Microsoft to Disable NTLM by Default in Future Windows Releases
Summary
Hide ▲
Show ▼
Microsoft plans to disable the 30-year-old NTLM authentication protocol by default in upcoming Windows releases due to its security vulnerabilities. NTLM, introduced in 1993, has been widely exploited in attacks such as NTLM relay and pass-the-hash attacks. Microsoft is transitioning to Kerberos-based authentication, which is more secure. The company has outlined a three-phase transition plan to mitigate risks and minimize disruption. NTLM has been a fallback authentication method when Kerberos is unavailable, but its weak cryptography and vulnerabilities make it a target for attackers. Microsoft's move aims to enhance security by default in future Windows Server and client versions. NTLM was formally deprecated in June 2024 and no longer receives updates. The transition is part of Microsoft's efforts to move toward a passwordless, phishing-resistant future.
Timeline
-
30.01.2026 19:08 2 articles · 3d ago
Microsoft Announces Three-Phase Transition Plan to Disable NTLM by Default
Microsoft has outlined a three-phase transition plan to disable NTLM by default in future Windows releases. Phase one involves enhanced auditing tools in Windows 11 24H2 and Windows Server 2025 to identify NTLM usage. Phase two, scheduled for the second half of 2026, will introduce new features like IAKerb and a Local Key Distribution Center to address NTLM fallback scenarios. Phase three will disable network NTLM by default in future releases, though it can be re-enabled through policy controls if needed. NTLM was formally deprecated in June 2024 and no longer receives updates. Microsoft continues to find the use of NTLM prevalent in enterprise environments due to legacy dependencies, network limitations, or ingrained application logic. The transition is part of Microsoft's efforts to move toward a passwordless, phishing-resistant future.
Show sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
Information Snippets
-
NTLM (New Technology LAN Manager) is a challenge-response authentication protocol introduced in 1993 with Windows NT 3.1.
First reported: 30.01.2026 19:082 sources, 2 articlesShow sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Kerberos has superseded NTLM and is the current default protocol for domain-connected devices running Windows 2000 or later.
First reported: 30.01.2026 19:082 sources, 2 articlesShow sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
NTLM is vulnerable to attacks such as NTLM relay and pass-the-hash attacks, which allow attackers to escalate privileges and take control of Windows domains.
First reported: 30.01.2026 19:082 sources, 2 articlesShow sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Microsoft will disable NTLM by default in the next major Windows Server release and associated Windows client versions.
First reported: 30.01.2026 19:082 sources, 2 articlesShow sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Microsoft has outlined a three-phase transition plan to mitigate NTLM-related risks while minimizing disruption.
First reported: 30.01.2026 19:082 sources, 2 articlesShow sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Phase one involves enhanced auditing tools in Windows 11 24H2 and Windows Server 2025 to identify NTLM usage.
First reported: 30.01.2026 19:082 sources, 2 articlesShow sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Phase two, scheduled for the second half of 2026, will introduce new features like IAKerb and a Local Key Distribution Center to address NTLM fallback scenarios.
First reported: 30.01.2026 19:082 sources, 2 articlesShow sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Phase three will disable network NTLM by default in future releases, though it can be re-enabled through policy controls if needed.
First reported: 30.01.2026 19:082 sources, 2 articlesShow sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Microsoft first announced plans to retire NTLM in October 2023 and officially deprecated it in July 2024.
First reported: 30.01.2026 19:081 source, 1 articleShow sources
- Microsoft to disable NTLM by default in future Windows releases — www.bleepingcomputer.com — 30.01.2026 19:08
-
NTLM was formally deprecated in June 2024 and no longer receives updates.
First reported: 02.02.2026 17:591 source, 1 articleShow sources
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Microsoft continues to find the use of NTLM prevalent in enterprise environments due to legacy dependencies, network limitations, or ingrained application logic.
First reported: 02.02.2026 17:591 source, 1 articleShow sources
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Microsoft has positioned the transition as a major step toward a passwordless, phishing-resistant future.
First reported: 02.02.2026 17:591 source, 1 articleShow sources
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
-
Disabling NTLM by default does not mean completely removing NTLM from Windows yet, but rather delivering Windows in a secure-by-default state where network NTLM authentication is blocked and no longer used automatically.
First reported: 02.02.2026 17:591 source, 1 articleShow sources
- Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos — thehackernews.com — 02.02.2026 17:59
Similar Happenings
Windows Authentication Failures Due to Duplicate Security Identifiers
Windows updates released since August 29, 2025, have introduced authentication failures on systems with duplicate Security Identifiers (SIDs). These updates enforce stricter SID checks, causing Kerberos and NTLM authentication to fail on affected devices. The issue impacts Windows 11 (24H2 and 25H2) and Windows Server 2025, leading to various login and access problems. Duplicate SIDs often result from improperly cloned or duplicated Windows installations. Microsoft recommends rebuilding affected systems using supported cloning methods or applying a temporary Group Policy fix obtained through Microsoft Support.
Credential Theft via Legacy Windows Protocols in Local Networks
Legacy Windows communication protocols, specifically Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS), continue to expose organizations to credential theft. Attackers can capture login data by being on the same local network as their targets, leveraging tools like Responder to intercept authentication data. This method does not exploit software vulnerabilities but relies on default Windows behavior. The captured data can be cracked offline or reused in relay attacks, providing access to corporate databases, file servers, and administrative systems. Once attackers obtain valid credentials, they can move laterally across the network, escalate privileges, and disrupt critical business services. Organizations are advised to disable LLMNR and NBT-NS, enforce secure authentication methods, and monitor for unusual traffic on these protocols.
Senator Wyden calls for FTC probe into Microsoft's alleged ransomware-related cybersecurity negligence
U.S. Senator Ron Wyden has called for an FTC investigation into Microsoft's alleged cybersecurity negligence, which he claims enabled ransomware attacks on U.S. critical infrastructure, including healthcare networks. The call follows a ransomware attack on Ascension, a healthcare system, which resulted in the theft of personal and medical information of nearly 5.6 million individuals. The attack was attributed to the Black Basta ransomware group and exploited insecure default settings in Microsoft software. The breach occurred in May 2024 when a contractor clicked on a malicious Bing Search result in Microsoft Edge, leading to a Kerberoasting attack. Attackers used Kerberoasting to extract encrypted service account credentials from Active Directory, leveraging the vulnerabilities in RC4. Wyden's letter to the FTC highlights Microsoft's continued support for RC4, an outdated encryption standard, and its failure to enforce secure password policies for privileged accounts. Microsoft has acknowledged the issues and plans to deprecate RC4 in future updates, but Wyden argues that these measures are insufficient to protect against ongoing threats.
EPM Poisoning Exploit Chain in Windows RPC Enables Domain Privilege Escalation
Researchers have disclosed a now-patched vulnerability in the Windows Remote Procedure Call (RPC) protocol that could be exploited to conduct spoofing attacks and escalate privileges within a domain. The flaw, tracked as CVE-2025-49760, allows attackers to manipulate the Endpoint Mapper (EPM) to impersonate legitimate services and coerce protected processes into authenticating against malicious servers. The attack chain involves registering known interfaces of core services and exploiting delayed-start services to hijack RPC interfaces. Microsoft patched the vulnerability in July 2025. The exploit chain can lead to domain privilege escalation through an ESC8 attack, leveraging NTLM hashes and Kerberos Ticket-Granting Tickets (TGTs).