
Microsoft has announced its intention to disable the outdated and insecure NTLM authentication protocol by default in its upcoming Windows Server release, marking a significant step towards enhancing enterprise security. This move addresses long-standing concerns within the cybersecurity community regarding NTLM’s vulnerabilities, which have been exploited in numerous attacks. The long-awaited deprecation signals a broader trend toward phasing out legacy protocols in favor of more robust and secure authentication methods across the digital landscape. While a firm release date for the new Windows Server version remains undisclosed, the c…

Microsoft has announced its intention to disable the outdated and insecure NTLM authentication protocol by default in its upcoming Windows Server release, marking a significant step towards enhancing enterprise security. This move addresses long-standing concerns within the cybersecurity community regarding NTLM’s vulnerabilities, which have been exploited in numerous attacks. The long-awaited deprecation signals a broader trend toward phasing out legacy protocols in favor of more robust and secure authentication methods across the digital landscape. While a firm release date for the new Windows Server version remains undisclosed, the commitment to disabling NTLM by default is a concrete action by Microsoft. The NTLM protocol, a predecessor to Kerberos, has been criticized for its susceptibility to relay attacks and credential theft. Its removal aims to bolster the resilience of corporate networks against sophisticated cyber threats, encouraging a transition to more modern and secure authentication mechanisms. The impact of this change will be felt across enterprises heavily reliant on Windows Server infrastructure, potentially requiring updates to legacy applications and systems that still depend on NTLM. This proactive measure by Microsoft underscores the growing importance of cybersecurity in digital policy, aligning with broader European efforts to strengthen the digital sovereignty and security of its businesses. Organizations will need to plan for the transition to ensure continued compatibility and enhanced protection against evolving cyber risks.
Curated and translated by Europe Digital for our multilingual European audience.
Source Information
Publication: Heise Online
Published: February 2, 2026 at 04:48 PM UTC
All rights remain with the original publisher.