Networking / Beginners

Networking LAN Manager Authentication Level

LMCompatibilityLevel, or "Network security: LAN Manager authentication level" as it is called in Group Policy on Windows XP and higher (it is called "LAN Manager authentication level" on Windows 2000), governs the authentication protocols a system is allowed to use and accept. We recommend that it be set to at least 4 or "Send NTLMv2 response only\refuse LM" on all systems. When you do so, you will break access to and from Windows 9x systems as well as some versions of SAMBA.

It is important to recognize that even with LAN Manager authentication level configured to 4, the system will still emit LM and NTLM responses in certain cases; for instance, with programs that use the NTLM Security Support Provider (SSP) directly, such as RPC. To prevent this, you need to configure the "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients/servers" settings. These settings govern the protocols used by the SSP. There are four combinations of settings.

  1. Require message integrity
  2. Require message confidentiality
  3. Require NTLMv2 session security
  4. Require 128-bit encryption

To use NTLMv2, you need to select at least option 3. In addition, if you turn off storage of LM hashes, you must select options 1, 2 and 3 to allow RPC authentication over UDP to function properly. Services that use such authentication include the Windows Clustering Service. If you simply disable LM hash storage, you may break your clusters unless you also configure the NTLM SSP client-side settings. We recommend setting the NTLM SSP client to require message integrity, confidentiality, as well as NTLMv2. Use 128-bit encryption at your discretion, but most applications will use that anyway. Configuring this setting will only break applications that are specifically coded not to allow use of NTLMv2.

[Previous] [Contents] [Next]