Skip to content

TechDirectArchive

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers
  • Fixed Sysprep Generalize 1
    How to Fix The Virtual Desktop is Not Sysprep Generalized Virtualization
  • Exchange logo
    Allow Password change for specific users in Exchange Server Network | Monitoring
  • slackrmspace
    Leave a Slack Workspace temporarily: How to deactivate a Slack workspace JIRA|Confluence|Apps
  • Windows 11 Taskmanager
    Create Task Manager Shortcuts: How to add access, pin the Task Manager on Windows 11 Windows
  • Clone SysPrep
    Clone and Sysprep a Windows Server running on a VMware Workstation Virtualization
  • image 25
    ESXI 6.7 ALARM: Seat disk exhaustion on 10 Virtualization
  • Ubuntu on Windows
    Install Ubuntu 20.04 LTS on Windows via WSL Linux
  • How to stop remove and manage docker container
    Stopping, Removing and Naming Docker Container Containers

NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers

Posted on 01/04/202015/10/2023 Christian By Christian No Comments on NT LAN Manager: How to prevent NTLM credentials from being sent to remote servers
NT LAN Manager

Due to the recent vulnerability discovered in Zoom as reviewed by security experts on the 1st of April 2020. It allows attackers to steal Windows credentials via UNC Links. In 2019, the security provider “Preempt” discovered a vulnerability in NTLM which allows remote execution of malicious code on any Windows machine to authenticate to any web server that supports Windows Integrated Authentication. This article discussed the steps on how to prevent NTLM credentials from being sent to remote servers. Please see Bidding Farewell to NTLM in favour of Kerberos, and How to disable automatic Windows updates.

Also in 2018 according to the Checkpoint research team, “NTLM hash leaks can also be achieved via PDF files with no user interaction or exploitation”. By using this feature, attackers can inject malicious content into the PDF, and if the PDF file is opened then the target automatically starts leaking data in the form of NTLM hashes.

To mitigate this issue, a GPO can be configured to prevent NTML credentials from automatically being sent to a remote server when clicking on a UNC link. Alternatively, you can restrict NTLM Authentication in your Domain.

What is Microsoft’s NTLM (NT LAN Manager)?

This is an older and outdated security protocol that authenticates user credentials in a Windows domain. Microsoft has since replaced NTLM with Kerberos as the default authentication method for Active Directory, the company still supports the older protocol, while recommending that customers adopt Kerberos instead.

Note: In most organizations, NTLM is no longer being used as security holes plague it.

Various patches are being developed by Microsoft to prevent NTLM relay attacks, but they can also be bypassed.

To prevent Windows from automatically sending your credentials to a remote server (when accessing a share), here are the steps below if you must use NTLM.

Launch the Local Group Policy or Group Policy Management (Domain)

prevent NTLM credentials

Navigate to the Computer Configuration, and then click on Windows Settings 
– Security Settings 
– Local Policies 
– Security Options 
– Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers

Double Click on the Policy, and select “Deny all“.

This means this device cannot authenticate any identities to a remote server by using NTLM authentication. You can use the Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication policy setting to define a list of remote servers to which client devices are allowed to use NTLM authentication while denying others. This setting will also log an event on the device that is making the authentication request.

Update the Group Policy

When the above steps are done. Update the group policy object for it to take effect immediately in order to avoid the default time of 90 minutes. See this link for more information, see the following article “all about GPO switches gpupdate and gpupdate-force“.

To prevent NTLM credentials from being sent to remote servers in your domain environment. Use the same steps as discussed in the Group Policy Management.

I hope you found this blog post helpful. Please let me know in the comment session if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:GPO, GPOs, Group Policy Management Console, Group Policy Objects, Grouppolicy, Kerberos, Microsoft Windows, Windows 10

Post navigation

Previous Post: How to create, edit and delete a scheduled task via the Command Prompt
Next Post: Error: The processing of Group Policy failed because of lack of network connectivity to a DC. This may be a transient condition. A success message would be generated once the machine gets connected

Related Posts

  • drivelock header 002
    The push installation of the agent failed for the computer – Error message (67) The network cannot be found Security | Vulnerability Scans and Assessment
  • WPScan Banner
    How to scan WordPress Websites With WPScan For Security Vulnerabilities Security | Vulnerability Scans and Assessment
  • Synology 1
    Synology NAS brute-force attack: Employ Synology Best Practice to remediate StealthWorker Botnet attack Security | Vulnerability Scans and Assessment
  • VBR Console on a Jump Server
    How to install Veeam Backup Console on a Jump Server Backup
  • SSL on WAMPServer
    Setup VirtualHost with SSL on WAMP Server Linux
  • How to Disable TLS 1.0, TLS 1.1 and TLS 1   banner
    How to Disable TLS 1.0, TLS 1.1 and TLS 1.2 in Windows Using GPO Security | Vulnerability Scans and Assessment

More Related Articles

drivelock header 002 The push installation of the agent failed for the computer – Error message (67) The network cannot be found Security | Vulnerability Scans and Assessment
WPScan Banner How to scan WordPress Websites With WPScan For Security Vulnerabilities Security | Vulnerability Scans and Assessment
Synology 1 Synology NAS brute-force attack: Employ Synology Best Practice to remediate StealthWorker Botnet attack Security | Vulnerability Scans and Assessment
VBR Console on a Jump Server How to install Veeam Backup Console on a Jump Server Backup
SSL on WAMPServer Setup VirtualHost with SSL on WAMP Server Linux
How to Disable TLS 1.0, TLS 1.1 and TLS 1   banner How to Disable TLS 1.0, TLS 1.1 and TLS 1.2 in Windows Using GPO Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Microsoft MVP

  • Fixed Sysprep Generalize 1
    How to Fix The Virtual Desktop is Not Sysprep Generalized Virtualization
  • Exchange logo
    Allow Password change for specific users in Exchange Server Network | Monitoring
  • slackrmspace
    Leave a Slack Workspace temporarily: How to deactivate a Slack workspace JIRA|Confluence|Apps
  • Windows 11 Taskmanager
    Create Task Manager Shortcuts: How to add access, pin the Task Manager on Windows 11 Windows
  • Clone SysPrep
    Clone and Sysprep a Windows Server running on a VMware Workstation Virtualization
  • image 25
    ESXI 6.7 ALARM: Seat disk exhaustion on 10 Virtualization
  • Ubuntu on Windows
    Install Ubuntu 20.04 LTS on Windows via WSL Linux
  • How to stop remove and manage docker container
    Stopping, Removing and Naming Docker Container Containers

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,843 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.