What is ntlm

Last updated: April 1, 2026

Quick Answer: NTLM (NT LAN Manager) is a security authentication protocol used primarily by Windows systems to authenticate users on local and network connections. It verifies user credentials and enables secure access to network resources without transmitting passwords over the network.

Key Facts

Overview

NTLM (NT LAN Manager) is a suite of security protocols developed by Microsoft to provide authentication for Windows systems. Originally introduced with Windows NT, NTLM has been the default authentication method for Windows networks for decades. While newer protocols like Kerberos have largely replaced it for domain authentication, NTLM remains widely used in legacy systems and specific scenarios where Kerberos is not available.

How NTLM Authentication Works

NTLM uses a three-way challenge-response authentication process. When a user attempts to access a resource, the server sends a challenge (a random number) to the client. The client's system hashes the user's password and uses it to encrypt the challenge, then sends the response back to the server. The server compares this response to its own calculation, confirming the user's identity without ever transmitting the actual password across the network. This approach is more secure than sending passwords in plaintext but has vulnerabilities compared to more modern protocols.

NTLM vs. Kerberos

While NTLM and Kerberos both provide network authentication, Kerberos is generally considered more secure and is the preferred method in modern Windows domain environments. Kerberos uses symmetric cryptography and ticket-based authentication, while NTLM relies on challenge-response mechanisms. However, NTLM remains necessary in many organizations for backward compatibility with older systems and for non-domain authentication scenarios.

Modern Usage and Security Considerations

NTLM is still used for legacy systems, local machine authentication, and in environments where Kerberos cannot be deployed. However, security professionals recommend migrating to Kerberos or other modern authentication methods where possible, as NTLM has known vulnerabilities that can be exploited. Microsoft has issued guidance to phase out NTLM authentication, but the widespread nature of Windows systems means it will likely remain in use for many years in some capacity.

Related Questions

What is the difference between NTLM and Kerberos?

Kerberos is more secure than NTLM, uses ticket-based authentication instead of challenge-response, and is the preferred protocol in modern Windows domains. NTLM remains for backward compatibility and local machine authentication.

Why is NTLM considered a security risk?

NTLM has known cryptographic weaknesses that can be exploited in certain attack scenarios, including pass-the-hash attacks. It also uses weaker hashing algorithms compared to modern alternatives, making it vulnerable to brute-force attacks.

Can I disable NTLM on my Windows network?

Yes, organizations can disable NTLM through Group Policy if all systems support Kerberos, but this requires careful planning as some legacy applications and devices may depend on NTLM for authentication.

Sources

  1. Wikipedia - NT LAN Manager CC-BY-SA-4.0
  2. Microsoft - NTLM Security Guidance CC-BY-4.0