<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: ASPBR Tech</title>
    <description>The latest articles on DEV Community by ASPBR Tech (@aspbrtech).</description>
    <link>https://dev.to/aspbrtech</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3899042%2Fd135fd0a-69d6-40a9-b778-d973cd5add3f.png</url>
      <title>DEV Community: ASPBR Tech</title>
      <link>https://dev.to/aspbrtech</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aspbrtech"/>
    <language>en</language>
    <item>
      <title>Disabling NTLM by Default</title>
      <dc:creator>ASPBR Tech</dc:creator>
      <pubDate>Sat, 02 May 2026 11:36:44 +0000</pubDate>
      <link>https://dev.to/aspbrtech/disabling-ntlm-by-default-2jl3</link>
      <guid>https://dev.to/aspbrtech/disabling-ntlm-by-default-2jl3</guid>
      <description>&lt;p&gt;title: Disabling NTLM by Default&lt;br&gt;
description: A step-by-step guide on disabling NTLM for better security.&lt;br&gt;
tags: linux,devops,cloud,aws&lt;/p&gt;
&lt;h2&gt;
  
  
  Introduction to NTLM
&lt;/h2&gt;

&lt;p&gt;NTLM (NT LAN Manager) is a suite of security protocols used for authentication and session security in Microsoft environments. While it provides a certain level of security, NTLM has been largely superseded by more modern and secure authentication protocols like Kerberos. Disabling NTLM can significantly improve the security posture of your network by reducing the attack surface.&lt;/p&gt;
&lt;h3&gt;
  
  
  Problem Context
&lt;/h3&gt;

&lt;p&gt;NTLM is an older protocol with known vulnerabilities, making it a target for attackers. By default, many systems still have NTLM enabled, which can lead to security risks if not properly managed. Disabling NTLM by default is a recommended best practice to enhance security and comply with modern security standards.&lt;/p&gt;
&lt;h2&gt;
  
  
  Step-by-Step Guide to Disabling NTLM
&lt;/h2&gt;

&lt;p&gt;Disabling NTLM involves configuring both client and server settings. Here\'s how you can do it:&lt;/p&gt;
&lt;h3&gt;
  
  
  For Windows Clients
&lt;/h3&gt;

&lt;p&gt;On Windows clients, you can disable NTLM through the Local Group Policy Editor or via registry edits. To do this through the Group Policy Editor:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open the Local Group Policy Editor (&lt;code&gt;gpedit.msc&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;Navigate to &lt;code&gt;Computer Configuration&lt;/code&gt; &amp;gt; &lt;code&gt;Windows Settings&lt;/code&gt; &amp;gt; &lt;code&gt;Security Settings&lt;/code&gt; &amp;gt; &lt;code&gt;Local Policies&lt;/code&gt; &amp;gt; &lt;code&gt;Security Options&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Find the policy named &lt;code&gt;Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Enable this policy and set the option to &lt;code&gt;Deny All&lt;/code&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Alternatively, you can achieve this through a registry edit:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;reg add &lt;span class="se"&gt;\"&lt;/span&gt;HKLM&lt;span class="se"&gt;\\&lt;/span&gt;SYSTEM&lt;span class="se"&gt;\\&lt;/span&gt;CurrentControlSet&lt;span class="se"&gt;\\&lt;/span&gt;Control&lt;span class="se"&gt;\\&lt;/span&gt;Lsa&lt;span class="se"&gt;\"&lt;/span&gt; /v RestrictSendingNTLMTraffic /t REG_DWORD /d 2 /f
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  For Linux Clients
&lt;/h3&gt;

&lt;p&gt;On Linux systems, especially those integrated with Active Directory, you might need to configure your authentication settings to prefer Kerberos over NTLM. This can often be done by adjusting the &lt;code&gt;sssd&lt;/code&gt; configuration or &lt;code&gt;pam&lt;/code&gt; settings.&lt;/p&gt;

&lt;p&gt;For example, to configure &lt;code&gt;sssd&lt;/code&gt; to use Kerberos, you might add the following lines to your &lt;code&gt;sssd.conf&lt;/code&gt; file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="nv"&gt;sssd&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
&lt;span class="s"&gt;config_file_version = &lt;/span&gt;&lt;span class="m"&gt;2&lt;/span&gt;
&lt;span class="s"&gt;services = nss, pam&lt;/span&gt;
&lt;span class="s"&gt;domains = yourdomain.com&lt;/span&gt;

&lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="nv"&gt;domain/yourdomain.com&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
&lt;span class="s"&gt;id_provider = ad&lt;/span&gt;
&lt;span class="s"&gt;auth_provider = ad&lt;/span&gt;
&lt;span class="s"&gt;access_provider = ad&lt;/span&gt;
&lt;span class="s"&gt;chpass_provider = ad&lt;/span&gt;
&lt;span class="s"&gt;ldap_id_mapping = False&lt;/span&gt;
&lt;span class="s"&gt;use_fully_qualified_names = True&lt;/span&gt;
&lt;span class="s"&gt;fallback_homedir = /home/%u&lt;/span&gt;
&lt;span class="s"&gt;default_shell = /bin/bash&lt;/span&gt;
&lt;span class="s"&gt;ldap_sasl_mech = GSSAPI&lt;/span&gt;
&lt;span class="s"&gt;ldap_sasl_authid = host/yourhost@YOURDOMAIN.COM&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Practical Tips
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Monitor Your Environment&lt;/strong&gt;: Before making changes, monitor your environment to understand which applications or services rely on NTLM. This will help you assess the impact of disabling NTLM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Test Thoroughly&lt;/strong&gt;: After configuring the changes, thoroughly test all affected systems and applications to ensure no disruptions occur.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Maintain Documentation&lt;/strong&gt;: Keep detailed documentation of the changes made and the reasoning behind them. This is crucial for future audits and troubleshooting.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Disabling NTLM by default is a critical step in enhancing the security of your network. By following the steps outlined above and considering the practical tips provided, you can effectively reduce the risk associated with using an outdated authentication protocol. Remember, security is an ongoing process, and staying up to date with the latest best practices is key to protecting your environment.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published on &lt;a href="https://aspbrtech.com" rel="noopener noreferrer"&gt;AspbrTech&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>windows</category>
    </item>
  </channel>
</rss>
