On-Prem

Systems

Microsoft confirms spike in NTLM authentication traffic after Windows Server patch

Still using ancient protocol suite? April update might make you wish you weren't


Microsoft's April 2024 security update blues continue with confirmation of a "significant increase" in NTLM authentication traffic in Windows Server.

The issue is caused by installing the update (KB5036909) on domain controllers. NTLM traffic might then suddenly spike.

The problem comes hot on the heels of VPN connection failures in the same update.

According to Microsoft's release health dashboard: "This issue is likely to affect organizations that have a very small percentage of primary domain controllers in their environment and high NTLM traffic."

Microsoft said it is "working on a resolution and will provide an update in an upcoming release." A user could uninstall the patch, but doing so would also remove the security fixes included in the update.

NTLM – New Technology LAN Manager – is a very old suite of Microsoft security protocols designed to authenticate users. Microsoft would like people to stop using the technology, but enterprises cling to it. There is, after all, always that one weird app written decades ago that was hard-coded to use it.

In a blog post on the matter, Microsoft said: "Kerberos has been the default Windows authentication protocol since 2000, but there are still scenarios where it can't be used and where Windows falls back to NTLM."

This is because NTLM doesn't need a local network connection to a DC and will work when the target server is unknown. Both scenarios can be problematic for Kerberos despite the authentication protocol being a good deal more secure. Hence prying enterprises away from NTLM has proven a challenge.

Microsoft said: "Our end goal is eliminating the need to use NTLM at all to help improve the security bar of authentication for all Windows users."

Ramping up traffic on networks of customers who have yet to heed Microsoft's advice is certainly one way of achieving that goal, even though we're pretty sure this wasn't the company's intention. ®

Send us news
11 Comments

Google: We're still working to defeat Microsoft's 'anticompetitive' cloud policy

Yesterday's settlement between MS and Euro cloud providers shouldn't 'fool' you, says Alphabet arm's cloud boss

Microsoft avoids formal antitrust EC probe over abusive licensing claims by settling case with CISPE

Pays 'lump sum,' setting up new Azure Stack for hosters and more but some concerned about the private deal

Microsoft exits OpenAI's boardroom to sidestep regulatory scrutiny

Redmond 'confident in the company's direction' says withdrawal letter

Critical Windows licensing bugs – plus two others under attack – top Patch Tuesday

Citrix, SAP also deserve your attention – because miscreants are already thinking about Exploit Wednesday

Microsoft China staff can't log on with an Android, so Redmond buys them iThings

Google's absence creates software distribution issues not even mighty Microsoft can handle

Coders' Copilot code-copying copyright claims crumble against GitHub, Microsoft

A few devs versus the powerful forces of Redmond – who did you think was going to win?

Microsoft tries to clear the air with mountains of CO<sub>2</sub> credits

'Supply chains still powered by coal and gas' scoffs Greenpeace

Hey Microsoft – what ever happened to 'Developers, developers, developers'?

Hey, here’s an idea… create a point system for every time Microsoft hurts us

Microsoft ad subsidiary Xandr accused of violating GDPR

Access, deletion requests go ignored, and consumer profiles contradict themselves, complaint alleges

Microsoft forgets about SwiftKey's support site

Injecting Copilot branding will not make TLS certificates auto-renew

Microsoft Stores all close their doors in China

Slump in Surface sales suspected as one reason for move online

Big Tech's eventual response to my LLM-crasher bug report was dire

Fixes have been made, it appears, but disclosure or discussion is invisible