6.4 KiB
title, description, ms.assetid, ms.pagetype, ms.prod, ms.mktglfcycl, ms.sitesec, author
title | description | ms.assetid | ms.pagetype | ms.prod | ms.mktglfcycl | ms.sitesec | author |
---|---|---|---|---|---|---|---|
Network security Restrict NTLM Add server exceptions in this domain (Windows 10) | Describes the best practices, location, values, management aspects, and security considerations for the Network security Restrict NTLM Add server exceptions in this domain security policy setting. | 2f981b68-6aa7-4dd9-b53d-d88551277cc0 | security | W10 | deploy | library | brianlic-msft |
Network security: Restrict NTLM: Add server exceptions in this domain
Applies to
- Windows 10 Describes the best practices, location, values, management aspects, and security considerations for the Network security: Restrict NTLM: Add server exceptions in this domain security policy setting.
Reference
The Network security: Restrict NTLM: Add server exceptions in this domain policy setting allows you to create an exception list of servers in this domain to which client device are allowed to use NTLM pass-through authentication if any of the deny options are set in the Network Security: Restrict NTLM: NTLM authentication in this domain policy setting. If you configure this policy setting, you can define a list of servers in this domain to which client devices are allowed to use NTLM authentication. If you do not configure this policy setting, no exceptions will be applied, and if Network Security: Restrict NTLM: NTLM authentication in this domain is enabled, all NTLM authentication attempts in the domain will fail. List the NetBIOS server names as the naming format, one per line. A single asterisk (*) can be used anywhere in the string as a wildcard character.
Possible values
- User-defined list of servers When you enter a list of servers in this domain to which clients are allowed to use NTLM authentication, the policy is defined and enabled.
- Not defined If you do not configure this policy setting by defining a list of servers, the policy is undefined and no exceptions will be applied.
Best practices
- First enforce the Network Security: Restrict NTLM: Audit NTLM authentication in this domain policy setting, and then review the operational event log to understand what domain controllers are involved in these authentication attempts so you can decide which servers to exempt.
- After you have set the server exception list, enforce the Network Security: Restrict NTLM: Audit NTLM authentication in this domain policy setting, and then review the operational event log again before setting the policies to block NTLM traffic.
Location
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
Default values
Server type or GPO | Default value |
---|---|
Default domain policy |
Not defined |
Default domain controller policy |
Not defined |
Stand-alone server default settings |
Not defined |
Domain controller effective default settings |
Not defined |
Member server effective default settings |
Not defined |
Client computer effective default settings |
Not defined |