--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/50df1060-acbb-440c-a178-8b4c327902fan%40googlegroups.com.
Hi Jonathan,
Not sure if the below link gives some light to your issue!
Kind regards
Sutha
Instead of simply disabling the GP to revert back to the enabling NTLM, change the GP to explicitly allow NTLM since in some cases disabling the GP doesn’t revert the computer back to the original configuration and an explicit configuration change is needed.
Also consider enabling NTLM auditing to help identify what NTLM usage is being observed (3 settings under gpedit.msc | Windows Settings | Local Policies | Security Options | Network security: Restrict NTLM: Audit* and “Outgoing NTLM traffic to remote servers”).
Something I’ve used when troubleshooting with Protected Users (this also disables NTLM along with other weak ciphers and enforces Kerberos) is to enable the logs under Applications and Services Logs | Microsoft | Windows | Authentication. I don’t know if these are populated when Protected Users are not used though.
Note that non domain joined clients can often connect but the UPN needs to be used instead of just netbiosdomain\username.
-Aakash Shah
--