Why Disable NTLM Authentication in Active Directory?
NTLM (NT LAN Manager) authentication protocol has been a cornerstone of Windows authentication for decades, but it's now considered a significant security liability. Microsoft announced in July 2024 their plan to deprecate NTLM, with Windows 11 24H2 and Windows Server 2025 already removing NTLMv1 support entirely. The company is implementing a three-phase approach: Phase 1 (enhanced auditing) is active in current releases, Phase 2 (addressing blockers) begins in the second half of 2026, and Phase 3 (NTLM disabled by default) will arrive in a future major release.
What Security Risks Does NTLM Present?
NTLM authentication suffers from several critical vulnerabilities that make it unsuitable for modern security requirements. The protocol is susceptible to pass-the-hash attacks, where attackers can use captured password hashes to authenticate without knowing the actual password. NTLM also lacks mutual authentication, meaning clients cannot verify the authenticity of servers, opening the door to man-in-the-middle attacks. Additionally, NTLM uses weaker encryption compared to Kerberos and doesn't support modern security features like smart card authentication or advanced encryption standards.
How Does Kerberos Improve Security Over NTLM?
Kerberos provides significant security advantages over NTLM through its ticket-based authentication system. It offers mutual authentication, ensuring both client and server verify each other's identity. Kerberos uses stronger encryption algorithms, supports delegation scenarios more securely, and integrates better with modern authentication protocols. The protocol also provides better auditing capabilities and supports advanced features like smart card authentication and multi-factor authentication integration. By transitioning from NTLM to Kerberos, organizations can significantly reduce their attack surface and improve their overall security posture.
Related: How to Configure LDAPS Protocol in Active Directory 2026
Related: How to Deploy Network Locations Using Group Policy in
Related: How to Customize Windows Login and Lock Screen Using Group
Related: How to Configure Automatic Session Lock via Group Policy in



