mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 23:07:23 +00:00
Update network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md
it seems typo. SMB replay > SMB relay
This commit is contained in:
parent
6fb9530bc0
commit
0f58ba9da6
@ -94,7 +94,7 @@ There are no security audit event policies that can be configured to view event
|
||||
|
||||
This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation.
|
||||
|
||||
NTLM and NTLMv2 authentication is vulnerable to various malicious attacks, including SMB replay, man-in-the-middle attacks, and brute force attacks. Reducing and eliminating NTLM authentication from your environment forces the Windows operating system to use more secure protocols, such as the Kerberos version 5 protocol, or different authentication mechanisms, such as smart cards.
|
||||
NTLM and NTLMv2 authentication is vulnerable to various malicious attacks, including SMB relay, man-in-the-middle attacks, and brute force attacks. Reducing and eliminating NTLM authentication from your environment forces the Windows operating system to use more secure protocols, such as the Kerberos version 5 protocol, or different authentication mechanisms, such as smart cards.
|
||||
|
||||
### Vulnerability
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user