The Kerberos v5 authentication protocol is the default protocol for authentication of users who are logging on to a Windows domain with domain accounts.
NTLM, which is less secure, is retained in later Windows versions for backwards compatibility with clients and servers that are running earlier versions of Windows, or applications that still use it. It is also used to authenticate logons to stand-alone computers that are running later versions.
To fix this configure the policy value for:
|_ Windows Settings
|_ Security Settings
|_ Local Policies
|_ Security Options
|_ Network security: LAN Manager authentication level to "Send NTLMv2 response only. Refuse LM & NTLM".
Stig Windows Server 2016: https://www.stigviewer.com/stig/windows_server_2016/2020-06-16/finding/V-73691
Stig Windows Server 2019: https://www.stigviewer.com/stig/windows_server_2019/2020-06-15/finding/V-93301
Stig Windows Server 2019: https://www.stigviewer.com/stig/microsoft_windows_server_2019/2022-03-01/finding/V-205919
Stig Windows Desktop: https://www.stigviewer.com/stig/windows_10/2021-03-10/finding/V-220938
NOTE: Modifying this setting may affect compatibility with old clients, services and/or applications. Like outdated operation systems or old hardware. For more information https://support.microsoft.com/en-us/topic/client-service-and-program-issues-can-occur-if-you-change-security-settings-and-user-rights-assignments-0cb6901b-dcbf-d1a9-e9ea-f1b49a56d53a