
"The tech giant's goal is to completely remove NTLM, and it is taking a three-phase approach to disable it by default on Windows Server and Windows clients. Now, organizations can use the enhanced NTLM auditing features of Windows Server 2025 and Windows 11, versions 24H2 and later, to understand where and why the protocol is still used in their environments."
"The next phase will involve overcoming hurdles faced when eliminating NTLM, related to domain controllers, local account authentication, and the hardcoded NTLM usage. The solutions will be released in the second half of the year, for Windows Server 2025 or Windows 11, version 24H2 and later. Administrators will have IAKerb and local Key Distribution Center (pre-release) for Kerberos authentication without NTLM fallback and Microsoft will update core Windows features to negotiate Kerberos first, thus reducing NTLM's usage."
NTLM is a legacy Windows authentication protocol present for over three decades and is vulnerable to relay, replay, and man-in-the-middle attacks. NTLM no longer receives updates or enhancements and lacks strong authentication, uses weak cryptography, and provides limited diagnostic data. Kerberos-based authentication is the preferred, stronger alternative. The vendor plans a three-phase removal that will disable NTLM by default in upcoming Windows Server and Windows client releases. Enhanced NTLM auditing is available in Windows Server 2025 and Windows 11 versions 24H2 and later to locate remaining NTLM usage. Tools such as IAKerb and a local KDC pre-release will assist Kerberos-only migration.
Read at SecurityWeek
Unable to calculate read time
Collection
[
|
...
]