NTLM

Winsage
March 2, 2026
The migration from NTLM to Kerberos authentication is essential for improving security in Windows systems, but it faces challenges such as legacy systems and hardcoded authentication. Organizations must identify NTLM usage, conduct testing with NTLM disabled, and make necessary adjustments or upgrades to migrate successfully. Ongoing monitoring is crucial post-migration to prevent NTLM from re-entering the network. NTLM is associated with significant security vulnerabilities and has been exploited by various threat groups, making its elimination a priority for organizations despite potential hesitations to invest in the migration process. Transitioning to Kerberos is seen as a strategic security investment.
Winsage
January 30, 2026
Microsoft will disable the NTLM authentication protocol by default in the next major Windows Server release and associated Windows client versions. NTLM, introduced in 1993, has been vulnerable to various cyberattacks, including NTLM relay and pass-the-hash attacks. The transition plan includes three phases: enhanced auditing tools in Windows 11 24H2 and Windows Server 2025, new features like IAKerb and a Local Key Distribution Center in late 2026, and eventually disabling network NTLM by default in future releases. NTLM will remain in the operating system but will not be used automatically. Microsoft deprecated NTLM authentication in July 2024 and has encouraged developers to transition to Kerberos or Negotiation authentication.
Winsage
October 26, 2025
Microsoft has disabled the preview feature for files downloaded from the internet in the File Explorer Preview pane for Windows 11 versions 25H2 and 24H2, as well as in the latest Windows 10 update, due to security concerns. Users can still preview locally created files, but attempting to preview internet-downloaded files will trigger a warning message. The decision to disable previews for these files is intended to prevent potential security vulnerabilities, specifically a risk of NTLM hash leaks. Files marked with a “Mark of the Web (MotW)” tag, which indicates they were downloaded from various sources, will be blocked from previewing. Users can unblock previews for trusted files by right-clicking the file, selecting Properties, and checking the ‘Unblock’ option. A PowerShell script is also available to unblock all files in a specific directory. This update is part of the Windows October 2025 Patch Tuesday.
Winsage
October 24, 2025
Microsoft has introduced a feature that requires unique Security Identifiers (SIDs) across systems, effective August 29, 2025, impacting users who previously cloned images with duplicate SIDs for Kerberos or NTLM connections. This change has led to SECENO_CREDENTIALS errors in the Event Viewer and other reported issues. Microsoft recommends using the Sysprep tool for fresh machine setups. A workaround exists through a Group Policy setting that allows duplicate SIDs, but users must contact Microsoft support to access it, as it is not available by default. This update marks the third occurrence of authentication errors associated with Microsoft updates.
Winsage
October 24, 2025
Following the October 2025 Patch Tuesday updates, many Windows users experienced issues with the File Explorer preview pane, which stopped functioning for several file types. This change, implemented by Microsoft as a security enhancement, affects both Windows 11 and Windows 10 and is linked to a vulnerability associated with NTLM credential hashes. The updates, KB5066835 for Windows 11 and KB5066791 for Windows 10, disable the preview functionality for files marked with the "Mark of the Web" (MotW), indicating they originated from the internet. Instead of a preview, users receive a warning message about potential harm from the file. Microsoft has provided workarounds for users who wish to restore the preview functionality, including manually unblocking files or adjusting security settings for network shares, though these methods come with security risks. This change reflects a broader industry trend toward prioritizing security over user convenience.
Winsage
October 24, 2025
Microsoft has enhanced its File Explorer to improve user security against credential theft attacks by automatically blocking previews for files downloaded from the Internet. This update is active for users who have installed the latest Patch Tuesday security updates on Windows 11 and Windows Server systems. The preview functionality will be disabled by default for files accessed on an Internet Zone file share and those marked with the Mark of the Web (MotW). When users attempt to preview such files, a cautionary message will appear, warning that the file could harm their computer. This measure addresses vulnerabilities that could allow attackers to capture NTLM hashes through HTML tags in malicious files. Starting with security updates released on or after October 14, 2025, the preview feature will be automatically disabled for internet-downloaded files to further mitigate risks. Users can manually remove the block for trusted files by right-clicking the file, selecting Properties, and clicking the "Unblock" button. Additionally, the block can be lifted for all files on an Internet Zone file share by adding the file share’s address to the Trusted sites or Local intranet security zone in the Internet Options control panel.
Search