Network Access: LAN Manager authentication level must be configured to send NTLMv2 response only and refuse LM and NTLM


The Kerberos v5 authentication protocol is the default protocol for authentication of users who are logging on to a Windows domain with domain accounts.

NTLM, which is less secure, is retained in later Windows versions for backwards compatibility with clients and servers that are running earlier versions of Windows, or applications that still use it. It is also used to authenticate logons to stand-alone computers that are running later versions.


To fix this configure the policy value for:
Computer Configuration
|_ Windows Settings
|_ Security Settings
|_ Local Policies
|_ Security Options
|_ Network security: LAN Manager authentication level to "Send NTLMv2 response only. Refuse LM & NTLM".

Stig Windows Server 2016:
Stig Windows Server 2019:
Stig Windows Server 2019:

Stig Windows Desktop:

NOTE: Modifying this setting may affect compatibility with old clients, services and/or applications. Like outdated operation systems or old hardware. For more information