Source: Microsoft Security Response Center Author: unknown URL: https://msrc.microsoft.com/blog/2024/12/mitigating-ntlm-relay-attacks-by-default/
-
ONE SENTENCE SUMMARY: February 2024 updates enabled Extended Protection for Authentication by default in Exchange Server and Windows Server to combat NTLM relay attacks.
-
MAIN POINTS:
-
February 2024 introduced CVE-2024-21410, enabling Extended Protection for Authentication by default in Exchange 2019.
-
Windows Server 2025 also enabled EPA by default for Azure Directory Certificate Services and LDAP.
-
NTLM relay attacks compromise identities by relaying authentication to vulnerable endpoints.
-
Historical exploits have been observed against Exchange, AD CS, and LDAP without NTLM protections.
-
Microsoft’s guidelines require administrator intervention to enable EPA in older systems without defaults.
-
Exchange Server is frequently targeted due to its connection with Office documents and emails.
-
Exchange Server 2016 lacks further updates but EPA can be enabled via scripting.
-
Windows Server 2025 offers stronger EPA options for enterprises not supporting legacy clients.
-
NTLM is expected to be disabled by default in future Windows versions, promoting modern authentication.
-
Microsoft aims to enforce secure defaults and enhance mitigation strategies against NTLM attacks.
-
TAKEAWAYS:
-
Enabling EPA by default significantly increases security against NTLM relay attacks.
-
Administrators must adapt to new protocols to phase out legacy NTLM usage.
-
Vulnerabilities in widely used services like Exchange make them prime targets for attackers.
-
Future updates will continue to enhance default security measures for Microsoft services.
-
Collaboration within Microsoft teams is crucial for implementing effective security updates.