By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
Computing

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

News Room
Last updated: 2026/02/02 at 11:16 AM
News Room Published 2 February 2026
Share
Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
SHARE

Ravie LakshmananFeb 02, 2026Kerberos / Enterprise Security

Microsoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options.

The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that could facilitate relay attacks and allow bad actors to gain unauthorized access to network resources. NTLM was formally deprecated in June 2024 and no longer receives updates.

“NTLM consists of security protocols originally designed to provide authentication, integrity, and confidentiality to users,” Mariam Gewida, Technical Program Manager II at Microsoft, explained. “However, as security threats have evolved, so have our standards to meet modern security expectations. Today, NTLM is susceptible to various attacks, including replay and man-in-the-middle attacks, due to its use of weak cryptography.”

Despite the deprecated status, Microsoft said it continues to find the use of NTLM prevalent in enterprise environments where modern protocols like Kerberos cannot be implemented due to legacy dependencies, network limitations, or ingrained application logic. This, in turn, exposes organizations to security risks, such as replay, relay, and pass-the-hash attacks.

Cybersecurity

To mitigate this problem in a secure manner, the company has adopted a three-phase strategy that paves the way for NTLM to be disabled by default –

  • Phase 1: Building visibility and control using enhanced NTLM auditing to better understand where and why NTLM is still being used (Available now)
  • Phase 2: Addressing common roadblocks that prevent a migration to NTLM through features like IAKerb and local Key Distribution Center (KDC) (pre-release), as well as updating core Windows components to prioritize Kerberos authentication (Expected in H2 2026)
  • Phase 3: Disabling NTLM in the next version of Windows Server and associated Windows client, and requiring explicit re-enablement through new policy controls

Microsoft has positioned the transition as a major step toward a passwordless, phishing-resistant future. This also requires organizations relying on NTLM to conduct audits, map dependencies, migrate to Kerberos, test NTLM-off configurations in non-production environments, and enable Kerberos upgrades.

“Disabling NTLM by default does not mean completely removing NTLM from Windows yet,” Gewida said. “Instead, it means that Windows will be delivered in a secure-by-default state where network NTLM authentication is blocked and no longer used automatically.”

“The OS will prefer modern, more secure Kerberos-based alternatives. At the same time, common legacy scenarios will be addressed through new upcoming capabilities such as Local KDC and IAKerb (pre-release).”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Ring brings its ‘Search Party’ feature for finding lost dogs to non-Ring camera owners |  News Ring brings its ‘Search Party’ feature for finding lost dogs to non-Ring camera owners | News
Next Article Airbnb Expands Global Checkout with “Pay as a Local,” Scaling to 220 Markets in 14 Months Airbnb Expands Global Checkout with “Pay as a Local,” Scaling to 220 Markets in 14 Months
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How to build your own Mac online? Hint: Apple Store
How to build your own Mac online? Hint: Apple Store
Mobile
Why Most Machine Learning Projects Fail to Reach Production
Why Most Machine Learning Projects Fail to Reach Production
News
This iPhone Fold sequel report could make you flip out
This iPhone Fold sequel report could make you flip out
Gadget
The HackerNoon Newsletter: Meet Deepgram: HackerNoon Company of the Week (2/2/2026) | HackerNoon
The HackerNoon Newsletter: Meet Deepgram: HackerNoon Company of the Week (2/2/2026) | HackerNoon
Computing

You Might also Like

The HackerNoon Newsletter: Meet Deepgram: HackerNoon Company of the Week (2/2/2026) | HackerNoon
Computing

The HackerNoon Newsletter: Meet Deepgram: HackerNoon Company of the Week (2/2/2026) | HackerNoon

3 Min Read
Git 2.53 Released With More Optimizations, One Step Closer To Making Rust Mandatory
Computing

Git 2.53 Released With More Optimizations, One Step Closer To Making Rust Mandatory

2 Min Read
Moniepoint went from PoS scale to full-stack lock-in in two years
Computing

Moniepoint went from PoS scale to full-stack lock-in in two years

14 Min Read
10 Secrets to Massive Pinterest Growth (In Just 10 Minutes a Day)
Computing

10 Secrets to Massive Pinterest Growth (In Just 10 Minutes a Day)

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?