* '''Client''': The system requesting authentication. * '''Server''': The system validating the authentication request. * '''Domain Controller''': In a domain environment, the server that verifies user credentials. * '''NTLM Messages''': Series of messages exchanged between the client and server to perform authentication.
* '''Challenge-Response Authentication''': Ensures that passwords are not sent over the network in plaintext. * '''Session Security''': Provides options for message integrity and confidentiality. * '''Backward Compatibility''': Compatible with older Windows systems and applications that do not support newer protocols like Kerberos.
1. **Negotiate Message**: The client sends a negotiate message to the server, indicating its supported NTLM options. 2. **Challenge Message**: The server responds with a challenge message containing a random challenge. 3. **Authenticate Message**: The client responds with an authenticate message containing the user's response to the challenge, encrypted with a hash of the user's password. 4. **Verification**: The server verifies the response with the domain controller and either grants or denies access based on the result.
* Access the Group Policy Editor (`gpedit.msc`). * Navigate to `Computer Configuration` > `Windows Settings` > `Security Settings` > `Local Policies` > `Security Options`. * Configure the `Network security: LAN Manager authentication level` policy to use NTLMv2 response only.
* Use the Event Viewer to monitor NTLM authentication events by navigating to `Applications and Services Logs` > `Microsoft` > `Windows` > `NTLM`.