Skip to content

Commit 315130a

Browse files
committed
Reorg/new summary/metadata update
1 parent 0707284 commit 315130a

1 file changed

Lines changed: 19 additions & 9 deletions

File tree

support/windows-server/windows-security/audit-domain-controller-ntlmv1.md

Lines changed: 19 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Audit use of NTLMv1 on a domain controller
3-
description: Steps to audit the usage of NTLMv1 on a Windows Server-based domain controller.
4-
ms.date: 01/15/2025
3+
description: Discusses how to use event logs to audit the usage of NTLMv1 on a Windows Server-based domain controller.
4+
ms.date: 02/3/2026
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
8-
ms.reviewer: kaushika
8+
ms.reviewer: kaushika, herbertm, v-appelgatet
99
ms.custom:
1010
- sap:windows security technologies\legacy authentication (ntlm)
1111
- pcy:WinComm Directory Services
@@ -18,13 +18,11 @@ _Original KB number:_   4090105
1818

1919
## Summary
2020

21-
This article introduces the steps to test any application that's using NT LAN Manager (NTLM) version 1 on a Microsoft Windows Server-based domain controller (DC).
21+
This article describes how to audit NTLMv1 authentication on Windows Server domain controllers. Use this information to identify applications and services that still use NTLMv1 before you disable it in your environment.
2222

23-
[!INCLUDE [Registry important alert](../../../includes/registry-important-alert.md)]
24-
25-
Consider using this test before setting computers to only use NTLMv2. To configure the computer to only use NTLMv2, set `LMCompatibilityLevel` to **5** under the `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa` subkey on the DC.
23+
NTLMv1 is a legacy authentication protocol that Microsoft deprecated in June 2024. For more information, see [Deprecated Features](/windows/whats-new/deprecated-features#deprecated-features).
2624

27-
Microsoft deprecated NTLM as a whole as of June 2024. For more information, see [Deprecated Features](/windows/whats-new/deprecated-features#deprecated-features). You can use the options discussed in [Removing NTLMv1, new audit event for use of NTLM](https://support.microsoft.com/topic/upcoming-changes-to-ntlmv1-in-windows-11-version-24h2-and-windows-server-2025-c0554217-cdbc-420f-b47c-e02b2db49b2e) to audit the use of any version of NTLM.
25+
To maintain security, identify any remaining NTLMv1 usage and migrate applications to use modern authentication protocols. To audit the use of any version of NTLM, use the methods that are described in this article and in [Removing NTLMv1, new audit event for use of NTLM](https://support.microsoft.com/topic/upcoming-changes-to-ntlmv1-in-windows-11-version-24h2-and-windows-server-2025-c0554217-cdbc-420f-b47c-e02b2db49b2e)
2826

2927
## NTLM auditing
3028

@@ -71,9 +69,21 @@ Package Name (NTLM only): NTLM V1
7169
Key Length: 128
7270
```
7371

72+
## Using NTLMv2 exclusively
73+
74+
[!INCLUDE [Registry important alert](../../../includes/registry-important-alert.md)]
75+
76+
To configure a DC to only use NTLMv2 for authentication, configure the following registry value on the DC:
77+
78+
- Subkey: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa`
79+
- Entry: `LMCompatibilityLevel`
80+
- Value: **5**
81+
82+
For more information, see [How to enable NTLM 2 authentication](enable-ntlm-2-authentication.md).
83+
7484
## More information
7585

76-
The sign-in (logon) operation that the event records doesn't use NTLMv1 session security. There's actually no session security, because no key material exists.
86+
The sign-in (logon) operation that Event ID 4624 records doesn't use NTLMv1 session security. There's actually no session security, because no key material exists.
7787

7888
The logic of the NTLM Auditing is that it logs NTLMv2-level authentication when it finds NTLMv2 key material on the sign-in session. It logs NTLMv1 in all other cases, which include anonymous sessions. Therefore, our general recommendation is to ignore the event for security protocol usage information when the event is logged for **ANONYMOUS LOGON**.
7989

0 commit comments

Comments
 (0)