Skip to content

Commit 7b6375c

Browse files
committed
ConfigMgr MSRC article draft
1 parent 7b6c0ec commit 7b6375c

1 file changed

Lines changed: 73 additions & 0 deletions

File tree

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
---
2+
title: NTLM connection fallback update for Microsoft Endpoint Configuration Manager
3+
titleSuffix: Configuration Manager
4+
description: NTLM connection fallback update for Configuration Manager
5+
ms.date: 09/16/2022
6+
ms.prod: configuration-manager
7+
ms.technology: configmgr-core
8+
ms.topic: reference
9+
ms.assetid: 3c93a332-e818-46fe-860f-cbebf4dd9ab3
10+
author: bhuney
11+
ms.author: brianhun
12+
manager: dougeby
13+
---
14+
# NTLM connection fallback update for Microsoft Endpoint Configuration Manager
15+
16+
*Applies to: Configuration Manager (current branch, versions 2103, 2107, 2111, 2203, 2207)*
17+
18+
## Summary of KB15498768
19+
Disabling the **Allow connection fallback to NTLM** option in *Client Push Installation Properties* is not honored under either of the following conditions:
20+
- If there are Kerberos authentication failures the client push account will attempt an NTLM connection instead.
21+
- The site server computer account will attempt a connection using NTLM if all defined client push installation accounts fail to connect.
22+
23+
This update prevents any attempt at NTLM authentication for client push installation when the **Allow connection fallback to NTLM** option is disabled.
24+
25+
Installation of this update resolves the following security issue:
26+
- [CVE-2022-37972](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-37972)
27+
28+
Beginning with Configuration Manager current branch, version 2207, the **Allow connection fallback to NTLM** option is *disabled* by default on new site installations.
29+
It is recommended to disable this option in existing environments where possible to increase security.
30+
31+
Refer to the following documents for more detail on client and NTLM security.
32+
- [Security and privacy for Configuration Manager clients](https://docs.microsoft.com/mem/configmgr/core/clients/deploy/plan/security-and-privacy-for-clients#security-guidance-for-clients)
33+
- [KB5005413: Mitigating NTLM Relay Attacks on Active Directory Certificate Services](https://support.microsoft.com/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429)
34+
- [Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers](https://docs.microsoft.com/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers)
35+
36+
## Update information for Microsoft Endpoint Configuration Manager, versions 2103-2207
37+
An update to resolve this issue is available in the **Updates and Servicing** node of the Configuration Manager console for environments that installed versions 2103-2203.
38+
39+
#### Update replacement information
40+
This update does not replace any previously released updates.
41+
42+
#### Restart information
43+
For Configuration Manager versions 2107 and higher, this update does not require a computer restart or a [site reset](../../core/servers/manage/modify-your-infrastructure.md#bkmk_reset) after installation.
44+
45+
Configuration Manager version 2103 will require a site reset after update installation.
46+
47+
### Additional installation information
48+
After you install this update on a primary site, pre-existing secondary sites must be manually updated. To update a secondary site in the Configuration Manager console, select **Administration** > **Site Configuration** > **Sites** > **Recover Secondary Site**, and then select the secondary site. The primary site then reinstalls that secondary site by using the updated files. Configurations and settings for the secondary site are not affected by this reinstallation. The new, upgraded, and reinstalled secondary sites under that primary site automatically receive this update.
49+
50+
Run the following SQL Server command on the site database to check whether the update version of a secondary site matches that of its parent primary site:
51+
```sql
52+
select dbo.fnGetSecondarySiteCMUpdateStatus ('SiteCode_of_secondary_site')
53+
```
54+
If the value 1 is returned, the site is up to date, with all the hotfixes applied on its parent primary site.
55+
56+
If the value 0 is returned, the site has not installed all the fixes that are applied to the primary site, and you should use the **Recover Secondary Site** option to update the secondary site.
57+
58+
## Version information
59+
No major components are updated with this release.
60+
61+
## File information
62+
File information is available in the following version-specific file lists (KB15498768_FileList.txt):
63+
- [Configuration Manager 2103](https://aka.ms/KB15498768_2103_FileList)
64+
- [Configuration Manager 2107](https://aka.ms/KB15498768_2107_FileList)
65+
- [Configuration Manager 2111](https://aka.ms/KB15498768_2111_FileList)
66+
- [Configuration Manager 2203](https://aka.ms/KB15498768_2203_FileList)
67+
- [Configuration Manager 2207](https://aka.ms/KB15498768_2207_FileList)
68+
69+
## Release history
70+
- September 16, 2022: Initial hotfix release
71+
72+
## References
73+
[Updates and servicing for Configuration Manager](../../core/servers/manage/updates.md)

0 commit comments

Comments
 (0)