Source: Microsoft Security Response Center Author: unknown URL: https://msrc.microsoft.com/blog/2024/12/mitigating-ntlm-relay-attacks-by-default/
ONE SENTENCE SUMMARY:
February 2024 updates enabled Extended Protection for Authentication by default in Exchange Server and Windows Server to combat NTLM relay attacks.
MAIN POINTS:
- February 2024 introduced CVE-2024-21410, enabling Extended Protection for Authentication by default in Exchange 2019.
- Windows Server 2025 also enabled EPA by default for Azure Directory Certificate Services and LDAP.
- NTLM relay attacks compromise identities by relaying authentication to vulnerable endpoints.
- Historical exploits have been observed against Exchange, AD CS, and LDAP without NTLM protections.
- Microsoft’s guidelines require administrator intervention to enable EPA in older systems without defaults.
- Exchange Server is frequently targeted due to its connection with Office documents and emails.
- Exchange Server 2016 lacks further updates but EPA can be enabled via scripting.
- Windows Server 2025 offers stronger EPA options for enterprises not supporting legacy clients.
- NTLM is expected to be disabled by default in future Windows versions, promoting modern authentication.
- Microsoft aims to enforce secure defaults and enhance mitigation strategies against NTLM attacks.
TAKEAWAYS:
- Enabling EPA by default significantly increases security against NTLM relay attacks.
- Administrators must adapt to new protocols to phase out legacy NTLM usage.
- Vulnerabilities in widely used services like Exchange make them prime targets for attackers.
- Future updates will continue to enhance default security measures for Microsoft services.
- Collaboration within Microsoft teams is crucial for implementing effective security updates.