What is LM Password Hash


You want to prevent the LM hash for new passwords from being stored in Active Directory. The LM hash is susceptible to brute force attacks and is primarily used for backward compatibility with Windows 95 and 98 clients.

Solution
For Windows 2000, you need to create the following Registry key on all domain controllers: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\NoLMHash. Note that this is a key and not a value entry. Also, this is only supported on W2K SP2 and later domain controllers.

For Windows Server 2003, the NoLMHash key has turned into a DWORD value entry under the HKLM\SYSTEM\CurrentControlSet\Control\Lsa key. This value should be set to 1. You can accomplish this by modifying the Default Domain Controller Security Policy as described next.

Using a graphical user interface
1.Open the Group Policy Object Editor and target the Default Domain Controller Security Policy.

2.In the left pane, expand Local Policies → Security Options.

3.In the right pane, double-click on Network security: Do not store LAN Manager hash value on next password change.

4.Check the box beside Define this policy setting.

5.Click the Enabled radio button.

6.Click OK.

find more : lan manager hash

Comments

Popular posts from this blog

How Does VPN Work in network system?

what are Internet Protocol-based cameras

set up a VPN or Proxy