Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.109234
Category:Policy
Title:Microsoft Windows: Network security: LAN Manager authentication level
Summary:This security setting determines which challenge/response;authentication protocol is used for network logons. This choice affects the level of authentication;protocol used by clients, the level of session security negotiated, and the level of authentication;accepted by servers as follows:;; - Send LM & NTLM responses: Clients use LM and NTLM authentication and never use NTLMv2 session;security, domain controllers accept LM, NTLM, and NTLMv2 authentication.;; - Send LM & NTLM - use NTLMv2 session security if negotiated: Clients use LM and NTLM authentication;and use NTLMv2 session security if the server supports it, domain controllers accept LM, NTLM, and;NTLMv2 authentication.;; - Send NTLM response only: Clients use NTLM authentication only and use NTLMv2 session security if;the server supports it, domain controllers accept LM, NTLM, and NTLMv2 authentication.;; - Send NTLMv2 response only: Clients use NTLMv2 authentication only and use NTLMv2 session security;if the server supports it, domain controllers accept LM, NTLM, and NTLMv2 authentication.;; - Send NTLMv2 response only\\refuse LM: Clients use NTLMv2 authentication only and use NTLMv2;session security if the server supports it, domain controllers refuse LM (accept only NTLM and;NTLMv2 authentication).;; - Send NTLMv2 response only\\refuse LM & NTLM: Clients use NTLMv2 authentication only and use;NTLMv2 session security if the server supports it, domain controllers refuse LM and NTLM (accept;only NTLMv2 authentication).;;(C) Microsoft Corporation 2015.
Description:Summary:
This security setting determines which challenge/response
authentication protocol is used for network logons. This choice affects the level of authentication
protocol used by clients, the level of session security negotiated, and the level of authentication
accepted by servers as follows:

- Send LM & NTLM responses: Clients use LM and NTLM authentication and never use NTLMv2 session
security, domain controllers accept LM, NTLM, and NTLMv2 authentication.

- Send LM & NTLM - use NTLMv2 session security if negotiated: Clients use LM and NTLM authentication
and use NTLMv2 session security if the server supports it, domain controllers accept LM, NTLM, and
NTLMv2 authentication.

- Send NTLM response only: Clients use NTLM authentication only and use NTLMv2 session security if
the server supports it, domain controllers accept LM, NTLM, and NTLMv2 authentication.

- Send NTLMv2 response only: Clients use NTLMv2 authentication only and use NTLMv2 session security
if the server supports it, domain controllers accept LM, NTLM, and NTLMv2 authentication.

- Send NTLMv2 response only\\refuse LM: Clients use NTLMv2 authentication only and use NTLMv2
session security if the server supports it, domain controllers refuse LM (accept only NTLM and
NTLMv2 authentication).

- Send NTLMv2 response only\\refuse LM & NTLM: Clients use NTLMv2 authentication only and use
NTLMv2 session security if the server supports it, domain controllers refuse LM and NTLM (accept
only NTLMv2 authentication).

(C) Microsoft Corporation 2015.

CVSS Score:
0.0

CVSS Vector:
AV:L/AC:H/Au:S/C:N/I:N/A:N

CopyrightCopyright (C) 2018 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.