Muokkaa

Jaa


Block NTLM connections on SMB

The SMB client now supports blocking NTLM authentication for remote outbound connections. Blocking NTLM authentication prevents bad actors from tricking clients into sending NTLM requests to malicious servers, counteracting brute force, cracking, and pass-the-hash attacks. NTLM blocking is also required for switching an organization's authentication protocols to Kerberos, which is more secure than NTLM because it can verify server identities with its ticket system. However, organizations can also enable this layer of protection without having to disable NTLM entirely.

Prerequisites

NTLM blocking for the SMB client requires the following prerequisites:

  • An SMB client running on one of the following operating systems.
    • Windows Server 2025 or later.
    • Windows 11, version 24H2 or later.
  • An SMB server that allows using Kerberos.

Tip

NTLM blocking is an SMB client capability only. The SMB client is built into both Windows Server and Windows client operating systems. The destination SMB server can be any operating system where PKU2U or kerberos can be used.

Configure SMB client NTLM blocking

Starting with Windows Server 2025 and Windows 11, version 24H2, you have the option to configure SMB to block NTLM. To improve the security of deployments running earlier versions of Windows, you must disable NTLM manually, either by editing the relevant Group Policy or running a specific command in PowerShell.

To configure NTLM blocking:

  1. Open the Group Policy Management Console.

  2. In the console tree, go to Computer Configuration > Administrative Templates > Network > Lanman Workstation.

  3. Right-click Block NTLM (LM, NTLM, NTLMv2) and select Edit.

  4. Select Enabled.

Enable exceptions to NTLM blocking

There might be scenarios where you need to allow certain machines to use NTLM instead of blocking it globally. For example, when the SMB server you're trying to connect to isn't joined to an Active Directory domain.

To enable a list of exceptions to NTLM blocking:

  1. In the Group Policy Editor Console tree, go to Computer Configuration > Administrative Templates > Network > Lanman Workstation.

  2. Right-click Block NTLM Server Exception List and select Edit.

  3. Select Enabled.

  4. Enter the IP addresses, NetBIOS names, and fully qualified domain names (FQDNs) of the remote machines you want to allow NTLM authentication to.

Block NTLM while mapping SMB drives

You can also block NTLM when mapping new SMB drives by running the following commands.

Run this command to specify NTLM blocking when mapping a drive with NET USE:

NET USE \\server\share /BLOCKNTLM

Run this command to specify NTLM blocking when mapping an SMB drive:

New-SmbMapping -RemotePath \\server\share -BlockNTLM $true