NTLM Elimination

๐Ÿ”’ Secure Bits ๐Ÿ’ก
๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐˜๐—ฟ๐—ฎ๐—ฐ๐—ธ ๐—ก๐—ง๐—Ÿ๐—  ๐˜‚๐˜€๐—ฎ๐—ด๐—ฒ ๐—ฏ๐—ฒ๐—ณ๐—ผ๐—ฟ๐—ฒ ๐—ฒ๐—ป๐—ณ๐—ผ๐—ฟ๐—ฐ๐—ถ๐—ป๐—ด/๐—ฑ๐—ถ๐˜€๐—ฎ๐—ฏ๐—น๐—ถ๐—ป๐—ด ๐—ถ๐˜?

NTLM is a legacy protocol thatโ€™s still hanging around in many environments โ€” and itโ€™s a ๐—ฝ๐—ผ๐—ฝ๐˜‚๐—น๐—ฎ๐—ฟ ๐˜๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜ ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ๐˜€. But enforcing strict NTLM restrictions without auditing first? ๐—ง๐—ต๐—ฎ๐˜โ€™๐˜€ ๐—ฎ ๐—ฟ๐—ฒ๐—ฐ๐—ถ๐—ฝ๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—ผ๐˜‚๐˜๐—ฎ๐—ด๐—ฒ๐˜€.

๐—›๐—ฒ๐—ฟ๐—ฒโ€™๐˜€ ๐—ต๐—ผ๐˜„ ๐˜๐—ผ ๐—ฝ๐—ฟ๐—ผ๐—ฐ๐—ฒ๐—ฒ๐—ฑ ๐˜๐—ต๐—ฒ ๐—ฟ๐—ถ๐—ด๐—ต๐˜ ๐˜„๐—ฎ๐˜†:
๐Ÿ“Œย ย ๐—ข๐—ฝ๐˜๐—ถ๐—ผ๐—ปย ๐Ÿญ: ๐—˜๐—ป๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ก๐—ง๐—Ÿ๐—  ๐—”๐˜‚๐—ฑ๐—ถ๐˜๐—ถ๐—ป๐—ด
Use these GPOs to track NTLM on the Domain Controller side:
Security Settings\Local Policies\Security Options\
โ†’ Network security: Restrict NTLM: Audit incoming NTLM traffic
โ†’ Network security: Restrict NTLM: Audit NTLM authentication in this domain

โœ… These give you Event IDs:ย ๐Ÿด๐Ÿฌ๐Ÿฌ๐Ÿฎ, ๐Ÿด๐Ÿฌ๐Ÿฌ๐Ÿฏ, ๐—ฎ๐—ป๐—ฑ ๐Ÿด๐Ÿฌ๐Ÿฌ๐Ÿฐ. This way you can track NTLM through your domain controllers – no need to collect 4624 on every device.

โš ๏ธ ๐——๐—ฟ๐—ฎ๐˜„๐—ฏ๐—ฎ๐—ฐ๐—ธ:ย  They donโ€™t show ๐˜„๐—ต๐—ถ๐—ฐ๐—ต ๐—ก๐—ง๐—Ÿ๐—  ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ถ๐—ผ๐—ปย is used โ€” so theyโ€™re great for auditing overall NTLM usage, but not ideal for enforcingย NTLMv2 only.

๐Ÿ“Œย ๐—ข๐—ฝ๐˜๐—ถ๐—ผ๐—ป ๐Ÿฎ: ๐—–๐—ผ๐—น๐—น๐—ฒ๐—ฐ๐˜ ๐Ÿฐ๐Ÿฒ๐Ÿฎ๐Ÿฐ ๐—Ÿ๐—ผ๐—ด๐˜€ ๐—ผ๐—ป ๐—ฎ๐—น๐—น ๐—ฑ๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€
Event IDย 4624ย logs on the machine where the user authenticates โ€” thisย doesย ๐—ถ๐—ป๐—ฐ๐—น๐˜‚๐—ฑ๐—ฒ ๐˜๐—ต๐—ฒ ๐—ก๐—ง๐—Ÿ๐—  ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ถ๐—ผ๐—ป and it tells you if NTLMv1 or v2 was used โ€” great for planning phased enforcement.
Pair this with Event IDย 4776ย on DCs (less useful alone), and youโ€™ll get the full picture.

๐Ÿ“Œย ๐—ข๐—ฝ๐˜๐—ถ๐—ผ๐—ป ๐Ÿฏ: ๐—ช๐—ฎ๐˜๐—ฐ๐—ต ๐—ณ๐—ผ๐—ฟ ๐—˜๐—ป๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐—ก๐—ง๐—Ÿ๐—  ๐—”๐˜‚๐—ฑ๐—ถ๐˜๐—ถ๐—ป๐—ด (๐—–๐—ผ๐—บ๐—ถ๐—ป๐—ด ๐—ฆ๐—ผ๐—ผ๐—ป)
A new NTLM auditing mode is on the way inย Windows 11 24H2ย andย Windows Server 2025.
This will finally logย who,ย why, andย whereย โ€” ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—น๐˜† ๐—ผ๐—ป ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—–๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น๐—น๐—ฒ๐—ฟ๐˜€ โ€” ๐—ฎ๐—ป๐—ฑ ๐—ฒ๐˜ƒ๐—ฒ๐—ป ๐˜€๐—ต๐—ผ๐˜„ ๐˜๐—ต๐—ฒ ๐—ก๐—ง๐—Ÿ๐—  ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ถ๐—ผ๐—ป. ๐ŸŽฏ
Itโ€™s not fully rolled out yet, but GPO options are already appearing.

๐Ÿง  ๐—ง๐—ฎ๐—ธ๐—ฒ๐—ฎ๐˜„๐—ฎ๐˜†:
โ†’ Start with auditing.
โ†’ Find whatโ€™s still using NTLM, identify NTLMv1 accounts, andย phase outย usage safely.

๐Ÿ’ฌ Are you planning to enforce NTLMv2 or eliminate NTLM entirely?