7.3 KiB
title, description, ms.assetid, ms.pagetype, ms.prod, ms.mktglfcycl, ms.sitesec, author
title | description | ms.assetid | ms.pagetype | ms.prod | ms.mktglfcycl | ms.sitesec | author |
---|---|---|---|---|---|---|---|
Network security Allow Local System to use computer identity for NTLM (Windows 10) | Describes the location, values, policy management, and security considerations for the Network security Allow Local System to use computer identity for NTLM security policy setting. | c46a658d-b7a4-4139-b7ea-b9268c240053 | security | W10 | deploy | library | brianlic-msft |
Network security: Allow Local System to use computer identity for NTLM
Applies to
- Windows 10 Describes the location, values, policy management, and security considerations for the Network security: Allow Local System to use computer identity for NTLM security policy setting.
Reference
When services connect to devices that are running versions of the Windows operating system earlier than Windows Vista or Windows Server 2008, services that run as Local System and use SPNEGO (Negotiate) that revert to NTLM will authenticate anonymously. In Windows Server 2008 R2 and Windows 7 and later, if a service connects to a computer running Windows Server 2008 or Windows Vista, the system service uses the computer identity. When a service connects with the device identity, signing and encryption are supported to provide data protection. (When a service connects anonymously, a system-generated session key is created, which provides no protection, but it allows applications to sign and encrypt data without errors. Anonymous authentication uses a NULL session, which is a session with a server in which no user authentication is performed; and therefore, anonymous access is allowed.)
Possible values
Setting | Windows Server 2008 and Windows Vista | At least Windows Server 2008 R2 and Windows 7 |
---|---|---|
Enabled |
Services running as Local System that use Negotiate will use the computer identity. This might cause some authentication requests between Windows operating systems to fail and log an error. |
Services running as Local System that use Negotiate will use the computer identity. This is the default behavior. |
Disabled |
Services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously. This is the default behavior. |
Services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously. |
Neither |
Services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously. |
Services running as Local System that use Negotiate will use the computer identity. This might cause some authentication requests between Windows operating systems to fail and log an error. |
Server type or Group Policy object (GPO) | Default value |
---|---|
Default domain policy |
Not defined |
Default domain controller policy |
Not defined |
Stand-alone server default settings |
Not defined |
Domain controller effective default settings |
Not applicable |
Member server effective default settings |
Not applicable |
Effective GPO default settings on client computers |
Not defined |