Microsoft to Disable NTLM by Default as a Step Towards More Secure Authentication


The transition away from NTLM (New Technology LAN Manager), a legacy authentication protocol that has existed in Windows for over three decades, is being accelerated.

The company has announced a phased roadmap to reduce, restrict, and ultimately disable NTLM by default in upcoming Windows releases, marking a significant evolution in Windows authentication security.

NTLM has long served as a fallback authentication mechanism when Kerberos is unavailable.

However, the protocol’s age and inherent cryptographic weaknesses make it vulnerable to replay, relay, and pass-the-hash attacks.

Microsoft’s Three-Phase Transition Plan(source: Microsoft)
Microsoft’s Three-Phase Transition Plan(source: Microsoft)

Three-Phase Roadmap for Smooth Transition

As modern security threats continue to evolve, NTLM’s susceptibility to these attack vectors poses significant risks to enterprise environments.

Microsoft’s decision to disable NTLM by default reflects the need to adopt stronger, Kerberos-based authentication mechanisms that align with contemporary security standards.

google

The transition follows a three-phase approach designed to minimize organizational disruption.

PhaseTimelineKey FocusDetails
Phase 1Available nowVisibility & AuditingShows where NTLM is used across systems.
Phase 2Second half of 2026Reduce NTLM UsageEnables Kerberos in NTLM fallback cases.
Phase 3Future Windows releaseDisable by DefaultNTLM off by default with legacy support.

Importantly, Microsoft will provide built-in support for handling legacy NTLM-only scenarios. Minimizing application breakage for organizations with older systems or custom applications.

Backward Compatibility Maintained During Migration

The company emphasizes that disabling NTLM by default does not mean complete removal.

NTLM will remain present in the operating system and can be re-enabled via policy if necessary, ensuring backward compatibility during the transition period.

This approach balances meaningful security improvements with practical organizational needs.

Organizations should begin preparing now by deploying enhanced NTLM auditing, mapping application dependencies, and migrating workloads to Kerberos.

Testing NTLM-disabled configurations in non-production environments. Microsoft encourages enterprises to engage identity, security, and application owners to ensure smooth transitions.

For organizations facing unique NTLM-dependent scenarios, Microsoft has established ntlm@microsoft[.]com as a point of contact.

This phased, collaborative approach positions Windows for a more secure, passwordless future while maintaining supported migration pathways for enterprise environments.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link