Article Details

Scrape Timestamp (UTC): 2026-02-02 16:00:52.854

Source: https://thehackernews.com/2026/02/microsoft-begins-ntlm-phase-out-with.html

Original Article Text

Click to Toggle View

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos. Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options. The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that could facilitate relay attacks and allow bad actors to gain unauthorized access to network resources. NTLM was formally deprecated in June 2024 and no longer receives updates. "NTLM consists of security protocols originally designed to provide authentication, integrity, and confidentiality to users," Mariam Gewida, Technical Program Manager II at Microsoft, explained. "However, as security threats have evolved, so have our standards to meet modern security expectations. Today, NTLM is susceptible to various attacks, including replay and man-in-the-middle attacks, due to its use of weak cryptography." Despite the deprecated status, Microsoft said it continues to find the use of NTLM prevalent in enterprise environments where modern protocols like Kerberos cannot be implemented due to legacy dependencies, network limitations, or ingrained application logic. This, in turn, exposes organizations to security risks, such as replay, relay, and pass-the-hash attacks. To mitigate this problem in a secure manner, the company has adopted a three-phase strategy that paves the way for NTLM to be disabled by default - Microsoft has positioned the transition as a major step toward a passwordless, phishing-resistant future. This also requires organizations relying on NTLM to conduct audits, map dependencies, migrate to Kerberos, test NTLM-off configurations in non-production environments, and enable Kerberos upgrades. "Disabling NTLM by default does not mean completely removing NTLM from Windows yet," Gewida said. "Instead, it means that Windows will be delivered in a secure-by-default state where network NTLM authentication is blocked and no longer used automatically." "The OS will prefer modern, more secure Kerberos-based alternatives. At the same time, common legacy scenarios will be addressed through new upcoming capabilities such as Local KDC and IAKerb (pre-release)."

Daily Brief Summary

VULNERABILITIES // Microsoft Initiates Three-Phase Plan to Phase Out NTLM Authentication

Microsoft is phasing out NTLM, a legacy authentication protocol, to enhance security across Windows environments by transitioning to Kerberos-based options.

NTLM, deprecated in June 2024, remains prevalent due to legacy dependencies, exposing organizations to security risks like relay and pass-the-hash attacks.

The three-phase strategy aims to disable NTLM by default, positioning Windows for a future resistant to phishing and password vulnerabilities.

Organizations are advised to audit their systems, map dependencies, and test NTLM-off configurations to ensure a smooth transition to Kerberos.

Microsoft's approach includes new capabilities like Local KDC and IAKerb to address common legacy scenarios while moving towards a secure-by-default state.

The initiative reflects Microsoft's commitment to evolving security standards in response to modern threats, promoting stronger cryptographic practices.