Open the Group Policy Management Console. By default, the gpmc.msc tool is in the C:\Windows\System32 directory.
Locate the relevant domain. Then, select Default Domain Policy.
Right-click Default Domain Policy and select Edit. The Group Policy Management Editor opens.
Click Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options.
Double-click Network security: Configure encryption types allowed for Kerberos.
Select one of the following encryption-type couplings.
To prohibit the use of AES 256-bit (AES-256) encryption, select RC4_HMAC_MD5 and AES128_HMAC_SHA1.
To allow the use of AES-256 encryption, which is the default policy setting, select RC4_HMAC_MD5, AES128_HMAC_SHA1, and AES256_HMAC_SHA1.
For the Default Domain Controller Policy, complete the following steps.
In the Group Policy Management Console, select Default Domain Controller Policy.
Right-click Default Domain Controller Policy and select Edit. The Group Policy Management Editor opens.
Repeat steps 4-6.
reference:https://www.ibm.com/support/knowledgecenter/SSYMRC_6.0.0/com.ibm.jazz.install.doc/topics/t_kerSso_svr_enfor_encr_ad_cli.html
Tip: This answer contains the content of a third-party website. Microsoft makes no representations about the content of these websites. We provide this content only for your convenience.
Hope this information can help you
Best wishes
Vicky