How to Prevent LM Hash from Being Saved in Memory


hi, company looking improve security in our mixed server 2003 & server 2008 r2 environment protecting against pass hash attacks.  in process of implementing 15-character passwords privileged id's, result in kick our users.  understand using pw of 15+ characters breaks lm hash algorithm.  but, there microsoft-provided mechanism preventing lm hash being stored in memory when shorter (14 chracters or less) password used in conjunction 'nolmhash' registry setting , following settings applied via domain gpo?: 

  • network security: not store lan manager hash value on next password change - enabled
  • network security: lan manager authentication level - send ntlmv2 response only. refuse lm & ntlm

these policies prevents password hash not saved disk or used on network, still in memory.

the remediation implement password more 15 characters. or if passwords still scary, multi-factor authentication method such certificates or tokens.


johan loos cissp,mct,iso 27001 , others



Windows Server  >  Security



Comments

Popular posts from this blog

CRL Revocation always failed

Failed to query the results of bpa xpath

0x300000d errors in Microsoft Remote Desktop client