Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Windows » Bidding Farewell to NTLM in favour of Kerberos

Bidding Farewell to NTLM in favour of Kerberos

Posted on 15/10/202316/12/2024 Christian By Christian No Comments on Bidding Farewell to NTLM in favour of Kerberos
The evolution of Windows authentication - NTLM to Keberos

The NT LAN Manager (NTLM) is an authentication protocol encompassed in the Windows Msv1_0.dll. In this article, we shall discuss “Bidding Farewell to NTLM in favour of Kerberos”. The NTLM authentication protocols include LAN Manager versions 1 and 2, and NTLM versions 1 and 2. The NTLM authentication protocols authenticate users and computers based on a challenge/response mechanism that proves to a server or domain controller that a user knows the password associated with an account. Please see How to disable automatic Windows updates, and how to Clear Saved Email Address: How to stop Microsoft Edge from remembering your email ID.

At the time of writing this piece, NTLM authentication is still supported and must be used for Windows authentication with systems configured as a member of a workgroup. NTLM authentication can also be utilized for local logon authentication on non-domain controllers. Kerberos version 5 authentication is the preferred authentication method for Active Directory environments, but a non-Microsoft or Microsoft application might still use NTLM.

When NTLM protocol is utilized, a resource server must take one of the following actions to verify the identity of a PC or user whenever a new access token is required:

  • Contact a domain authentication service on the domain controller for the computer’s or user’s account domain, if the account is a domain account.
  • Look up the computer’s or user’s account in the local account database, if the account is a local account.

But Microsoft is shaking up the authentication game in its latest Windows 11 announcement. They’re saying goodbye to the old-timer “NTLM”, and embracing the Kerberos authentication protocol to its fullest.

It’s all in the name of amping up security and refining the user experience. Kindly take a look at the YouTube video from the Windows Authentication Platform team on Bidding Farewell to NTLM in favour of Kerberos.

NT LAN Manager (NTLM) – The End of an Era

NTLM, which debuted back in the ’90s. It offers a single sign-on magic with a sprinkle of challenge-response protocol. But as time went by, Kerberos took the centre stage since the entrance of Windows 2000.

Kerberos uses a two-step authentication process that leverages a ticket-granting service or key distribution centre. Want to read about “NTLM/Kerberos Authentication Extensions“?

With Kerberos, No more three-way handshakes between the client and server to authenticate a user as utilized in NTLM. Kerberos leverages encryption, while NTLM is still stuck in password-hashing.

Here is an excellent guide on how to Prevent NTLM credentials from being sent to remote servers. And Active Directory Authentication methods: How do Kerberos and NTLM work?

Security Makeover: Why the switch to Kerberos?

Outside NTLM’s security weaknesses. NTLM is vulnerable to relay attacks which enables intruders to eavesdrop on authentication attempts potentially allowing bad actors to gain unauthorized access to network resources. Kerberos promises a more secure, fortified authentication process.

Introducing IAKerb and KDC for Kerberos

As part of this grand transformation, Microsoft is introducing New features for Windows 11 including Initial and Pass Through Authentication Using Kerberos (IAKerb) and a local Key Distribution Center (KDC) for Kerberos thereby extending its superpowers of local accounts.

What’s Next for NTLM?

Now, you might be wondering, “What happens to NTLM?” Microsoft assures us that while they’re prepping for the grand farewell of NTLM in Windows 11, they’re also diligently addressing any hard-coded NTLM instances in its components in preparation for the shift to ultimately disable NTLM in Windows 11.

The aim is to enable users gently towards embracing Kerberos instead of holding on to NTLM.

Please see PetitPotam attack on Active Directory Certificate Services: How to mitigate NTLM Relay PetitPotam attack on AD CS, What to note when setting up Ansible to work with Kerberos, and Various Ansible Authentication Options.

Change Is Coming – Disable NTLM in Windows 11

Note: These changes are all set to be the new default, so no complex configurations are required for most situations. 

NTLM, though not as ostentatiously impressive as Kerberos, will still be hanging around as a fallback option as noted by Matthew Palko, Microsoft’s senior product management lead in Enterprise and Security, said. “NTLM will continue to be available as a fallback to maintain existing compatibility.

Reducing the use of NTLM will ultimately culminate in it being disabled in Windows 11. Microsoft is taking a data-driven approach and monitoring reductions in NTLM usage to determine when it will be safe to disable.

In the meantime, you can use the enhanced controls we are providing to get a head start. Once disabled by default, customers will also be able to use these controls to reenable NTLM for compatibility reasons

FAQ on NTLM and Kerberos?

What is NTLM (NT LAN Manager)?

NTLM is a proprietary authentication protocol used in Windows environments to verify the identity of users and computers attempting to access network resources.

Why is NTLM less secure than Kerberos?

NTLM has several security vulnerabilities, including susceptibility to pass-the-hash attacks and a lack of mutual authentication. Kerberos, on the other hand, offers stronger security through mutual authentication and the use of ticket

What is Kerberos authentication?

