Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
BitUnlocker Downgrade Attacks on Windows Allows Access
May 12, 2026
Exploit: Hackers Take Over cPanel Abuse CVE-2026-41940
May 12, 2026
TanStack npm Supply-Chain Attack Hacks CI Credentials
May 12, 2026
Home/CyberSecurity News/Microsoft Disables NTLM by Default for Secure Authentication
CyberSecurity News

Microsoft Disables NTLM by Default for Secure Authentication

Microsoft is accelerating the deprecation of NTLM (New Technology LAN Manager). This legacy authentication protocol has been a foundational component of Windows for over three decades. The company...

Emy Elsamnoudy
Emy Elsamnoudy
February 3, 2026 2 Min Read
3 0

Microsoft is accelerating the deprecation of NTLM (New Technology LAN Manager). This legacy authentication protocol has been a foundational component of Windows for over three decades.

The company has announced a phased roadmap to reduce, restrict, and ultimately disable NTLM by default in upcoming Windows releases, marking a significant evolution in Windows authentication security.

NTLM has long served as a fallback authentication mechanism when Kerberos is unavailable.

However, the protocol’s age and inherent cryptographic weaknesses make it vulnerable to replay, relay, and pass-the-hash attacks.

Microsoft’s Three-Phase Transition Plan(source: Microsoft)
Microsoft’s Three-Phase Transition Plan(source: Microsoft)

Three-Phase Roadmap for Smooth Transition

As modern security threats continue to evolve, NTLM’s susceptibility to these attack vectors poses significant risks to enterprise environments.

Microsoft’s decision to disable NTLM by default reflects the need to adopt stronger, Kerberos-based authentication mechanisms that align with contemporary security standards.

The transition follows a three-phase approach designed to minimize organizational disruption.

Phase Timeline Key Focus Details
Phase 1 Available now Visibility & Auditing Shows where NTLM is used across systems.
Phase 2 Second half of 2026 Reduce NTLM Usage Enables Kerberos in NTLM fallback cases.
Phase 3 Future Windows release Disable by Default NTLM off by default with legacy support.

Importantly, Microsoft will provide built-in support for handling legacy NTLM-only scenarios. Minimizing application breakage for organizations with older systems or custom applications.

Backward Compatibility Maintained During Migration

The company emphasizes that disabling NTLM by default does not mean complete removal.

NTLM will remain present in the operating system and can be re-enabled via policy if necessary, ensuring backward compatibility during the transition period.

This approach balances meaningful security improvements with practical organizational needs.

Organizations should begin preparing now by deploying enhanced NTLM auditing, mapping application dependencies, and migrating workloads to Kerberos.

Testing NTLM-disabled configurations in non-production environments. Microsoft encourages enterprises to engage identity, security, and application owners to ensure smooth transitions.

For organizations facing unique NTLM-dependent scenarios, Microsoft has established ntlm@microsoft[.]com as a point of contact.

This phased, collaborative approach positions Windows for a more secure, passwordless future while maintaining supported migration pathways for enterprise environments.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Mozilla Unveils Kill Switch to Disable All Firefox AI Features

Next Post

New Compliance Email Phishing Steals Sensitive Data via

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Hackers Deliver Malware via Fake DeepSeek TUI GitHub Rep
May 11, 2026
Cybercrime Network Takedown Exposes 22, Crimenetwork Users
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us