How to Prevent LM Hash from Being Saved in Memory
hi, company looking improve security in our mixed server 2003 & server 2008 r2 environment protecting against pass hash attacks. in process of implementing 15-character passwords privileged id's, result in kick our users. understand using pw of 15+ characters breaks lm hash algorithm. but, there microsoft-provided mechanism preventing lm hash being stored in memory when shorter (14 chracters or less) password used in conjunction 'nolmhash' registry setting , following settings applied via domain gpo?:
- network security: not store lan manager hash value on next password change - enabled
- network security: lan manager authentication level - send ntlmv2 response only. refuse lm & ntlm
these policies prevents password hash not saved disk or used on network, still in memory.
the remediation implement password more 15 characters. or if passwords still scary, multi-factor authentication method such certificates or tokens.
johan loos cissp,mct,iso 27001 , others
Windows Server > Security
Comments
Post a Comment