Kerberos is a network authentication protocol that uses secret-key cryptography to provide strong authentication for users and services.

How does Kerberos differ from NTLM?

Kerberos provides mutual authentication, meaning both the client and the server authenticate to each other. Additionally, Kerberos uses tickets for secure communication, while NTLM uses challenge-response mechanisms, making Kerberos generally more secure

The Core distinction between Kerberos and NTLM

The primary difference between NTLM and Kerberos is the need for connectivity to the domain controller. In Kerberos, the client must request a Kerberos ticket from the Key Distribution Center (KDC). Which is a process that resides on the domain controller. In NTLM, the server verifies the client’s NTLM credentials by contacting the domain controller.

This difference allows clients who do not have connectivity to the domain controller to authenticate with the server using NTLM authentication. This is the main reason for supporting NTLM in addition to the more secure and standard Kerberos authentication.

How would Kerberos resolve the above issue?

The “Initial and Pass Through Authentication Using Kerberos (IAKerb) and a local Key Distribution Center (KDC) for Kerberos” will be used to address these concerns.

IAKerb is a public extension to the industry standard Kerberos protocol that allows a client without line-of-sight to a Domain Controller to authenticate through a server that does have line-of-sight. This works through the Negotiate authentication extension and allows the Windows authentication stack to proxy Kerberos messages through the server on behalf of the client. IAKerb relies on the cryptographic security guarantees of Kerberos to protect the messages in transit through the server to prevent replay or relay attacks

The extensions to the Kerberos protocol and the GSS-API Kerberos mechanism enable a GSS-API Kerberos client to exchange messages with the KDC. It does this by using the GSS-API acceptor as a proxy, encapsulating the Kerberos messages inside GSS-API tokens.

With these extensions, a client can obtain Kerberos tickets for services where the KDC is not accessible to the client. But is accessible to the application server.

I hope you found this blog post helpful on Bidding Farewell to NTLM in favour of Kerberos. Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows, Windows Server Tags:Windows 10, Windows 11, Windows Server 2016

Post navigation

Previous Post: How to disable automatic Windows updates via Windows Settings
Next Post: What’s New? Install Windows Server 2025 on Beelink EQ12 PC

Related Posts

  • Featured image new 1
    Detect if an application was uninstalled on Windows: Find out who has uninstalled an application via Windows Event Viewer Windows
  • ghfg 1
    Handy WSUS Commands: Windows Server Update Services Commands, WAUACLT, PowerShell and USOClient Windows Server
  • a3a5a8be58fa09468cd4f70d36869e98
    Restore AD Objects: How to restore deleted user accounts in Active Directory with Microsoft LDP and PowerShell Windows Server
  • Featured image 2
    Enable Microsoft Defender SmartScreen: How to prevent Exe files from getting deleted randomly in Windows 10 and 11 Security | Vulnerability Scans and Assessment
  • fast user switching in windows 10 2
    To enable or disable fast User Switching in Windows 10 Windows
  • Was ist Windows Server und wie unterscheidet er sich vom normalen Windows
    Create a certificate template for BitLocker Network Unlock Windows Server

More Related Articles

Featured image new 1 Detect if an application was uninstalled on Windows: Find out who has uninstalled an application via Windows Event Viewer Windows
ghfg 1 Handy WSUS Commands: Windows Server Update Services Commands, WAUACLT, PowerShell and USOClient Windows Server
a3a5a8be58fa09468cd4f70d36869e98 Restore AD Objects: How to restore deleted user accounts in Active Directory with Microsoft LDP and PowerShell Windows Server
Featured image 2 Enable Microsoft Defender SmartScreen: How to prevent Exe files from getting deleted randomly in Windows 10 and 11 Security | Vulnerability Scans and Assessment
fast user switching in windows 10 2 To enable or disable fast User Switching in Windows 10 Windows
Was ist Windows Server und wie unterscheidet er sich vom normalen Windows Create a certificate template for BitLocker Network Unlock Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • System Center
    Integrate Hyper-V: Install System Center Virtual Machine Manager Virtualization
  • convert HEIC image format to JPEG format
    Convert HEIC images to JPEG format on Mac with Quick Actions Mac
  • Repository time shift detected
    Fix Repository time shift detected: Immutability flag cannot be set Backup
  • Object First Appliance unboxing
    Object First OOTBI Appliance Unboxing and Quick Setup Backup
  • Retieve BitLocker Recovery Keys from microsoft sql
    Get MBAM BitLocker Recovery Keys from Microsoft SQL Server Windows
  • GitLabrunner 1 1
    There has been a runner system failure: failed to start the process exec “pwsh” Containers
  • screenshot 2020 03 19 at 19.17.42
    SG300 Firmware Upgrade Copy: Illegal software format Network | Monitoring
  • screenshot 2020 03 13 at 20.24.17
    How to view installed packages in Cygwin on Windows Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,813 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.