Kerberos is the default for W2K and is what will be attempted first for
authentication with W2K/XP Pro/W2003 domain member machines. Athentication
can however fallback to lm/ntlm/ntlmv2 if kerberos can not be used for some
reason including using IP address instead of host name to access a share or
if there is a time skew greater than five minutes between computers. If you
have auditing of account logon and/or logon events enabled for the domain
controllers, you will see if kerberos is used or not.
The security option for lanmanager authentication level is generally
configured for compatability with downlevel [W9X/NT4.0] clients. You really
want to avoid lm as it is very weak [even to hash sniffing] and also disable
lm hash storage on your domain controllers and even domain members if not
needed for W9X clients. W9X clients use lm by default, but installing the
Directory Services Client on them will allow them to authenticate to the
domain with ntlmv2. Of course domain controllers should be secured to the
point where physical access to an attacker would be very difficult.
Generally it is a good idea to configure lan manager authentication level
for the domain and on domain controllers via Domain Controller Security
Policy to be at least "send ntlmv2 responses only" and if you have no
downlevel clients then at least "send ntlmv2 - refuse lm" for Domain
Controller Securty policy. Ntlmv2 is by far the strongest of the older
authentication methods and all W2K/XP Pro/W2003 machines can use it if need
be such as in a workgroup environment. The most secure setting "send
ntlmv2 - refuse lm and ntlm" can cause problems even with all W2K computers
in certain situations such as on a W2K ras server where vpn clients may be
unable to authenticate so use that setting carefully. See the links below
for more infomation of configuring the settings for lan manager
authentication level. When you read the descriptions, keep in mind that they
have different meanings depending if the computer is acting as a client or a
server. --- Steve
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/gp/576.asp
http://support.microsoft.com/default.aspx?scid=kb;en-us;823659 -- read
part 10. Excellent info.
GX said:
In a nutshell, what's the difference between these two settings?
What would one do that the other wont?
I have native mode w2ksvrs. Which one should I select and why?
Should I establish this on the Domain Security Policy or the Domain
Controller Security Policy level?
Thanks a bunch.
GX