Network Access: LAN Manager authentication level must be configured to send NTLMv2 response only and refuse LM and NTLM

2718ea3f-5f25-4e6d-a693-3c426f14357f

The Kerberos v5 authentication protocol is the default protocol for authentication of users who are logging on to a Windows domain with domain accounts.

NTLM, which is less secure, is retained in later Windows versions for backwards compatibility with clients and servers that are running earlier versions of Windows, or applications that still use it. It is also used to authenticate logons to stand-alone computers that are running later versions.

Remediation

To fix this configure the policy value for:
Computer Configuration
|_ Windows Settings
|_ Security Settings
|_ Local Policies
|_ Security Options
|_ Network security: LAN Manager authentication level to "Send NTLMv2 response only. Refuse LM & NTLM".

Stig Windows Server 2016: https://www.stigviewer.com/stig/windows_server_2016/2020-06-16/finding/V-73691
Stig Windows Server 2019: https://www.stigviewer.com/stig/windows_server_2019/2020-06-15/finding/V-93301
Stig Windows Server 2019: https://www.stigviewer.com/stig/microsoft_windows_server_2019/2022-03-01/finding/V-205919

Stig Windows Desktop: https://www.stigviewer.com/stig/windows_10/2021-03-10/finding/V-220938

NOTE: Modifying this setting may affect compatibility with old clients, services and/or applications. Like outdated operation systems or old hardware. For more information https://support.microsoft.com/en-us/topic/client-service-and-program-issues-can-occur-if-you-change-security-settings-and-user-rights-assignments-0cb6901b-dcbf-d1a9-e9ea-f1b49a56d53a