Microsoft announced it will disable NTLM authentication by default in future Windows releases, ending a 33-year run for the protocol that first appeared in Windows NT 3.1 in 1993. The transition follows Microsoft formally deprecating NTLM in June 2024.

Announcement overview

AttributeDetails
ProtocolNT LAN Manager (NTLM)
First introducedWindows NT 3.1 (1993)
Formal deprecationJune 2024
Replacement protocolKerberos
StatusReceives no updates since deprecation
Default disable targetFuture major Windows release (unspecified)

Why NTLM is being retired

NTLM has fundamental security weaknesses that cannot be fixed without breaking compatibility:

VulnerabilityImpactSeverity
Relay attacksAttackers forward NTLM authentication to other systemsCritical
Replay attacksCaptured credentials can be reusedHigh
Man-in-the-middleWeak cryptography enables interceptionHigh
Pass-the-hashHash alone sufficient for authenticationCritical
No mutual authenticationServer identity not verifiedMedium
Weak encryptionDES-based cryptographyHigh

“Today, NTLM is susceptible to various attacks, including replay and man-in-the-middle attacks, due to its use of weak cryptography.”

Despite being superseded by Kerberos for most scenarios, NTLM remains widely used as a fallback and in legacy environments. Attackers frequently abuse NTLM for lateral movement and credential theft—techniques like NTLM relay remain staples of penetration testing and real-world attacks.

Common NTLM attack techniques

AttackDescriptionMitigation difficulty
NTLM relayForward authentication to another serverHigh without SMB signing
Pass-the-hashUse captured hash directlyRequires Kerberos migration
ResponderCapture NTLM hashes on networkRequires network controls
LLMNR/NBT-NS poisoningTrick systems into NTLM authDisable legacy protocols

Three-phase transition

Phase 1: Enhanced Auditing (Available Now)

Available in: Windows Server 2025, Windows 11 24H2

Enhanced NTLM auditing tools help organizations identify where NTLM is still in use:

Audit capabilityPurpose
Application identificationWhich apps trigger NTLM authentication
System dependency mappingWhich systems rely on NTLM fallback
Service inventoryWhich services haven’t migrated to Kerberos
User identificationWhich accounts use NTLM

This audit data is the foundation for any NTLM migration effort. Organizations should deploy these tools immediately to understand their NTLM dependencies.

Phase 2: Addressing Migration Roadblocks (H2 2026)

Target: Second half of 2026

New features will address common scenarios that trigger NTLM fallback:

FeaturePurposeImpact
IAKerbExtends Kerberos to scenarios previously requiring NTLMEnables Kerberos without direct DC connectivity
Local KDCEnables Kerberos for local accounts and workgroupsRemoves major NTLM dependency
Component upgradesCore Windows components negotiate Kerberos firstReduces automatic NTLM fallback

IAKerb enables Kerberos authentication when direct network connectivity to a domain controller is unavailable—a common scenario that previously forced NTLM fallback.

Local KDC allows local account authentication without forcing NTLM fallback on modern systems, addressing workgroup and non-domain-joined scenarios.

These improvements reduce legitimate NTLM dependencies, making the transition to “disabled by default” less disruptive.

Phase 3: NTLM Disabled by Default (Future Major Releases)

Target: Unspecified future Windows Server release and associated Windows client releases

Network NTLM will be disabled by default. Key clarification from Microsoft:

“Disabling NTLM by default does not mean completely removing NTLM from Windows yet. Instead, it means that Windows will be delivered in a secure-by-default state where network NTLM authentication is blocked and no longer used automatically.”

What changesWhat remains
NTLM blocked by defaultNTLM code remains in Windows
No automatic NTLM fallbackCan be re-enabled via policy
Secure-by-default stateLegacy compatibility maintained

NTLM will remain in the operating system and can be re-enabled through Group Policy or registry settings for environments that require it. IT administrators running software that absolutely requires NTLM will have an escape hatch.

NTLMv1 timeline

NTLMv1 (the oldest, weakest version) has an accelerated deprecation schedule:

DateAction
Already doneNTLMv1 removed from Windows 11 24H2 and Server 2025
September 2025NTLMv1 attempts trigger audit events
October 2026NTLMv1 blocking enforced by default

Organizations still using NTLMv1 face a hard deadline in October 2026.

NTLMv1 vs NTLMv2 comparison

AspectNTLMv1NTLMv2
EncryptionDES (56-bit)HMAC-MD5
SecurityCritically weakWeak but better
StatusHard deadline Oct 2026Soft deprecation ongoing
CrackabilityMinutes to crackHours to days

What administrators should do now

1. Deploy enhanced auditing

Use the tools in Windows Server 2025 and Windows 11 24H2 to identify NTLM usage:

Group Policy path:

Computer Configuration → Windows Settings → Security Settings →
Local Policies → Security Options → Network security: Restrict NTLM

Key audit settings:

SettingPurpose
Audit Incoming NTLM TrafficLog NTLM authentications to this system
Audit NTLM authentication in this domainDomain-wide NTLM tracking
Restrict NTLM: Audit NTLM in this domainDetailed domain audit

2. Map dependencies

Document which applications, services, and systems rely on NTLM:

CategoryExamples
Line-of-business applicationsLegacy ERP, custom apps
Third-party softwareOlder vendor products
Legacy systemsWindows Server 2012 and earlier
Cross-forest trustsComplex AD environments
Non-Windows clientsLinux, macOS, network devices
IP-based accessApps using IP instead of hostname

3. Plan migrations

Work with application vendors to update critical applications. Many NTLM dependencies exist because applications were never updated to support Kerberos, not because Kerberos can’t meet the requirement.

Migration pathScenario
Application updateVendor provides Kerberos support
Custom developmentInternal apps modernized
ReplacementLegacy system retired
ExceptionDocumented business justification for continued NTLM

4. Test Kerberos-only scenarios

Use Group Policy to restrict NTLM in test environments and validate that critical workloads succeed with Kerberos authentication.

Test phaseActions
Lab testingRestrict NTLM in isolated environment
Pilot groupSmall production subset with monitoring
Staged rolloutGradual expansion with rollback capability
Full deploymentOrganization-wide NTLM restrictions

Impact assessment

Low impact (already using Kerberos)

ScenarioStatus
Domain-joined Windows clientsTypically Kerberos already
Modern applicationsUsually Kerberos-capable
Azure AD/Entra ID environmentsCloud identity, no NTLM
Web applicationsHTTP-based auth, no NTLM

Higher impact (may require remediation)

ScenarioChallenge
Legacy applicationsMay require updates or replacement
Non-domain-joined machinesIAKerb/Local KDC addresses in Phase 2
Cross-platform environmentsLinux/macOS NTLM clients
Workgroup configurationsLocal KDC addresses in Phase 2
IP address authenticationKerberos requires hostnames
Network attached storageMany NAS devices use NTLM

Recommendations

For IT administrators

PriorityAction
CriticalDeploy Phase 1 auditing tools immediately
CriticalInventory NTLMv1 usage before October 2026 deadline
HighMap NTLM dependencies across applications
HighEngage vendors for Kerberos support timelines
MediumPlan test environment for Kerberos-only validation
OngoingMonitor Microsoft announcements for Phase 3 timeline

For security teams

PriorityAction
HighUse NTLM restrictions to reduce attack surface now
HighImplement SMB signing to mitigate relay attacks
MediumDeploy detection for NTLM-based attack techniques
OngoingTrack NTLM usage trends across environment

For application owners

PriorityAction
HighTest applications with NTLM restricted
HighWork with vendors on Kerberos roadmaps
MediumDocument business justification for NTLM exceptions
OngoingPlan application modernization or replacement

Context

NTLM’s deprecation has been anticipated for years. Microsoft has published Kerberos alternatives for most scenarios, and security best practices have long recommended disabling NTLM where possible.

The three-phase approach gives organizations time to identify dependencies and migrate, but the direction is clear: NTLM’s days as a default authentication protocol are numbered.

PhaseTimelineAction required
Phase 1NowDeploy auditing
Phase 2H2 2026Test new Kerberos features
Phase 3TBDPrepare for default disable

Organizations should treat the Phase 1 auditing tools as urgent deployment priorities, not optional enhancements. The NTLMv1 October 2026 deadline provides a forcing function for the most critical migrations.