Skip to content

Commit e563cb3

Browse files
authored
Merge pull request #10660 from v-tappelgate/AB#9559-PR#2003---Update-NTLMv1-audit-doc
AB#9559 Update NTLMv1 audit doc
2 parents ecd0acc + 6c4df4b commit e563cb3

1 file changed

Lines changed: 27 additions & 16 deletions

File tree

support/windows-server/windows-security/audit-domain-controller-ntlmv1.md

Lines changed: 27 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Audit use of NTLMv1 on a domain controller
3-
description: Steps to audit the usage of NTLMv1 on a Windows Server-based domain controller.
4-
ms.date: 01/15/2025
3+
description: Discusses how to use event logs to audit the usage of NTLMv1 on a Windows Server-based domain controller.
4+
ms.date: 02/3/2026
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
8-
ms.reviewer: kaushika
8+
ms.reviewer: kaushika, herbertm, v-appelgatet
99
ms.custom:
1010
- sap:windows security technologies\legacy authentication (ntlm)
1111
- pcy:WinComm Directory Services
@@ -14,22 +14,21 @@ appliesto:
1414
---
1515
# Audit use of NTLMv1 on a Windows Server-based domain controller
1616

17-
This article introduces the steps to test any application that's using NT LAN Manager (NTLM) version 1 on a Microsoft Windows Server-based domain controller.
18-
1917
_Original KB number:_   4090105
2018

2119
## Summary
2220

23-
> [!WARNING]
24-
> Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall the operating system. Microsoft can't guarantee that these problems can be solved. Modify the registry at your own risk.
21+
This article describes how to audit NTLMv1 authentication on Windows Server domain controllers (DCs). Use this information to identify applications and services that still use NTLMv1 before you disable NTLMv1 in your environment.
22+
23+
NTLMv1 is a legacy authentication protocol that Microsoft deprecated in June 2024. For more information, see [Deprecated Features](/windows/whats-new/deprecated-features#deprecated-features).
2524

26-
You may do this test before setting computers to only use NTLMv2. To configure the computer to only use NTLMv2, set **LMCompatibilityLevel** to **5** under the `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa` key on the domain controller.
25+
To maintain security, identify any remaining NTLMv1 usage, and migrate applications to use modern authentication protocols. To audit the use of any version of NTLM, use the methods that are described in this article and in [Removing NTLMv1, new audit event for use of NTLM](https://support.microsoft.com/topic/upcoming-changes-to-ntlmv1-in-windows-11-version-24h2-and-windows-server-2025-c0554217-cdbc-420f-b47c-e02b2db49b2e).
2726

2827
## NTLM auditing
2928

30-
To find applications that use NTLMv1, enable Logon Success Auditing on the domain controller, and then look for Success auditing Event 4624, which contains information about the version of NTLM.
29+
To find applications that use NTLMv1, enable Logon Success Auditing on the DC. Then, review the event log on the DC for Success auditing Event ID 4624. This log entry contains information about the version of NTLM.
3130

32-
You will receive event logs that resemble the following ones:
31+
The text of Event ID 4624 resembles the following example:
3332

3433
```output
3534
Sample Event ID: 4624
@@ -70,16 +69,28 @@ Package Name (NTLM only): NTLM V1
7069
Key Length: 128
7170
```
7271

72+
## Using NTLMv2 exclusively
73+
74+
[!INCLUDE [Registry important alert](../../../includes/registry-important-alert.md)]
75+
76+
To configure a DC to use only NTLMv2 for authentication, configure the following registry value on the DC:
77+
78+
- Subkey: `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa`
79+
- Entry: `LMCompatibilityLevel`
80+
- Value: **5**
81+
82+
For more information, see [How to enable NTLM 2 authentication](../../windows-client/windows-security/enable-ntlm-2-authentication.md).
83+
7384
## More information
7485

75-
This logon in the event log doesn't really use NTLMv1 session security. There's actually no session security, because no key material exists.
86+
The sign-in (logon) operation that Event ID 4624 describes doesn't use NTLMv1 session security. This operation actually has no session security because no key material exists.
7687

77-
The logic of the NTLM Auditing is that it will log NTLMv2-level authentication when it finds NTLMv2 key material on the logon session. It logs NTLMv1 in all other cases, which include anonymous sessions. Therefore, our general recommendation is to ignore the event for security protocol usage information when the event is logged for **ANONYMOUS LOGON**.
88+
The logic of NTLM Auditing is that it logs NTLMv2-level authentication when it finds NTLMv2 key material on the sign-in session. It logs NTLMv1 in all other cases, including anonymous sessions. Therefore, our general recommendation is to ignore the event for security protocol usage information if the event is logged for **ANONYMOUS LOGON**.
7889

79-
Common sources of anonymous logon sessions are:
90+
Common sources of anonymous logon sessions include the following applications and services:
8091

81-
- [Computer Browser Service](/previous-versions/windows/it-pro/windows-server-2003/cc778351(v=ws.10)): It's a legacy service from Windows 2000 and earlier versions of Windows. The service provides lists of computers and domains on the network. The service runs in the background. However, today this data is no longer used. We recommend that you disable this service across the enterprise.
92+
- [Computer Browser Service](/previous-versions/windows/it-pro/windows-server-2003/cc778351(v=ws.10)): A legacy service from Windows 2000 and earlier versions of Windows. The service runs in the background and provides lists of computers and domains on the network. However, this data is no longer used. We recommend that you disable this service across the enterprise.
8293

83-
- SID-Name mapping: It can use anonymous sessions. See [Network access: Allow anonymous SID/Name translation](/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation). We recommend that you require authentication for this functionality.
94+
- SID-Name mapping: A process that can use anonymous sessions. See [Network access: Allow anonymous SID/Name translation](/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation). We recommend that you require authentication for this functionality.
8495

85-
- Client applications that don't authenticate: The application server may still create a logon session as anonymous. It's also done when there are empty strings passed for user name and password in NTLM authentication.
96+
- Client applications that don't authenticate: The application server might still create a logon session as an anonymous user. Similarly, it might create an anonymous session if it uses NTLM authentication together with empty user name and password strings.

0 commit comments

Comments
 (0)