The KDC uses MsDS-SupportedEncryptionTypes information while generating a Service Ticket for this account. Services and Computers can automatically update this attribute on their respective accounts in Microsoft Active Directory, and therefore need write access Permission to this attribute.
Additionally the UserAccountControl attribute, you SHOULD also remove the Windows registry USE_DES_KEY_ONLY (0x200000) bit to disable forcing the use of DES key.
Decoding MsDS-SupportedEncryptionTypes Bitmask:
In Windows 7/Windows Server 2008 R2, a new Group Policy Object setting is introduced for specifying the encryption types allowed for Kerberos. This is a system wide global setting that will affect all the accounts on the computer where the policy is applied. With this setting, we can enable and disable the encryption/decryption capability of each Crypto system (AES256, AES128, RC4, DES etc). In this way, even an individual encryption type is included in the supported encryption type list as we discussed in the last two sections, it will not be selected.
The main purpose is to disable DES encryption, which is widely considered not secure enough, in any Windows 7/Windows server 2008R2 computers by default. You may notice that the policy setting “Network Security: Configure Encryption types allowed for Kerberos” is “Not Defined” in a new system. When this policy setting is not defined, all Crypto systems except DES will be available for encryption. Users can define this policy setting to enable/disable each individual Crypto system, including DES.