Hello Planck, Jeremy,
How is your issue going? To add, the presence of Event ID 3095 confirms that the Service Control Manager (SCM) or the credential subsystem is attempting to invoke the Netlogon service to authenticate the configured logon account. Because the machine operates in a workgroup, Netlogon immediately terminates upon startup, which the SCM subsequently interprets as a fatal dependency failure, resulting in Error 1068. This failure occurs when the SCM attempts a domain-level credential lookup instead of querying the local Security Account Manager (SAM) database. You must force explicit local authentication by modifying the service account format in the Services console to use the exact syntax of .\Username or ComputerName\Username, stripping away any implicit Universal Principal Name (UPN) or legacy domain structures that the OS might be trying to resolve.
Furthermore, you must inspect the raw registry configuration by navigating to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\<YourServiceName>. Double-check the DependOnService multi-string value directly within the registry. The Windows Services GUI often masks group dependencies prefixed with a plus sign (like +TDI) or orphaned network provider calls left behind by deployment frameworks. For a truly independent workgroup service, this registry value must be completely empty. Finally, launch secpol.msc and navigate to Local Policies, User Rights Assignment, and ensure your specific local account is explicitly granted the SeServiceLogonRight (Log on as a service) privilege. Relying on local group inheritance for this specific right can fail silently in isolated workgroup environments during the SCM credential broker phase, causing the Netlogon fallback loop you are experiencing.
Hope this answer brought you some useful information. If it has, please consider accepting the answer so that other people sharing the same issue would benefit too. Thank you :)
VP