Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsMicrosoft to Disable NTLM by Default in Future Windows Releases
Microsoft to Disable NTLM by Default in Future Windows Releases
Cybersecurity

Microsoft to Disable NTLM by Default in Future Windows Releases

•January 30, 2026
0
BleepingComputer
BleepingComputer•Jan 30, 2026

Companies Mentioned

Microsoft

Microsoft

MSFT

Why It Matters

Disabling NTLM reduces the attack surface for credential‑theft techniques, forcing enterprises to adopt stronger Kerberos or password‑less methods. This accelerates security modernization across Windows environments.

Key Takeaways

  • •NTLM disabled by default in upcoming Windows releases
  • •Three‑phase rollout starts with auditing, then IAKerb, then block
  • •Kerberos becomes sole default authentication method
  • •Legacy apps must migrate to Kerberos or Negotiation
  • •Admins can re‑enable NTLM via policy if required

Pulse Analysis

Introduced in 1993, NTLM has long served as a fallback authentication mechanism for Windows domains, but its reliance on weak cryptography makes it a prime target for relay, pass‑the‑hash, and other credential‑theft attacks. Over the past decade, high‑profile exploits such as PetitPotam and ShadowCoerce have demonstrated how attackers can bypass modern mitigations by abusing NTLM hashes. Recognizing that the protocol’s inherent weaknesses outweigh its legacy convenience, Microsoft has moved NTLM from a default to an opt‑in feature, aligning Windows with contemporary security standards.

The rollout follows a three‑phase plan designed to give administrators time to inventory and remediate NTLM usage. Phase 1, already available in Windows 11 24H2 and Server 2025, adds granular auditing logs that pinpoint lingering NTLM dependencies. Phase 2, slated for the second half of 2026, introduces IAKerb and a Local Key Distribution Center to handle scenarios where Kerberos cannot be used, such as workgroup machines or legacy services. Phase 3 will automatically block network NTLM, though the protocol remains in the OS and can be re‑enabled via Group Policy for exceptional cases.

The shift has immediate implications for security teams and developers. Organizations must audit applications, scripts, and services that still invoke NTLM and migrate them to Kerberos, Negotiation, or emerging password‑less solutions like FIDO2. Compliance frameworks that reference credential‑theft mitigation will increasingly expect NTLM deprecation, making early adoption a competitive advantage. By forcing a move away from legacy authentication, Microsoft not only reduces the attack surface but also accelerates the industry’s transition toward more resilient, cryptographically sound identity models.

Microsoft to disable NTLM by default in future Windows releases

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...