Auditing NTLM Traffic on Domain Controllers. Visibility Without Risk

NTLM still appears inside many Active Directory environments. Even when Kerberos handles normal authentication, NTLM often surfaces through legacy applications, services, or fallback behavior. Before blocking anything, visibility matters.

The safest place to monitor NTLM usage is the domain controller. Every NTLM authentication ends there. Auditing on domain controllers provides full coverage without touching workstations or servers.

This article explains how to enable NTLM auditing on domain controllers only and how to read the resulting logs.

Why Audit NTLM First

Blocking NTLM without evidence creates risk. Auditing provides proof.

Auditing answers key questions.

  • Who uses NTLM.
  • Which device initiates authentication.
  • Which account authenticates.
  • How often NTLM appears.

With this data, enforcement decisions stay informed instead of reactive.

Scope and Design

Auditing stays limited to domain controllers.

Workstations stay untouched.
Servers stay untouched.
No authentication gets blocked.

This approach ensures zero operational impact while still collecting reliable data.

Group Policy to Create

Create a dedicated Group Policy Object linked only to the Domain Controllers OU.

Recommended name:
DC – NTLM Auditing Only

This policy exists for monitoring only. Enforcement settings remain out of scope.

Required Setting
Configure one setting and nothing else.

Path
Computer Configuration \ Policies \ Windows Settings \ Security Settings \ Local Policies \ Security Options

Setting
Network security. Restrict NTLM. Audit NTLM authentication in this domain

Value
Enable auditing for all accounts

This setting instructs domain controllers to log NTLM usage without denying access.

Settings to Avoid
Do not configure NTLM blocking settings in this policy.
Do not configure LAN Manager authentication level.
Do not configure Incoming NTLM traffic.

Those settings belong in workstation or enforcement policies.

Applying the Policy
Link the policy to the Domain Controllers OU.
Run gpupdate /force on one domain controller.
Wait for replication across remaining controllers.

Once applied, logging depends on Event Viewer configuration.

Enabling the NTLM Operational Log

NTLM audit events write to a dedicated log. This log often starts disabled.

On a domain controller

First Log

Open Event Viewer > Navigate to Applications and Services Logs > Microsoft > Expand Windows > NTLM > Operational

Right click Operational and select Enable Log.

Without this step, NTLM audit events never appear even when auditing stays enabled.

Key events
Event ID 8003 shows NTLM authentication allowed.
Event ID 8004 appears later when blocking gets enabled.

These events show source device, target server, account, and authentication details.

Second Log

Open Event Viewer > Path > Windows Logs > Security

Key events
Event ID 4624 for successful logon.
Event ID 4625 for failed logon.

This log helps correlate NTLM usage with broader authentication activity.

Validating Auditing Works

After enabling auditing, force a test.

From a workstation
Access a network resource using an IP address instead of a hostname.

This often triggers NTLM authentication.

Return to the domain controller logs.
NTLM Operational events should appear.
Security log entries should reference NTLM.

If logs appear, auditing works.

If logs stay empty, auditing never applied or the operational log remains disabled.

What Clean Logs Mean
After validation, quiet logs signal success.

No NTLM usage means Kerberos handles authentication.
Occasional NTLM entries highlight legacy behavior.
Repeated entries reveal systems needing remediation.

Auditing turns assumptions into evidence.

Next Steps

After several days of collected data, decisions become simple.

Legacy dependencies stand out.
Ownership becomes clear.
Enforcement planning gains confidence.

Auditing first creates a safe foundation for future NTLM reduction without disruption.

********************************************************

If you liked what you read Please Share.
I’d love it if you followed me on YouTube and Facebook.

Also, feel free to subscribe to my posts by email.
Donations for the site can be made here.
Thanks for reading.

Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *