Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。首先,我需要仔细阅读文章,理解其主要内容。 文章主要讲的是微软计划逐步淘汰NTLM协议,转向基于Kerberos的安全选项。NTLM因为容易受到攻击,已经被弃用,但仍然在企业环境中广泛使用。微软提出了三阶段策略来逐步禁用NTLM,并推动迁移到更安全的Kerberos。 接下来,我需要提取关键点:微软淘汰NTLM,转向Kerberos;三阶段策略;第一阶段是增强审计,第二阶段解决迁移障碍,第三阶段默认禁用NTLM;目标是实现无密码、抗钓鱼的安全未来。 现在要把这些信息浓缩到100字以内。确保涵盖主要措施和目标。同时避免使用开头语句,直接描述内容。 可能的结构:微软宣布淘汰NTLM协议,分三阶段转向Kerberos。第一阶段审计使用情况,第二阶段解决迁移问题,第三阶段默认禁用。目标是提升安全性,推动无密码未来。 检查字数是否在限制内,并确保信息准确完整。 </think> 微软宣布将逐步淘汰易受攻击的NTLM协议,转向更安全的Kerberos方案。分三阶段推进:第一阶段增强审计以识别NTLM使用情况;第二阶段解决迁移障碍;第三阶段默认禁用NTLM。目标是提升企业安全性并推动无密码未来。 2026-2-2 15:59:0 Author: thehackernews.com(查看原文) 阅读量:2 收藏

Kerberos / Enterprise Security

Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options.

The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that could facilitate relay attacks and allow bad actors to gain unauthorized access to network resources. NTLM was formally deprecated in June 2024 and no longer receives updates.

"NTLM consists of security protocols originally designed to provide authentication, integrity, and confidentiality to users," Mariam Gewida, Technical Program Manager II at Microsoft, explained. "However, as security threats have evolved, so have our standards to meet modern security expectations. Today, NTLM is susceptible to various attacks, including replay and man-in-the-middle attacks, due to its use of weak cryptography."

Despite the deprecated status, Microsoft said it continues to find the use of NTLM prevalent in enterprise environments where modern protocols like Kerberos cannot be implemented due to legacy dependencies, network limitations, or ingrained application logic. This, in turn, exposes organizations to security risks, such as replay, relay, and pass-the-hash attacks.

Cybersecurity

To mitigate this problem in a secure manner, the company has adopted a three-phase strategy that paves the way for NTLM to be disabled by default -

  • Phase 1: Building visibility and control using enhanced NTLM auditing to better understand where and why NTLM is still being used (Available now)
  • Phase 2: Addressing common roadblocks that prevent a migration to NTLM through features like IAKerb and local Key Distribution Center (KDC) (pre-release), as well as updating core Windows components to prioritize Kerberos authentication (Expected in H2 2026)
  • Phase 3: Disabling NTLM in the next version of Windows Server and associated Windows client, and requiring explicit re-enablement through new policy controls

Microsoft has positioned the transition as a major step toward a passwordless, phishing-resistant future. This also requires organizations relying on NTLM to conduct audits, map dependencies, migrate to Kerberos, test NTLM-off configurations in non-production environments, and enable Kerberos upgrades.

"Disabling NTLM by default does not mean completely removing NTLM from Windows yet," Gewida said. "Instead, it means that Windows will be delivered in a secure-by-default state where network NTLM authentication is blocked and no longer used automatically."

"The OS will prefer modern, more secure Kerberos-based alternatives. At the same time, common legacy scenarios will be addressed through new upcoming capabilities such as Local KDC and IAKerb (pre-release)."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/microsoft-begins-ntlm-phase-out-with.html
如有侵权请联系:admin#unsafe.sh