Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Bidding Farewell to NTLM in favour of Kerberos
  • Screenshot
    Setup iSCSI Target and Storage LUN on Synology DS923+ for VBR Reviews
  • win 10 login screen
    How to Transfer User Profile to another User in Windows Windows
  • Screenshot 2022 04 02 at 22.17.10
    How to Install Kubectl on Windows 11 Windows
  • powershell commands lede 1024x276 1
    PowerShell Remoting: Guide to Windows Management Instrumentation Scripts
  • How to enable or disable Microsoft Defender Antivirus Active or Mode Mode
    Set Microsoft Defender Antivirus to Passive or Active Mode Anti-Virus Solution
  • screenshot 2020 03 31 at 22.22.43
    How to create, edit and delete a scheduled task via the Command Prompt Windows Server
  • screenshot 2020 04 07 at 02.14.53
    SSH and Telnet on Cisco ASA 5505: Quick Setup Guide Network | Monitoring
  • MBAM Client
    How to Check if MBAM Agent is installed on Windows PC Windows

Bidding Farewell to NTLM in favour of Kerberos

Posted on 15/10/202316/12/2024 Christian By Christian No Comments on Bidding Farewell to NTLM in favour of Kerberos
The evolution of Windows authentication - NTLM to Keberos

The NT LAN Manager (NTLM) is an authentication protocol encompassed in the Windows Msv1_0.dll. In this article, we shall discuss “Bidding Farewell to NTLM in favour of Kerberos”. The NTLM authentication protocols include LAN Manager versions 1 and 2, and NTLM versions 1 and 2. The NTLM authentication protocols authenticate users and computers based on a challenge/response mechanism that proves to a server or domain controller that a user knows the password associated with an account. Please see How to disable automatic Windows updates, and how to Clear Saved Email Address: How to stop Microsoft Edge from remembering your email ID.

At the time of writing this piece, NTLM authentication is still supported and must be used for Windows authentication with systems configured as a member of a workgroup. NTLM authentication can also be utilized for local logon authentication on non-domain controllers. Kerberos version 5 authentication is the preferred authentication method for Active Directory environments, but a non-Microsoft or Microsoft application might still use NTLM.

When NTLM protocol is utilized, a resource server must take one of the following actions to verify the identity of a PC or user whenever a new access token is required:

  • Contact a domain authentication service on the domain controller for the computer’s or user’s account domain, if the account is a domain account.
  • Look up the computer’s or user’s account in the local account database, if the account is a local account.

But Microsoft is shaking up the authentication game in its latest Windows 11 announcement. They’re saying goodbye to the old-timer “NTLM”, and embracing the Kerberos authentication protocol to its fullest.

It’s all in the name of amping up security and refining the user experience. Kindly take a look at the YouTube video from the Windows Authentication Platform team on Bidding Farewell to NTLM in favour of Kerberos.

NT LAN Manager (NTLM) – The End of an Era

NTLM, which debuted back in the ’90s. It offers a single sign-on magic with a sprinkle of challenge-response protocol. But as time went by, Kerberos took the centre stage since the entrance of Windows 2000.

Kerberos uses a two-step authentication process that leverages a ticket-granting service or key distribution centre. Want to read about “NTLM/Kerberos Authentication Extensions“?

With Kerberos, No more three-way handshakes between the client and server to authenticate a user as utilized in NTLM. Kerberos leverages encryption, while NTLM is still stuck in password-hashing.

Here is an excellent guide on how to Prevent NTLM credentials from being sent to remote servers. And Active Directory Authentication methods: How do Kerberos and NTLM work?

Security Makeover: Why the switch to Kerberos?

Outside NTLM’s security weaknesses. NTLM is vulnerable to relay attacks which enables intruders to eavesdrop on authentication attempts potentially allowing bad actors to gain unauthorized access to network resources. Kerberos promises a more secure, fortified authentication process.

Introducing IAKerb and KDC for Kerberos

As part of this grand transformation, Microsoft is introducing New features for Windows 11 including Initial and Pass Through Authentication Using Kerberos (IAKerb) and a local Key Distribution Center (KDC) for Kerberos thereby extending its superpowers of local accounts.

What’s Next for NTLM?

Now, you might be wondering, “What happens to NTLM?” Microsoft assures us that while they’re prepping for the grand farewell of NTLM in Windows 11, they’re also diligently addressing any hard-coded NTLM instances in its components in preparation for the shift to ultimately disable NTLM in Windows 11.

The aim is to enable users gently towards embracing Kerberos instead of holding on to NTLM.

Please see PetitPotam attack on Active Directory Certificate Services: How to mitigate NTLM Relay PetitPotam attack on AD CS, What to note when setting up Ansible to work with Kerberos, and Various Ansible Authentication Options.

Change Is Coming – Disable NTLM in Windows 11

Note: These changes are all set to be the new default, so no complex configurations are required for most situations. 

NTLM, though not as ostentatiously impressive as Kerberos, will still be hanging around as a fallback option as noted by Matthew Palko, Microsoft’s senior product management lead in Enterprise and Security, said. “NTLM will continue to be available as a fallback to maintain existing compatibility.

