Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Posted on February 2, 2026February 2, 2026 By CWS

Ravie LakshmananFeb 02, 2026Kerberos / Enterprise Safety
Microsoft has introduced a three-phase method to section out New Know-how LAN Supervisor (NTLM) as a part of its efforts to shift Home windows environments towards stronger, Kerberos-based choices.
The event comes greater than two years after the tech big revealed its plans to deprecate the legacy expertise, citing its susceptibility to weaknesses that would facilitate relay assaults and permit dangerous actors to realize unauthorized entry to community assets. NTLM was formally deprecated in June 2024 and not receives updates.
“NTLM consists of safety protocols initially designed to offer authentication, integrity, and confidentiality to customers,” Mariam Gewida, Technical Program Supervisor II at Microsoft, defined. “Nonetheless, as safety threats have developed, so have our requirements to satisfy fashionable safety expectations. Right this moment, NTLM is vulnerable to varied assaults, together with replay and man-in-the-middle assaults, because of its use of weak cryptography.”
Regardless of the deprecated standing, Microsoft stated it continues to search out using NTLM prevalent in enterprise environments the place fashionable protocols like Kerberos can’t be carried out because of legacy dependencies, community limitations, or ingrained software logic. This, in flip, exposes organizations to safety dangers, corresponding to replay, relay, and pass-the-hash assaults.

To mitigate this downside in a safe method, the corporate has adopted a three-phase technique that paves the best way for NTLM to be disabled by default –

Section 1: Constructing visibility and management utilizing enhanced NTLM auditing to higher perceive the place and why NTLM continues to be getting used (Obtainable now)
Section 2: Addressing frequent roadblocks that stop a migration to NTLM via options like IAKerb and native Key Distribution Heart (KDC) (pre-release), in addition to updating core Home windows elements to prioritize Kerberos authentication (Anticipated in H2 2026)
Section 3: Disabling NTLM within the subsequent model of Home windows Server and related Home windows shopper, and requiring express re-enablement via new coverage controls

Microsoft has positioned the transition as a significant step towards a passwordless, phishing-resistant future. This additionally requires organizations counting on NTLM to conduct audits, map dependencies, migrate to Kerberos, take a look at NTLM-off configurations in non-production environments, and allow Kerberos upgrades.
“Disabling NTLM by default doesn’t imply utterly eradicating NTLM from Home windows but,” Gewida stated. “As an alternative, it implies that Home windows will likely be delivered in a secure-by-default state the place community NTLM authentication is blocked and not used mechanically.”
“The OS will desire fashionable, safer Kerberos-based options. On the similar time, frequent legacy situations will likely be addressed via new upcoming capabilities corresponding to Native KDC and IAKerb (pre-release).”

The Hacker News Tags:Begins, Kerberos, Microsoft, Move, NTLM, PhaseOut, Plan, ThreeStage, Windows

Post navigation

Previous Post: ShinyHunters-Branded Extortion Activity Expands, Escalates
Next Post: OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link

Related Posts

Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; M Stolen in Crypto Heist Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist The Hacker News
Evolving Enterprise Defense to Secure the Modern AI Supply Chain Evolving Enterprise Defense to Secure the Modern AI Supply Chain The Hacker News
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature The Hacker News
How the Browser Became the Main Cyber Battleground How the Browser Became the Main Cyber Battleground The Hacker News
AI Automation Exploits, Telecom Espionage, Prompt Poaching & More AI Automation Exploits, Telecom Espionage, Prompt Poaching & More The Hacker News
New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News