{"id":15720,"date":"2020-04-14T09:33:08","date_gmt":"2020-04-14T09:33:08","guid":{"rendered":"https:\/\/www.top-password.com\/blog\/?p=15720"},"modified":"2020-04-14T09:42:48","modified_gmt":"2020-04-14T09:42:48","slug":"prevent-ntlm-credentials-from-being-sent-to-remote-servers","status":"publish","type":"post","link":"https:\/\/www.top-password.com\/blog\/prevent-ntlm-credentials-from-being-sent-to-remote-servers\/","title":{"rendered":"2 Ways to Prevent NTLM Credentials from Being Sent to Remote Servers"},"content":{"rendered":"<p>When you try to access a web page which contains a file hosted on a SMB server, Windows automatically sends your user name and NTLM credentials to authenticate. Although the credentials are not sent in clear-text, the attacker can crack them to recover your Windows password. To avoid leaking your account credentials, you can block NTLM (allowing only Kerberos) so Windows will no longer send your NTLM credentials to remote servers.<\/p>\n<p><strong>Method 1: Restrict Outgoing NTLM Traffic Using Group Policy<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/www.top-password.com\/blog\/open-local-group-policy-editor-in-windows-10\/\" rel=\"noopener noreferrer\" target=\"_blank\">Open the Local Group Policy Editor<\/a> and navigate to: <code>Computer Configuration -&gt; Windows Settings -&gt; Security Settings -&gt; Local Policies -&gt; Security Options<\/code>. On the right pane, double-click the &#8220;<strong>Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers<\/strong>&#8221; policy.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/restrict-outgoing-ntlm-traffic.png\" alt=\"\" width=\"599\" height=\"365\" class=\"alignnone size-full wp-image-15734\" srcset=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/restrict-outgoing-ntlm-traffic.png 599w, https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/restrict-outgoing-ntlm-traffic-300x183.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/>\n<\/li>\n<li>Select <strong>Deny all<\/strong> from the drop-download list, click <strong>Apply<\/strong> and then <strong>OK<\/strong>.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/prevent-sending-ntlm-to-remote-server.png\" alt=\"\" width=\"417\" height=\"450\" class=\"alignnone size-full wp-image-15735\" srcset=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/prevent-sending-ntlm-to-remote-server.png 417w, https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/prevent-sending-ntlm-to-remote-server-278x300.png 278w\" sizes=\"auto, (max-width: 417px) 100vw, 417px\" \/>\n<\/li>\n<li>Reboot your computer and Windows will no longer automatically send your NTLM credentials to a remote server when accessing a share.<\/li>\n<li>If you need to add some remote servers to a whitelist, double-click on the &#8220;<strong>Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication<\/strong>&#8221; policy.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/exceptions-for-ntlm-authentication.png\" alt=\"\" width=\"599\" height=\"365\" class=\"alignnone size-full wp-image-15737\" srcset=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/exceptions-for-ntlm-authentication.png 599w, https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/exceptions-for-ntlm-authentication-300x183.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/>\n<\/li>\n<li>Add the remote servers to the list of exceptions, click <strong>Apply<\/strong> and then <strong>OK<\/strong>.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/remote-server-exceptions-for-ntlm.png\" alt=\"\" width=\"417\" height=\"450\" class=\"alignnone size-full wp-image-15738\" srcset=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/remote-server-exceptions-for-ntlm.png 417w, https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/remote-server-exceptions-for-ntlm-278x300.png 278w\" sizes=\"auto, (max-width: 417px) 100vw, 417px\" \/>\n<\/li>\n<\/ol>\n<p><strong>Method 2: Restrict Outgoing NTLM Traffic Using Registry Tweak<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/www.top-password.com\/blog\/6-ways-to-open-registry-editor-in-windows-10\/\" rel=\"noopener noreferrer\" target=\"_blank\">Open Registry Editor<\/a> and browse to: <code>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\MSV1_0<\/code>. Right-click on the <strong>MSV1_0<\/strong> key, select <strong>New<\/strong> -&gt; <strong>DWORD (32-bit) Value<\/strong>.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/MSV1_0-new-dword.png\" alt=\"\" width=\"537\" height=\"340\" class=\"alignnone size-full wp-image-15739\" srcset=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/MSV1_0-new-dword.png 537w, https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/MSV1_0-new-dword-300x190.png 300w\" sizes=\"auto, (max-width: 537px) 100vw, 537px\" \/>\n<\/li>\n<li>Name the newly created DWORD <strong>RestrictSendingNTLMTraffic<\/strong>, then double-click it to set the value data to 2 and click OK.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/restrict-sending-NTLM-traffic.png\" alt=\"\" width=\"597\" height=\"398\" class=\"alignnone size-full wp-image-15740\" srcset=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/restrict-sending-NTLM-traffic.png 597w, https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/restrict-sending-NTLM-traffic-300x200.png 300w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/>\n<\/li>\n<li>If you want to add certain servers that you wish to whitelist, use the similar method to create a new DWORD named <strong>ClientAllowedNTLMServers<\/strong>. Double-click it and add remote servers which you allow sending NTLM credentials to.\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/client-allowed-NTLM-servers.png\" alt=\"\" width=\"597\" height=\"476\" class=\"alignnone size-full wp-image-15741\" srcset=\"https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/client-allowed-NTLM-servers.png 597w, https:\/\/www.top-password.com\/blog\/wp-content\/uploads\/2020\/04\/client-allowed-NTLM-servers-300x239.png 300w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/>\n<\/li>\n<li>Reboot your computer to apply the changes. You can continue accessing files on remote servers which are whitelisted while stopping Windows from potentially sending your NTLM credentials over the network.<\/li>\n<\/ol>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>When you try to access a web page which contains a file hosted on a SMB server, Windows automatically sends your user name and NTLM credentials to authenticate. Although the credentials are not sent in clear-text, the attacker can crack them to recover your Windows password. To avoid leaking your account credentials, you can block [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,10,1894,3,39],"tags":[4446,4447],"class_list":["post-15720","post","type-post","status-publish","format-standard","hentry","category-others","category-tips-tricks","category-windows-10","category-windows-7","category-windows-8","tag-disable-ntlm-authentication","tag-restrict-outgoing-ntlm-traffic-to-remote-servers"],"_links":{"self":[{"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/posts\/15720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/comments?post=15720"}],"version-history":[{"count":7,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/posts\/15720\/revisions"}],"predecessor-version":[{"id":15742,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/posts\/15720\/revisions\/15742"}],"wp:attachment":[{"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/media?parent=15720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/categories?post=15720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.top-password.com\/blog\/wp-json\/wp\/v2\/tags?post=15720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}