NTLM Is Finally Being Put Out to Pasture... (Took Long Enough)
Jim Leone
2/4/20262 min read
For years, NTLM has been that one piece of technical debt everyone knew was dangerous… but no one wanted to touch. It wasn’t secure, it wasn’t modern, but hey... It was convenient.
And now, FINALLY, Microsoft is done pretending otherwise.
Microsoft has announced a three-phase plan to disable NTLM by default and move Windows environments toward Kerberos-first authentication. This time, it’s not a warning or a suggestion... it’s a roadmap with enforcement.
Honestly... Took long enough!
Why I Believe NTLM Had to Go (Even If It “Still Worked”)
NTLM isn’t just old, it’s structurally unsafe in modern networks. It was designed for an era when networks were flat, trust boundaries were assumed, and attackers weren’t living off the land with legitimate tools. If you fast-forward to today, NTLM enables...
Relay attacks
Pass-the-hash
Replay and man-in-the-middle attacks
Worse, it often operates silently, falling back when Kerberos should be used, without anyone noticing. That’s not backward compatibility, that’s an invisible attack surface. NTLM survived not because it was good, but because it masked underlying design flaws.
Some examples:
Bad DNS? NTLM still worked.
Broken SPNs? NTLM filled the gap.
Legacy apps nobody owned anymore? NTLM shrugged and carried on.
A dream scenario for attackers. Yet for years, most administrators simply learned to live with it. Microsoft did too... right up until it became indefensible.
Microsoft’s Three-Phase Exit Strategy (Jim's Translation)
Phase 1 - Visibility (Available Now)
I call this the “show me the mess” phase.
Enhanced NTLM auditing lets organizations finally find where NTLM still being used, by whom, and why Kerberos wasn’t chosen instead. My prediction: most enterprises will find far more NTLM than they expect.
Phase 2 - Removing the Old Excuses (H2 2026)
Yep... Microsoft is actively removing the most common reasons NTLM stuck around -->
IAKerb for complex network paths
Local KDC for local or edge scenarios
Core Windows components prioritizing Kerberos instead of quietly falling back
My Translation--> "You no longer get to say you had no choice."
Phase 3 - Secure by Default (Your Next Windows Server)
This is where Microsoft's tone FINALLY changed.
NTLM will now be disabled by default and explicitly re-enabled only via policy. If you turn it back on later, that risk belongs to you, not Microsoft. This isn’t just an authentication tweak, it’s a forced reduction of the credential attack surface. For defenders, this means fewer lateral movement paths, less credential reuse risk, clearer audit trails, and stronger alignment with zero-trust and phishing-resistant authentication. For attackers, the old Windows "easy mode” just got much harder.
What I Recommend You Do Now...
Your focus should be on enabling NTLM auditing now, mapping dependencies honestly, fixing misconfigurations masquerading as “legacy requirements”, and testing NTLM-off scenarios before Microsoft forces your hand.
Most NTLM usage disappears once DNS, SPNs, and service accounts are cleaned up. The rest? Those become explicit business risk decisions... exactly where they belong.
Microsoft is finally closing the door... politely, slowly, and with plenty of warning. If you’re proactive, this transition will make your environment more secure, more predictable, and much easier to defend. If you ignore it, you’ll continue debugging authentication failures at 2 a.m. wondering why “nothing changed.” Except... the change had already happened.
The IP HighWay
Stay updated with the latest IT security news.
info@iphwy.com
© 2025. IPHwy LLC. All rights reserved.