Reducing the use of NTLM will ultimately culminate in it being disabled in Windows 11. Microsoft is taking a data-driven approach and monitoring reductions in NTLM usage to determine when it will be safe to disable.

In the meantime, you can use the enhanced controls we are providing to get a head start. Once disabled by default, customers will also be able to use these controls to reenable NTLM for compatibility reasons

FAQ on NTLM and Kerberos?

What is NTLM (NT LAN Manager)?

NTLM is a proprietary authentication protocol used in Windows environments to verify the identity of users and computers attempting to access network resources.

Why is NTLM less secure than Kerberos?

NTLM has several security vulnerabilities, including susceptibility to pass-the-hash attacks and a lack of mutual authentication. Kerberos, on the other hand, offers stronger security through mutual authentication and the use of ticket

What is Kerberos authentication?

Kerberos is a network authentication protocol that uses secret-key cryptography to provide strong authentication for users and services.

How does Kerberos differ from NTLM?

Kerberos provides mutual authentication, meaning both the client and the server authenticate to each other. Additionally, Kerberos uses tickets for secure communication, while NTLM uses challenge-response mechanisms, making Kerberos generally more secure

The Core distinction between Kerberos and NTLM

The primary difference between NTLM and Kerberos is the need for connectivity to the domain controller. In Kerberos, the client must request a Kerberos ticket from the Key Distribution Center (KDC). Which is a process that resides on the domain controller. In NTLM, the server verifies the client’s NTLM credentials by contacting the domain controller.

This difference allows clients who do not have connectivity to the domain controller to authenticate with the server using NTLM authentication. This is the main reason for supporting NTLM in addition to the more secure and standard Kerberos authentication.

How would Kerberos resolve the above issue?

The “Initial and Pass Through Authentication Using Kerberos (IAKerb) and a local Key Distribution Center (KDC) for Kerberos” will be used to address these concerns.

IAKerb is a public extension to the industry standard Kerberos protocol that allows a client without line-of-sight to a Domain Controller to authenticate through a server that does have line-of-sight. This works through the Negotiate authentication extension and allows the Windows authentication stack to proxy Kerberos messages through the server on behalf of the client. IAKerb relies on the cryptographic security guarantees of Kerberos to protect the messages in transit through the server to prevent replay or relay attacks

The extensions to the Kerberos protocol and the GSS-API Kerberos mechanism enable a GSS-API Kerberos client to exchange messages with the KDC. It does this by using the GSS-API acceptor as a proxy, encapsulating the Kerberos messages inside GSS-API tokens.

With these extensions, a client can obtain Kerberos tickets for services where the KDC is not accessible to the client. But is accessible to the application server.

I hope you found this blog post helpful on Bidding Farewell to NTLM in favour of Kerberos. Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows, Windows Server Tags:Windows 10, Windows 11, Windows Server 2016

Post navigation

Previous Post: How to disable automatic Windows updates via Windows Settings
Next Post: What’s New? Install Windows Server 2025 on Beelink EQ12 PC

Related Posts

  • Windows11
    Windows 11 System Requirements Windows
  • fghj
    MDT deployment failed and Stuck at Command Prompt: Windows installation does not proceed via PXE boot Windows Server
  • ghfg 1
    Handy WSUS Commands: Windows Server Update Services Commands, WAUACLT, PowerShell and USOClient Windows Server
  • SysInternals Tools set
    Download and use Windows Sysinternals Tools locally Windows
  • Secure Web Server
    How to secure a Web Server on a Windows VM in Azure using TLS/SSL Certificates Saved in Azure Key Vault AWS/Azure/OpenShift
  • RSAT 678x381 1
    DNS manager console missing from RSAT tools on Windows 10 Windows

More Related Articles

Windows11 Windows 11 System Requirements Windows
fghj MDT deployment failed and Stuck at Command Prompt: Windows installation does not proceed via PXE boot Windows Server
ghfg 1 Handy WSUS Commands: Windows Server Update Services Commands, WAUACLT, PowerShell and USOClient Windows Server
SysInternals Tools set Download and use Windows Sysinternals Tools locally Windows
Secure Web Server How to secure a Web Server on a Windows VM in Azure using TLS/SSL Certificates Saved in Azure Key Vault AWS/Azure/OpenShift
RSAT 678x381 1 DNS manager console missing from RSAT tools on Windows 10 Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Screenshot
    Setup iSCSI Target and Storage LUN on Synology DS923+ for VBR Reviews
  • win 10 login screen
    How to Transfer User Profile to another User in Windows Windows
  • Screenshot 2022 04 02 at 22.17.10
    How to Install Kubectl on Windows 11 Windows
  • powershell commands lede 1024x276 1
    PowerShell Remoting: Guide to Windows Management Instrumentation Scripts
  • How to enable or disable Microsoft Defender Antivirus Active or Mode Mode
    Set Microsoft Defender Antivirus to Passive or Active Mode Anti-Virus Solution
  • screenshot 2020 03 31 at 22.22.43
    How to create, edit and delete a scheduled task via the Command Prompt Windows Server
  • screenshot 2020 04 07 at 02.14.53
    SSH and Telnet on Cisco ASA 5505: Quick Setup Guide Network | Monitoring
  • MBAM Client
    How to Check if MBAM Agent is installed on Windows PC Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,832 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.