 security update installations.

17 April 2026, 09:59 5 min read

Last updated 17 April 2026, 21:32

EXPLOITUnknown
PATCH STATUSUnavailable
VENDORMicrosoft
AFFECTEDWindows Server 2016, Windows S...
CATEGORYMicrosoft

Key Takeaways

Microsoft April 2026 Patches Trigger Domain Controller Boot Failures

Microsoft acknowledged on April 17, 2026, that Windows domain controllers across enterprise environments are experiencing continuous restart loops after installing the company's April 2026 security updates. The issue surfaced within hours of the monthly Patch Tuesday rollout, with IT administrators reporting widespread authentication failures as domain controllers became unable to complete their boot sequences.

The restart loop behavior manifests immediately after the security updates complete installation and the system attempts its first reboot. Affected domain controllers begin the Windows startup process but fail to reach a stable operating state, instead cycling through repeated restart attempts without successfully loading the operating system. This creates a cascading effect across Active Directory environments, as client systems lose access to authentication services and group policy enforcement.

Microsoft's initial investigation points to a conflict between the April security patches and specific domain controller configurations, though the company hasn't identified the exact technical mechanism causing the boot failures. The issue appears most prevalent in environments running Windows Server 2019 and Windows Server 2022 with the domain controller role enabled, particularly in mixed-mode Active Directory forests that include legacy components.

Enterprise IT teams first reported the problem through Microsoft's support channels around 6:00 AM Pacific Time on April 17, with reports escalating rapidly as organizations across different time zones completed their patch installations. Security researchers documented the widespread nature of the issue, noting that the restart loops affect both physical and virtualized domain controller deployments.

The timing proves particularly disruptive for organizations that follow standard patch management practices of installing security updates during maintenance windows. Many IT departments scheduled their April patch deployments for the early morning hours of April 17, expecting routine security improvements but instead encountering critical infrastructure failures that prevent normal business operations from resuming.

Windows Server Domain Controller Environments Face Authentication Disruption

The restart loop issue specifically impacts Windows Server systems configured with the Active Directory Domain Services role, affecting both standalone domain controllers and multi-domain controller environments. Organizations running Windows Server 2019 (all versions from 1809 through 21H2) and Windows Server 2022 (including the latest 23H2 release) report the highest incidence rates, with some Windows Server 2016 deployments also experiencing similar symptoms.

Enterprise environments with complex Active Directory topologies face the most severe disruption, as the restart loops can affect multiple domain controllers simultaneously within the same forest. This creates authentication bottlenecks that prevent user logins, break trust relationships between domains, and disrupt Group Policy application across client systems. Organizations with single domain controller deployments experience complete authentication service outages until the issue resolves.

The problem extends beyond just domain authentication services, impacting dependent systems that rely on Active Directory integration. Exchange Server environments lose directory connectivity, SharePoint farms can't authenticate users, and SQL Server instances configured for Windows Authentication experience connection failures. Cloud-hybrid environments using Azure AD Connect also report synchronization disruptions as on-premises domain controllers become unreachable.

Small and medium businesses operating single-server environments face particularly acute challenges, as their domain controllers often serve multiple roles including file sharing, print services, and application hosting. The restart loops effectively shut down these multi-role servers, creating comprehensive IT service outages that affect all network-dependent business functions until administrators can implement workarounds or rollback procedures.

Microsoft Provides Temporary Workarounds While Investigating Root Cause

Microsoft recommends immediate implementation of several workaround strategies to restore domain controller functionality while the company develops a permanent fix. The primary workaround involves booting affected domain controllers into Safe Mode and manually uninstalling the problematic April 2026 security updates through the Windows Recovery Environment. Administrators can access Safe Mode by interrupting the boot process during the restart loop and selecting "Troubleshoot" from the Advanced Startup Options menu.

For organizations with multiple domain controllers, Microsoft advises implementing a staged recovery approach that prioritizes restoring at least one functioning domain controller per domain to maintain authentication services. This involves identifying the least critical domain controller in each domain, performing the Safe Mode uninstall procedure, and verifying Active Directory replication health before proceeding with additional systems. The company provides specific PowerShell commands for checking replication status and forcing synchronization once systems return to operational status.

Virtual machine environments offer additional recovery options through snapshot restoration, allowing administrators to revert domain controllers to pre-patch states without manual update removal procedures. Microsoft emphasizes the importance of ensuring all domain controllers in a forest return to the same patch level to prevent Active Directory replication conflicts that could compound the authentication disruption.

The company's engineering teams are developing an out-of-band security update to address the restart loop issue, with an estimated release timeline of 48-72 hours from the initial problem acknowledgment. CISA continues monitoring the situation for potential security implications as organizations delay critical security patch installations. Microsoft strongly advises against installing the April 2026 security updates on additional domain controllers until the corrective update becomes available, breaking from standard security patch deployment practices to prevent further infrastructure disruption.

Frequently Asked Questions

How do I fix Windows domain controller restart loops after April 2026 patches?+
Boot the affected domain controller into Safe Mode and manually uninstall the April 2026 security updates through Windows Recovery Environment. Microsoft recommends prioritizing one domain controller per domain for restoration to maintain authentication services.
Which Windows Server versions are affected by the April 2026 restart loop issue?+
Windows Server 2016, 2019, and 2022 systems with the Active Directory Domain Services role are affected. The issue is most prevalent in Windows Server 2019 and 2022 environments with mixed-mode Active Directory configurations.
Should I install April 2026 Windows Server patches on my domain controllers?+
Microsoft advises against installing April 2026 security updates on additional domain controllers until a corrective update releases. The company expects to provide a fix within 48-72 hours of the initial problem acknowledgment.

Discussion

Share your thoughts and insights

Sign in to join the discussion