|
| 1 | +--- |
| 2 | +title: NTLM connection fallback update for Microsoft Endpoint Configuration Manager |
| 3 | +titleSuffix: Configuration Manager |
| 4 | +description: NTLM connection fallback update for Configuration Manager |
| 5 | +ms.date: 09/20/2022 |
| 6 | +ms.prod: configuration-manager |
| 7 | +ms.technology: configmgr-core |
| 8 | +ms.topic: reference |
| 9 | +ms.assetid: 3c93a332-e818-46fe-860f-cbebf4dd9ab3 |
| 10 | +author: bhuney |
| 11 | +ms.author: brianhun |
| 12 | +manager: dougeby |
| 13 | +--- |
| 14 | +# NTLM connection fallback update for Microsoft Endpoint Configuration Manager |
| 15 | + |
| 16 | +*Applies to: Configuration Manager (current branch, versions 2103, 2107, 2111, 2203, 2207)* |
| 17 | + |
| 18 | +## Summary of KB15498768 |
| 19 | +Disabling the **Allow connection fallback to NTLM** option in *Client Push Installation Properties* is not honored under either of the following conditions: |
| 20 | +- If there are Kerberos authentication failures the client push account will attempt an NTLM connection instead. |
| 21 | +- The site server computer account will attempt a connection using NTLM if Kerberos authentication fails for all defined client push installation accounts. |
| 22 | + |
| 23 | +This update prevents any attempt at NTLM authentication for client push installation when the **Allow connection fallback to NTLM** option is disabled. |
| 24 | + |
| 25 | +Installation of this update resolves the following security issue: |
| 26 | +- [CVE-2022-37972](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-37972) |
| 27 | + |
| 28 | +Beginning with Configuration Manager current branch, version 2207, the **Allow connection fallback to NTLM** option is *disabled* by default on new site installations. |
| 29 | + |
| 30 | +It is recommended to disable this option in existing environments, where possible, to increase security. |
| 31 | + |
| 32 | +Refer to the following documents for more detail on client and NTLM security: |
| 33 | +- [Security and privacy for Configuration Manager clients](../../core/clients/deploy/plan/security-and-privacy-for-clients.md#security-guidance-for-clients) |
| 34 | +- [KB5005413: Mitigating NTLM Relay Attacks on Active Directory Certificate Services](https://support.microsoft.com/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429) |
| 35 | +- [Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers](https://learn.microsoft.com/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers) |
| 36 | + |
| 37 | +Environments using versions of Configuration Manager current branch prior to 2103 are encouraged to update to a later supported version. Administrators can also disable use of automatic and manual client push installation methods to remove the risk of exposure to this issue. |
| 38 | +For more information, see [Support for Configuration Manager current branch versions](../../core/servers/manage/current-branch-versions-supported.md). |
| 39 | + |
| 40 | +## Update information for Microsoft Endpoint Configuration Manager, versions 2103-2207 |
| 41 | +An update to resolve this issue is available in the **Updates and Servicing** node of the Configuration Manager console for environments that have versions 2103-2207 installed. |
| 42 | + |
| 43 | +#### Update replacement information |
| 44 | +This update does not replace any previously released updates. |
| 45 | + |
| 46 | +#### Restart information |
| 47 | +For Configuration Manager versions 2107 and later, this update does not require a computer restart or a [site reset](../../core/servers/manage/modify-your-infrastructure.md#bkmk_reset) after installation. |
| 48 | + |
| 49 | +Configuration Manager version 2103 will require a site reset after update installation. |
| 50 | + |
| 51 | +### Additional installation information |
| 52 | +After you install this update on a primary site, pre-existing secondary sites must be manually updated. To update a secondary site in the Configuration Manager console, select **Administration** > **Site Configuration** > **Sites** > **Recover Secondary Site**, and then select the secondary site. The primary site then reinstalls that secondary site by using the updated files. Configurations and settings for the secondary site are not affected by this reinstallation. The new, upgraded, and reinstalled secondary sites under that primary site automatically receive this update. |
| 53 | + |
| 54 | +Run the following SQL Server command on the site database to check whether the update version of a secondary site matches that of its parent primary site: |
| 55 | + ```sql |
| 56 | + select dbo.fnGetSecondarySiteCMUpdateStatus ('SiteCode_of_secondary_site') |
| 57 | + ``` |
| 58 | +If the value 1 is returned, the site is up to date, with all the hotfixes applied on its parent primary site. |
| 59 | + |
| 60 | +If the value 0 is returned, the site has not installed all the fixes that are applied to the primary site, and you should use the **Recover Secondary Site** option to update the secondary site. |
| 61 | + |
| 62 | +## Version information |
| 63 | +No major components are updated with this release. |
| 64 | + |
| 65 | +## File information |
| 66 | +File information is available in the following version-specific file lists (KB15498768_FileList.txt): |
| 67 | +- [Configuration Manager 2103](https://aka.ms/KB15498768_2103_FileList) |
| 68 | +- [Configuration Manager 2107](https://aka.ms/KB15498768_2107_FileList) |
| 69 | +- [Configuration Manager 2111](https://aka.ms/KB15498768_2111_FileList) |
| 70 | +- [Configuration Manager 2203](https://aka.ms/KB15498768_2203_FileList) |
| 71 | +- [Configuration Manager 2207](https://aka.ms/KB15498768_2207_FileList) |
| 72 | + |
| 73 | +## Release history |
| 74 | +- September 20, 2022: Initial hotfix release |
| 75 | + |
| 76 | +## References |
| 77 | +[Updates and servicing for Configuration Manager](../../core/servers/manage/updates.md) |
0 commit comments