I had tried all these suggestion except Network reset. Did find a solution from another source:
Did the following on each Win 11 PC. After making the changes uninstalled the connector, left the domain back to Workgroup. Updated to Win 11 24H2. Once updated reran the Connector and rejoined the Domain. Before doing this, I did setup a Test client with Policy fix in place. It connected without an issue.
From another source:
"What we found was an Encryption policy during GPO assignment was not deploying to devices.
The policy in question is located under the following location:
Local Computer Policy - Computer Configuration - Windows Settings - Security Settings - Local Policies - Security Options.
Policy is called Network Security: Configure Encryption types allowed for Kerberos. And we then enabled the following options to be applied from GPO:
RC4_HMAC_MD5
AES128_HMAC_SHA1
AES256_HMAC_SHA1
Future encryption types
Also, a good idea to check the following on the client side that is not joining and updating the reg key provided for it to receive the policy.
Also, a good idea to test this policy first before deploying to all devices.
On the client side
- If a policy is specifying a kerberos encryption key, then you will need to change the following in the registry
- The key will not be present if a policy is not applied
- Faulty entry in registry
Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \Sofware\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\
Value Name: SupportedEncryptionTypes
Type: REG_DWORD
Value: 1, 2, or 3 are a finding.
- Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \Sofware\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\
change to Value Name: SupportedEncryptionTypes 7ffffffc 2. Pc will need to restarted. 3. Run a gpupdate /force to enforce the new policies"
Our functional Domain Level is Server 2016 Only one PC did not have the correct Registry Value.