Home     Search     FAQs     Downloads     Newsgroups     Contact Us     Français  
Microsoft Knowledge Base Article - 239869
Need More Help?
Need More Help?
Contact a Support Professional by E-Mail, Online or Phone
Search (KB)
Windows 98
Run the search
Show options
General Info
Contact Microsoft

Support Options, Phone Numbers, and Online Support

Customer Services

Customer Care, Product Purchasing, Site and Production Information

Support Webcasts

Online Presentations, Live and Recorded, on Microsoft Products by Microsoft Experts

Page Options

How to Enable NTLM 2 Authentication

Applies To
This article was previously published under Q239869
IMPORTANT: This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base:

256986 Description of the Microsoft Windows Registry

SUMMARY

Historically, Windows NT supports two variants of challenge/response authentication for network logons:
  • LAN Manager (LM) challenge/response
  • Windows NT challenge/response (also known as NTLM version 1 challenge/response)
The LM variant allows interoperability with the installed base of Windows 95, Windows 98, and Windows Millennium Edition clients and servers. NTLM provides improved security for connections between Windows NT clients and servers. Windows NT also supports the NTLM session security mechanism that provides for message confidentiality (encryption) and integrity (signing).

Recent improvements in computer hardware and software algorithms have made these protocols vulnerable to widely published attacks for obtaining user passwords. In its ongoing efforts to deliver more secure products to its customers, Microsoft has developed an enhancement, called NTLM version 2, that significantly improves both the authentication and session security mechanisms. NTLM 2 has been available for Windows NT 4.0 since Service Pack 4 (SP4) was released, and it is supported natively in Windows 2000. You can add NTLM 2 support to Windows 95 and Windows 98 by installing the Directory Services Client from the Windows 2000 CD-ROM.

After you upgrade all computers that are based on Windows 95, Windows 98, Windows Millennium Edition, and Windows NT 4.0, you can greatly improve your organization's security by configuring clients, servers, and domain controllers to use only NTLM 2 (not LM or NTLM).

MORE INFORMATION

The Directory Services Client is included on the Windows 2000 CD-ROM as Clients\Win9x\Dsclient.exe. When you run Dsclient.exe on a computer running Windows 95, Windows 98, or Windows Millennium Edition, the system files that provide NTLM 2 support are automatically installed as well. These files are Secur32.dll, Msnp32.dll, Vredir.vxd, and Vnetsup.vxd. If you uninstall Dsclient, the NTLM 2 system files are not removed because they provide both enhanced security functionality and security-related fixes.

By default, NTLM 2 session security encryption is restricted to a maximum key length of 56 bits. Optional support for 128-bit keys is automatically installed if the system satisfies United States export regulations. To enable 128-bit NTLM 2 session security support, you must first install Microsoft Internet Explorer 4.x or 5 and upgrade to 128-bit secure connection support before you install the Directory Services Client.

To verify your installation version:
  1. Locate the Secur32.dll file in the %SystemRoot%\System folder using Windows Explorer.
  2. Right-click the file, and then click Properties.
  3. Click the Version tab.
  4. The description for the 56-bit version is "Microsoft Win32 Security Services (Export Version)." The description for the 128-bit version is "Microsoft Win32 Security Services (US and Canada Only)."
When you first install the NTLM 2 support files, they are configured to use only LM authentication for backward compatibility with existing servers and domain controllers. Before you enable NTLM 2 authentication for Windows 95, Windows 98, or Windows Millennium Edition clients, verify that all domain controllers for users who log on to your network from these clients are running Windows NT 4.0 service Pack 4 (SP4) or later. (Or, Service Pack 6 if the client and server are joined to different domains.) No domain controller configuration is required to support NTLM 2; the only time domain controllers need to be configured is to disable support for NTLM 1 or LM authentication.

For additional information a detailed discussion of the differences between these protocol variants and the importance of upgrading to use only NTLM 2, click the article number below to view the article in the Microsoft Knowledge Base:

147706 How to Disable LM Authentication on Windows NT

Enabling NTLM 2 for Windows 95, Windows 98, or Windows Millennium Edition Clients

WARNING: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.

To enable a Windows 95, Windows 98, or Windows Millennium Edition client for NTLM 2 authentication, install the Directory Services Client. To activate NTLM 2 on the client, follow these steps:
  1. Start Registry Editor (Regedit.exe).
  2. Locate and click the following key in the registry:

    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control

  3. Create an LSA registry key in the registry key listed above.
  4. On the Edit menu, click Add Value, and then add the following registry value:

    Value Name: LMCompatibility
    Data Type: REG_DWORD
    Value: 3
    Valid Range: 0,3
    Description: This parameter specifies the mode of authentication and session security to be used for network logons. It does not affect interactive logons.

