Skip to content

Commit 4c94d53

Browse files
authored
Merge pull request #8664 from maotori/patch-1
AB#5379: Update new-setting-modifies-ntlm-network-authentication.md
2 parents 03a0745 + 4a4b8b7 commit 4c94d53

1 file changed

Lines changed: 7 additions & 7 deletions

File tree

support/windows-server/windows-security/new-setting-modifies-ntlm-network-authentication.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
22
title: NTLM network authentication changes
3-
description: Describes new behavior in Windows Server 2003 SP1 that affects NTLM password changes. After you install the service pack, domain users can change a password and still use their old password to authenticate. This setting can be changed in the registry.
4-
ms.date: 01/15/2025
3+
description: Describes a new behavior in Windows Server 2003 SP1 that affects NTLM password changes and how to use a registry to change the behavior.
4+
ms.date: 04/15/2025
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
8-
ms.reviewer: kaushika
8+
ms.reviewer: kaushika, maotori,herbertm
99
ms.custom:
1010
- sap:windows security technologies\legacy authentication (ntlm)
1111
- pcy:WinComm Directory Services
1212
---
13-
# New setting modifies NTLM network authentication behavior
13+
# Setting in NTLM network authentication behavior allows the use of the previous password
1414

15-
This article describes new behavior that affects NTLM password changes and how to change this behavior by using a registry.
15+
This article describes a behavior that affects NTLM password changes and how to change this behavior by using a registry.
1616

1717
_Original KB number:_   906305
1818

1919
## Introduction
2020

21-
Beginning with Microsoft Windows Server 2003 Service Pack 1 (SP1), there is a change to NTLM network authentication behavior. Domain users can use their old password to access the network for one hour after the password is changed. Existing components that are designed to use Kerberos for authentication are not affected by this change.
21+
There is an option in NTLM network authentication when a user password is changed. Domain users can use their old password to access the network for five minutes after the password is changed. Existing components that are designed to use Kerberos for authentication are not affected by this change.
2222

2323
The goal of this change is to allow background processes such as services to continue running for some time until an administrator has the opportunity to update the credentials for the new password.
2424

@@ -52,7 +52,7 @@ To do this, follow these steps:
5252
6. In the **Value data** box, type the value in minutes that you want to use, and then click **OK**.
5353

5454
> [!NOTE]
55-
> The lifetime period is set in minutes. If this registry value is not set, the default lifetime period for an old password is 60 minutes.
55+
> The lifetime period is set in minutes. If this registry value is not set, the default lifetime period for an old password is five minutes.
5656
5757
7. Quit Registry Editor.
5858

0 commit comments

Comments
 (0)