Disabling LM Authentication

| | No TrackBacks
The security system can't be stronger than its weakest link. E.g., it is important to make users to choose strong passwords and change them often enough. However, if the passwords are transmitted in plain or easily deciphered. Another example is the so called LAN Manager (LM) authentication. This out-of-date method stores passwords in form that can be cracked easily, thus making all the security measures, related to password strength effectively nullified.

In cases when legacy, old clients are used that require LM authentication, you can do nothing about that. In all the other cases it could be a good idea to disable LM authentication
entirely.

The LM hash is transmitted throughout the network, and to prevent that from the single computer, follow these steps:
  • open the registry editor, navigate to HKLM\System\CurrentControlSet\control\LSA
  • search the key named "LMCompatibilityLevel"
  • change the value of this key to "5"; that will completely disable LM authentication

However, disabling this won't remove the existing copies of LM hashes. To eliminate them
  • create a new policy using the Group Policy Management Console; navigate to Computer Configuration, then to Windows Settings > Security Settings > Local Policies.
  • select Security Options
  • double-click "Network Security: Do Not Store LAN Manager Hash Value On Next Password Change".
  • select Enabled and click "OK"

The last thing you have to do is to change the password for a user account to remove whatever hashes were stored for it.

No TrackBacks

TrackBack URL: /blog/mt-tb.cgi/38

blog comments powered by Disqus

About this Entry

This page contains a single entry by Konstantin Boyandin published on December 16, 2009 8:23 AM.

Preventing Ping Responses From Hidden Servers was the previous entry in this blog.

How To: Auditing On A Per-User Basis is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.