    • Level 0 - Send LM and NTLM response; never use NTLM 2 session security. Clients will use LM and NTLM authentication, and never use NTLM 2 session security; domain controllers accept LM, NTLM, and NTLM 2 authentication.
    • Level 3 - Send NTLM 2 response only. Clients will use NTLM 2 authentication and use NTLM 2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLM 2 authentication.
    NOTE: To enable NTLM 2 for Windows 95 Clients, install Distributed File System (DFS) Client, WinSock 2.0 Update, and Microsoft DUN 1.3 for Windows 2000.

  5. Quit Registry Editor.
For reference, the full range of values for the LMCompatibilityLevel value that are supported by Windows NT 4.0 and Windows 2000 include:
  • Level 0 - Send LM and NTLM response; never use NTLM 2 session security. Clients use LM and NTLM authentication, and never use NTLM 2 session security; domain controllers accept LM, NTLM, and NTLM 2 authentication.
  • Level 1 - Use NTLM 2 session security if negotiated. Clients use LM and NTLM authentication, and use NTLM 2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLM 2 authentication.
  • Level 2 - Send NTLM response only. Clients use only NTLM authentication, and use NTLM 2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLM 2 authentication.
  • Level 3 - Send NTLM 2 response only. Clients use NTLM 2 authentication, and use NTLM 2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLM 2 authentication.
  • Level 4 - Domain controllers refuse LM responses. Clients use NTLM authentication, and use NTLM 2 session security if the server supports it; domain controllers refuse LM authentication (that is, they accept NTLM and NTLM 2).
  • Level 5 - Domain controllers refuse LM and NTLM responses (accept only NTLM 2). Clients use NTLM 2 authentication, use NTLM 2 session security if the server supports it; domain controllers refuse NTLM and LM authentication (they accept only NTLM 2).
A client computer can only use one protocol in talking to all servers. You cannot configure it, for example, to use NTLM v2 to connect to Windows 2000-based servers and then to use NTLM to connect to other servers. This is by design.

You can configure the minimum security that is used for programs that use the NTLM Security Support Provider (SSP) by modifying the following registry key. These values are dependent on the LMCompatibilityLevel value:
  1. Start Registry Editor (Regedit.exe).
  2. Locate the following key in the registry:

    HKEY_LOCAL_MACHINE\System\CurrentControlSet\control\LSA\MSV1_0

  3. On the Edit menu, click Add Value, and then add the following registry value:

    Value Name: NtlmMinClientSec
    Data Type: REG_WORD
    Value: one of the values below:

    • 0x00000010- Message integrity
    • 0x00000020- Message confidentiality
    • 0x00080000- NTLM 2 session security
    • 0x20000000- 128-bit encryption
    • 0x80000000- 56-bit encryption

  4. Quit Registry Editor.
If a client/server program uses the NTLM SSP (or uses secure Remote Procedure Call [RPC], which uses the NTLM SSP) to provide session security for a connection, the type of session security to use is determined as follows:
  • The client requests any or all the following items: message integrity, message confidentiality, NTLM 2 session security, and 128-bit or 56-bit encryption.
  • The server responds, indicating which items of the requested set it wants.
  • The resulting set is said to have been "negotiated."
You can use the NtlmMinClientSec value to cause client/server connections to either negotiate a given quality of session security or not to succeed. However, you should note the following items:
  • If you use 0x00000010 for the NtlmMinClientSec value, the connection does not succeed if message integrity is not negotiated.
  • If you use 0x00000020 for the NtlmMinClientSec value, the connection does not succeed if message confidentiality is not negotiated.
  • If you use 0x00080000 for the NtlmMinClientSec value, the connection does not succeed if NTLM 2 session security is not negotiated.
  • If you use 0x20000000 for the NtlmMinClientSec value, the connection does not succeed if message confidentiality is in use but 128-bit encryption is not negotiated.

The information in this article applies to:

  • Microsoft Windows 2000 Advanced Server
  • Microsoft Windows Millennium Edition
  • Microsoft Windows NT Server 4.0 SP4
  • Microsoft Windows NT Server 4.0 SP5
  • Microsoft Windows 98 Second Edition
  • Microsoft Windows 98
  • Microsoft Windows 95
Last Reviewed: 5/29/2003 (2.0)
Keywords: kbenv kbhowto KB239869

Need More Help?
Need More Help?
Contact a Support Professional by E-Mail, Online or Phone