Skip to content

Commit c7947ca

Browse files
authored
Update audit-domain-controller-ntlmv1.md
Edit review per CI 9559
1 parent 93281dc commit c7947ca

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

support/windows-server/windows-security/audit-domain-controller-ntlmv1.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,15 @@ _Original KB number:_   4090105
1818

1919
## Summary
2020

21-
This article describes how to audit NTLMv1 authentication on Windows Server domain controllers. Use this information to identify applications and services that still use NTLMv1 before you disable it in your environment.
21+
This article describes how to audit NTLMv1 authentication on Windows Server domain controllers (DCs). Use this information to identify applications and services that still use NTLMv1 before you disable NTLMv1 in your environment.
2222

2323
NTLMv1 is a legacy authentication protocol that Microsoft deprecated in June 2024. For more information, see [Deprecated Features](/windows/whats-new/deprecated-features#deprecated-features).
2424

25-
To maintain security, identify any remaining NTLMv1 usage and migrate applications to use modern authentication protocols. To audit the use of any version of NTLM, use the methods that are described in this article and in [Removing NTLMv1, new audit event for use of NTLM](https://support.microsoft.com/topic/upcoming-changes-to-ntlmv1-in-windows-11-version-24h2-and-windows-server-2025-c0554217-cdbc-420f-b47c-e02b2db49b2e)
25+
To maintain security, identify any remaining NTLMv1 usage, and migrate applications to use modern authentication protocols. To audit the use of any version of NTLM, use the methods that are described in this article and in [Removing NTLMv1, new audit event for use of NTLM](https://support.microsoft.com/topic/upcoming-changes-to-ntlmv1-in-windows-11-version-24h2-and-windows-server-2025-c0554217-cdbc-420f-b47c-e02b2db49b2e).
2626

2727
## NTLM auditing
2828

29-
To find applications that use NTLMv1, enable Logon Success Auditing on the DC. Then review the event log on the DC for Success auditing Event ID 4624, which contains information about the version of NTLM.
29+
To find applications that use NTLMv1, enable Logon Success Auditing on the DC. Then, review the event log on the DC for Success auditing Event ID 4624. This log entry contains information about the version of NTLM.
3030

3131
The text of Event ID 4624 resembles the following example:
3232

@@ -73,7 +73,7 @@ Key Length: 128
7373

7474
[!INCLUDE [Registry important alert](../../../includes/registry-important-alert.md)]
7575

76-
To configure a DC to only use NTLMv2 for authentication, configure the following registry value on the DC:
76+
To configure a DC to use only NTLMv2 for authentication, configure the following registry value on the DC:
7777

7878
- Subkey: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa`
7979
- Entry: `LMCompatibilityLevel`
@@ -83,14 +83,14 @@ For more information, see [How to enable NTLM 2 authentication](../../windows-cl
8383

8484
## More information
8585

86-
The sign-in (logon) operation that Event ID 4624 describes doesn't use NTLMv1 session security. There's actually no session security, because no key material exists.
86+
The sign-in (logon) operation that Event ID 4624 describes doesn't use NTLMv1 session security. This operation actually has no session security because no key material exists.
8787

88-
The logic of the NTLM Auditing is that it logs NTLMv2-level authentication when it finds NTLMv2 key material on the sign-in session. It logs NTLMv1 in all other cases, which include anonymous sessions. Therefore, our general recommendation is to ignore the event for security protocol usage information when the event is logged for **ANONYMOUS LOGON**.
88+
The logic of NTLM Auditing is that it logs NTLMv2-level authentication when it finds NTLMv2 key material on the sign-in session. It logs NTLMv1 in all other cases, including anonymous sessions. Therefore, our general recommendation is to ignore the event for security protocol usage information if the event is logged for **ANONYMOUS LOGON**.
8989

9090
Common sources of anonymous logon sessions include the following applications and services:
9191

92-
- [Computer Browser Service](/previous-versions/windows/it-pro/windows-server-2003/cc778351(v=ws.10)): It's a legacy service from Windows 2000 and earlier versions of Windows. The service provides lists of computers and domains on the network. The service runs in the background. However, today this data is no longer used. We recommend that you disable this service across the enterprise.
92+
- [Computer Browser Service](/previous-versions/windows/it-pro/windows-server-2003/cc778351(v=ws.10)): A legacy service from Windows 2000 and earlier versions of Windows. The service runs in the background and provides lists of computers and domains on the network. However, this data is no longer used. We recommend that you disable this service across the enterprise.
9393

94-
- SID-Name mapping: It can use anonymous sessions. See [Network access: Allow anonymous SID/Name translation](/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation). We recommend that you require authentication for this functionality.
94+
- SID-Name mapping: A process that can use anonymous sessions. See [Network access: Allow anonymous SID/Name translation](/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation). We recommend that you require authentication for this functionality.
9595

9696
- Client applications that don't authenticate: The application server might still create a logon session as an anonymous user. Similarly, it might create an anonymous session if it uses NTLM authentication together with empty user name and password strings.

0 commit comments

Comments
 (0)