Farewell to a Legacy: Microsoft to Disable NTLM Authentication, Bolstering Cybersecurity
Microsoft has announced a significant step forward in cybersecurity, declaring its intention to disable the widely used but vulnerable NTLM (New Technology LAN Manager) authentication protocol by default in upcoming Windows releases. This decision, slated to occur with the next major Windows Server release and associated client versions, represents a substantial shift towards more secure authentication methods, primarily leveraging Kerberos. NTLM, a protocol introduced in 1993 as a successor to LAN Manager (LM), has long been a target for cyberattacks, posing a considerable risk to organizations worldwide.
For decades, NTLM has served as a fundamental authentication mechanism within Windows networks. However, its underlying cryptographic weaknesses and inherent design flaws have made it susceptible to various exploitation techniques. While Kerberos has superseded NTLM as the default protocol for domain-connected devices running Windows 2000 and later, NTLM persists as a fallback option in many environments. This continued use, despite its vulnerabilities, has created a persistent attack surface for malicious actors.
The history of NTLM is marred by numerous high-profile security breaches exploiting its weaknesses. NTLM relay attacks, for instance, allow attackers to leverage compromised network devices to authenticate against attacker-controlled servers, effectively granting them complete control over a Windows domain. Furthermore, pass-the-hash attacks enable cybercriminals to steal NTLM hashes (hashed passwords) from targeted systems, which are then used to authenticate as the compromised user, facilitating data theft and lateral movement within the network. Vulnerabilities like PetitPotam, ShadowCoerce, DFSCoerce, and RemotePotato0 have further compounded these risks by allowing attackers to bypass existing NTLM relay attack mitigations.
Microsoft’s decision to disable NTLM by default is a proactive measure to address these long-standing security concerns. This move is part of a broader strategy to promote passwordless and phishing-resistant authentication methods, ultimately strengthening the overall security posture of Windows environments. The company has been advocating for the deprecation of NTLM for years, issuing warnings to developers and administrators to transition to more secure alternatives like Kerberos or Negotiation authentication. This deprecation effort began in October 2023, with Microsoft officially deprecating NTLM on Windows and Windows Servers in July 2024.
To ensure a smooth transition and minimize disruption, Microsoft has outlined a three-phase transition plan. The first phase, slated for the upcoming Windows 11 24H2 and Windows Server 2025 releases, will provide administrators with enhanced auditing tools to identify systems still relying on NTLM. The second phase, scheduled for the latter half of 2026, will introduce new features such as IAKerb and a Local Key Distribution Center (KDC) to address common scenarios where NTLM is used as a fallback. The final phase will disable network NTLM by default in future releases, although the protocol will remain available and can be explicitly re-enabled through policy controls if absolutely necessary.
It is crucial to understand that disabling NTLM by default does not signify its complete removal from Windows. Instead, it establishes a secure-by-default environment where network NTLM authentication is blocked and no longer automatically utilized. The operating system will prioritize modern, more secure Kerberos-based alternatives. Simultaneously, upcoming capabilities like the Local KDC and IAKerb will address legacy scenarios that currently trigger NTLM fallback.
This move by Microsoft underscores the evolving threat landscape and the importance of adopting more robust authentication mechanisms. By proactively disabling NTLM by default, Microsoft is empowering organizations to build more secure and resilient Windows environments, reducing their vulnerability to a wide range of cyberattacks. The transition to Kerberos-based authentication is a critical step in safeguarding sensitive data and maintaining the integrity of Windows networks in the face of increasingly sophisticated cyber threats. This change is a significant commitment to enhancing the security of the Windows ecosystem and protecting users and organizations from potential exploitation.
Source:

