NTLMv2 authentication
Session security determines the minimum security standards for client sessions and for server sessions. The following policies determine the minimum security standards for a program-to-program communications session on a server for a client:
- Network Security: Minimum session security for NTLM SSP based (including secure RPC) servers
- Network Security: Minimum session security for NTLM SSP based (including secure RPC) clients
Note These policies are located under
Computer Settings\Windows Settings\Security Settings\Local Policies\Security Options in the Microsoft Management Console (MMC) Group Policy Object Editor snap-in.
The options for these security settings are as follows:
- Require message integrity
- Require message confidentiality
- Require NTLM version 2 session security
- Require 128-bit encryption
By default, there are no requirements for these settings.
Historically, Windows NT has supported the following two variants of challenge/response authentication for network logons:
- LM challenge/response
- NTLM version 1 challenge/response
LM allows for interoperability with the installed base of clients and servers. NTLM provides improved security for connections between clients and servers.
The following registry subkeys correspond to the challenge/response authentication variants:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0\NtlmMinServerSec
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0\NtlmMinClientSec
Note If you select the
Require NTLMv2 session security option, and
then you set the LAN Manager authentication level to
Send LM & NTLM responses (level 0), the two settings may conflict. In this case, the following error message may be logged in the Secpol.msc file or in the GPEdit.msc file:
Windows cannot open the local policy database. An unknown error occurred when attempting to open the database.