Hello Rep. Hardware,
Following up on your issue and reevaluating the previous answer, there is absolutely no supported Group Policy or registry mitigation that securely bypasses Kerberos Ticket Granting Ticket (TGT) validation failures caused by duplicate Machine SIDs. The Event ID 6167 LSA authentication error you are experiencing confirms these six newly cloned PCs share identical Security Identifiers and machine account hashes, causing the domain controller's Key Distribution Center (KDC) to reject their mismatched session tickets during the SMB handshake for shared folder access.
The only official Microsoft best practice to resolve this architecture flaw without completely re-imaging the drives from scratch is to disjoin the six affected workstations from the domain and execute the command C:\Windows\System32\Sysprep\sysprep.exe /generalize /oobe /reboot directly from an elevated prompt. While I previously cautioned against this due to the ensuing Out-Of-Box Experience reset and driver stripping, it is the strict technical requirement to force the kernel to generate a new, unique local Machine SID upon the next boot sequence. Any reliance on deprecated third-party SID-changing utilities violates Microsoft support boundaries and will permanently corrupt the local SAM database. Ensure you back up any critical local user data, execute the generalization process, and then rejoin the PCs to the Active Directory to establish healthy trust relationships and unique Service Principal Names (SPNs).
Hope this answer brought you some useful information. If it has, please consider accepting the answer so that other people sharing the same issue would benefit too. Thank you :)
VP