Default NTLM relay attack protections introduced by Microsoft

Share This Post



SecurityWeek reports that Microsoft has moved to better combat NTLM relay attacks by standardizing the implementation of Extended Protection for Authentication in Windows Server 2025 and Azure Directory Certificate Services, as well as channel binding for the Lightweight Directory Access Protocol, after enabling EPA by default in Exchange Server 2019 earlier this year.

Both features could be manually activated by Windows Server 2022 and 2019 admins, while those using Exchange Server 2016 could use a script to enable EPA, according to Microsoft, which also disapproved NTLMv2 and removed NTLMv1 from Windows 11 24H2 and Windows Server 2025. “As we progress towards disabling NTLM by default, immediate, short-term changes, such as enabling EPA in Exchange Server, AD CS, and LDAP reinforce a ‘secure by default’ posture and safeguard users from real-world attacks. We look forward to investing in more secure-by-default NTLM hardening measures across supported versions in the near future,” said Microsoft.

Get essential knowledge and practical strategies to fortify your applications.



Source link

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Do You Want To Boost Your Business?

drop us a line and keep in touch