Disable NTLMv1 in group policy

Seema Kanwal Gurmani 336 Reputation points
2025-08-28T09:36:11.21+00:00

Dear Community,

I want to enable below settings:

Disable NTLMv1 in domain controllers using Group Policy Management Console (GPMC).

What will be impact of doing this setting in GPO?

What is the best practice?

Microsoft Security | Active Directory Federation Services
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Marcin Policht 54,995 Reputation points MVP Volunteer Moderator
    2025-08-28T11:38:05.1433333+00:00

    Disabling NTLMv1 on your domain controllers is a common hardening step, but there are some considerations to take into account:

    • Authentication Failures: Any clients, applications, or devices that still attempt to authenticate using NTLMv1 (and don't support newer authentication methods) will fail to log on.
    • Legacy Systems Impacted: Old Windows versions (Windows 2000, XP without updates, Server 2003, and some embedded/IoT devices) rely on NTLMv1. These will not be able to authenticate.
    • Non-Windows Devices: Older Linux Samba clients, network appliances (storage devices, printers, copiers, NAS systems, VPN appliances) might also fail if they only support NTLMv1.
    • Service Accounts and Apps: Some legacy applications coded to use NTLMv1 (e.g., old SQL clients, middleware, third-party apps) will break.

    Regarding best practices

    1. Audit first (do not disable yet)
      • In Group Policy, set the Network Security: Restrict NTLM: Audit NTLM authentication in this domain to Audit mode.
      • Collect logs from the DCs (Security Event Log, Event IDs 4624, 4625, and NTLM-specific logs).
      • Identify which systems still use NTLMv1.
    2. Remediate legacy dependencies
      • Upgrade or patch systems/applications that still use NTLMv1.
      • For non-Windows devices, check firmware/software updates to support NTLMv2 or Kerberos.
      • If something cannot be upgraded, plan for exceptions (though not ideal).
    3. Then disable NTLMv1
      • In GPO → Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options
      • Set Network security: LAN Manager authentication level to Send NTLMv2 response only. Refuse LM & NTLM.
      • This enforces NTLMv2 only.
    4. Monitor after enforcement
      • Keep auditing after rollout.
      • Ensure all business-critical systems can still authenticate.

    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.