Disabling NTLMv1 on your domain controllers is a common hardening step, but there are some considerations to take into account:
- Authentication Failures: Any clients, applications, or devices that still attempt to authenticate using NTLMv1 (and don't support newer authentication methods) will fail to log on.
- Legacy Systems Impacted: Old Windows versions (Windows 2000, XP without updates, Server 2003, and some embedded/IoT devices) rely on NTLMv1. These will not be able to authenticate.
- Non-Windows Devices: Older Linux Samba clients, network appliances (storage devices, printers, copiers, NAS systems, VPN appliances) might also fail if they only support NTLMv1.
- Service Accounts and Apps: Some legacy applications coded to use NTLMv1 (e.g., old SQL clients, middleware, third-party apps) will break.
Regarding best practices
- Audit first (do not disable yet)
- In Group Policy, set the Network Security: Restrict NTLM: Audit NTLM authentication in this domain to Audit mode.
- Collect logs from the DCs (Security Event Log, Event IDs 4624, 4625, and NTLM-specific logs).
- Identify which systems still use NTLMv1.
- Remediate legacy dependencies
- Upgrade or patch systems/applications that still use NTLMv1.
- For non-Windows devices, check firmware/software updates to support NTLMv2 or Kerberos.
- If something cannot be upgraded, plan for exceptions (though not ideal).
- Then disable NTLMv1
- In GPO → Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options
- Set Network security: LAN Manager authentication level to Send NTLMv2 response only. Refuse LM & NTLM.
- This enforces NTLMv2 only.
- Monitor after enforcement
- Keep auditing after rollout.
- Ensure all business-critical systems can still authenticate.
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
hth
Marcin