--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/50df1060-acbb-440c-a178-8b4c327902fan%40googlegroups.com.
Hi Jonathan,
Not sure if the below link gives some light to your issue!
Kind regards
Sutha
Instead of simply disabling the GP to revert back to the enabling NTLM, change the GP to explicitly allow NTLM since in some cases disabling the GP doesn’t revert the computer back to the original configuration and an explicit configuration change is needed.
Also consider enabling NTLM auditing to help identify what NTLM usage is being observed (3 settings under gpedit.msc | Windows Settings | Local Policies | Security Options | Network security: Restrict NTLM: Audit* and “Outgoing NTLM traffic to remote servers”).
Something I’ve used when troubleshooting with Protected Users (this also disables NTLM along with other weak ciphers and enforces Kerberos) is to enable the logs under Applications and Services Logs | Microsoft | Windows | Authentication. I don’t know if these are populated when Protected Users are not used though.
Note that non domain joined clients can often connect but the UPN needs to be used instead of just netbiosdomain\username.
-Aakash Shah
--
I can confirm simply disabling the policy doesn’t revert settings for all machines and NTLM needs to be set to allowed again. I ran into that a while back..
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Aakash Shah
Sent: Thursday, November 13, 2025 2:27 AM
To: ntsys...@googlegroups.com
Subject: RE: [ntsysadmin] NTLM authentication problem
This message was sent by someone outside of The Citizens Bank. Please be cautious when opening attachments or clicking links.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/IA2P221MB1453A46E34CFD3655FCC3AB3F2CDA%40IA2P221MB1453.NAMP221.PROD.OUTLOOK.COM.
Change RDP over to Kerberos. Do you have the instructions for doing so?
I’m in the process of working on building some knowledge as that’s on the To Do List for all managed properties. So, my references are pretty bare at the moment.
Philip Elder MCTS
Senior Technical Architect
Microsoft High Availability MVP
MPECS Inc.
E-mail: Phili...@mpecsinc.ca
Phone: +1 (780) 458-2028
Web: www.mpecsinc.com
Blog: blog.mpecsinc.com
Twitter: Twitter.com/MPECSInc
Teams: Phili...@MPECSInc.Cloud
Please note: Although we may sometimes respond to email, text and phone calls instantly at all hours of the day, our regular business hours are 8:00 AM - 5:00 PM, Monday thru Friday.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Jonathan Leslie
Sent: Wednesday, November 12, 2025 19:54
To: ntsysadmin <ntsys...@googlegroups.com>
Subject: [ntsysadmin] NTLM authentication problem
On a small domain I manage I enacted a GP that disabled NTLM authentication. Since then I've disabled the policy to revert things back to the way they were, but now I'm still having a problem with non-domain computers and printers being unable to either map to domain shares or RDP to domain systems.
--
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/07e7483f-bec6-46fa-bf6f-b8587f3e8ff3n%40googlegroups.com.
I’m working on that but the caveat is that I’ve not found a Microsoft property that outlines _how_ to get it set up. ☹
I’ve just been told to do it by security folks.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/07e7483f-bec6-46fa-bf6f-b8587f3e8ff3n%40googlegroups.com.
On Nov 14, 2025, at 6:34 AM, Jonathan Leslie <jples...@gmail.com> wrote:
Okay the policy "Network security:Restrict NTLM: Incoming NTLM traffic" I changed to Allow all, the policy "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers" I changed to Audit all. The policy "Network security: LAN Manager authentication level" has been set for a long time to Send NTLMv2 response only. Refuse LM & NTLM.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/33bd4233-44d4-43ed-aa83-0bac0cb9e416n%40googlegroups.com.
Jump into the registry on the affected member servers / DCs. You may need to toggle the setting manually for them to pay attention to GPO again.
HKLM\System\CurrentControlSet\Control\Lsa\MSV1_0\
Dword: RestrictReceivingNTLMTraffic
0 allows all
Dword: restrictsendingntlmtraffic
1 sets audit all
I suggest verifying this before implementing, but this should be what you’re looking for.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of James Iversen
Sent: Friday, November 14, 2025 7:19 AM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] NTLM authentication problem
This message was sent by someone outside of The Citizens Bank. Please be cautious when opening attachments or clicking links.
have you rebooted your domain controllers after making the change back? Because it has to do with an encryption setting, the course of action may require reboot for new “allow all” setting to be recognized.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/E37ECEE9-DF72-4D2C-A02D-397C372F769F%40gmail.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/33bd4233-44d4-43ed-aa83-0bac0cb9e416n%40googlegroups.com.
There must be something else going on there.
Every client we manage, along with our own company, has mostly workgroup Windows machines connecting to their RD Farms. None have an issue.
So, change everything back to the original defaults before any changes were made.
Move over to a lab setup with your DC and RD servers recovered and stand up a couple of VMs to use as client machines. You can either leave them all in a Private network or set up WANEm and a central DNS server to mimic remote connectivity. Use Untangle, a free trial of SonicWALL NSv, or RRAS in Windows Server 2008 R2 as your firewall (two vNICs LAN and WAN).
It’s important to figure out where in the chain the link is getting broken and that ain’t on production.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/33bd4233-44d4-43ed-aa83-0bac0cb9e416n%40googlegroups.com.
Check your domain controller registry settings too if you haven’t already. In our case, making a GPO change on one didn’t replicate to the others.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Jonathan Leslie
Sent: Friday, November 14, 2025 8:18 AM
To: ntsysadmin <ntsys...@googlegroups.com>
Subject: Re: [ntsysadmin] NTLM authentication problem
This message was sent by someone outside of The Citizens Bank. Please be cautious when opening attachments or clicking links.
I hadn't thought of that, thanks, doing it now.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/9ca5844f-e1aa-479c-92e2-3e8f635c61d0n%40googlegroups.com.
As a side-note, I believe that this situation is aptly called a “Group Policy Tattoo” of the settings into the OS.
There are plenty of them. Ask me how I know! 😉
Philip Elder MCTS
Senior Technical Architect
Microsoft High Availability MVP
MPECS Inc.
E-mail: Phili...@mpecsinc.ca
Phone: +1 (780) 458-2028
Web: www.mpecsinc.com
Blog: blog.mpecsinc.com
Twitter: Twitter.com/MPECSInc
Teams: Phili...@MPECSInc.Cloud
Please note: Although we may sometimes respond to email, text and phone calls instantly at all hours of the day, our regular business hours are 8:00 AM - 5:00 PM, Monday thru Friday.
From: 'Eric Pagan' via ntsysadmin <ntsys...@googlegroups.com>
Sent: Friday, November 14, 2025 14:39
To: ntsys...@googlegroups.com
Subject: RE: [ntsysadmin] NTLM authentication problem
Check your domain controller registry settings too if you haven’t already. In our case, making a GPO change on one didn’t replicate to the others.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/7be40bf4-07b5-4dff-9263-c840b964ffben%40googlegroups.com.