Skip to content

Commit d26d1cb

Browse files
authored
Update per reviewer's comments
1 parent 1b8f700 commit d26d1cb

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

support/windows-server/windows-security/new-setting-modifies-ntlm-network-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,15 @@ ms.custom:
1010
- sap:windows security technologies\legacy authentication (ntlm)
1111
- pcy:WinComm Directory Services
1212
---
13-
# New setting modifies NTLM network authentication behavior
13+
# Setting in NTLM network authentication behavior allows use of previous password
1414

1515
This article describes new behavior that affects NTLM password changes and how to change this behavior by using a registry.
1616

1717
_Original KB number:_   906305
1818

1919
## Introduction
2020

21-
Beginning with Microsoft Windows Server 2003 Service Pack 1 (SP1), there is a change to NTLM network authentication behavior. Domain users can use their old password to access the network for five minutes after the password is changed. Existing components that are designed to use Kerberos for authentication are not affected by this change.
21+
There is an option in NTLM network authentication when a user password was changed. Domain users can use their old password to access the network for five minutes after the password is changed. Existing components that are designed to use Kerberos for authentication are not affected by this change.
2222

2323
The goal of this change is to allow background processes such as services to continue running for some time until an administrator has the opportunity to update the credentials for the new password.
2424

0 commit comments

Comments
 (0)