Infotech

All communications between different devices happen using a specific protocol.

One such authentication protocol is NTLM.

NTLM is an old technology originally introduced with Windows NT 3.1.

What Is NTLM Authentication And How To Monitor Or Block It

This is verified using your credentials, of course.

Before NTLM, there was another authentication protocol known as LM.

That, of course, was even weaker than NTLM.

Download Windows 11 IoT Enterprise LTSC ISO

With NTLM, Microsoft released the NTLMv1 initially, but improved its security and released NTLMv2.

Both of these are insufficient to counter the threats of modern technology.

This is why it will be wise to monitor and block this technology from being used at all.

Startup folder in all versions of Windows

This is to counter any compatibility issues.

However, even this approach is not secure according to modern times.

This can be done on both Windows Servers as well as Windows client OS.

Download Windows 11 Version 24H2

In addition, it shows NTLM authentication requests to domain controllers.

Moreover, the policy also offers different options that are discussed in the following steps.

Now select one of the following options from the drop-down menu:

ClickApplyandOk.

Monitor NTLM using PowerShell

NTLM traffic logs can be checked using PowerShell as well.

However, you will still need to initiate the Group Policy as discussed above.

These events will have the event ID 4624.

These are all the methods to find out and monitor which apps are using the NTLM protocol.

Let us now see how to disable/block NTLM authentication on your domain.

However, this will block all authentication that uses the NTLM protocol.

The NTLM authentication protocol is one such example.

It is only there to ensure that the apps that are still using this technology continue to work.

Otherwise, it has no security significance in todays world.

0

Get weekly insights, tips and exclusive content delivered straight to your inbox.

Talk to us straight and get your questions answered right away

source: www.itechtics.com