- Free Edition
- Quick Links
- Active Directory Auditing
- Active Directory auditor
- Active Directory monitoring
- Account lockout analyzer
- Login monitoring software
- Active Directory change notifier
- User logon audit reports
- AD logon logoff tracker
- User logon failure auditing
- Login history tracking tool
- AD change auditor
- Insider threat detection software
- Permissions change auditing
- Entra ID reporting
- Privileged user monitoring
- User behavior analytics tool
- Active Directory security monitoring
- Group Policy auditing tool
- GPO change auditor
- Entra ID auditing
- Audit user account management
- OU change auditor
- Audit group membership changes
- Active Directory auditing and reporting tool
- GPO reporting tool
- Remote desktop monitoring software
- PowerShell logging and auditing
- Azure password protection auditing
- Azure sign-in risk detection
- File Server Auditing
- Windows Server Auditing
- Employee Tracking
- Workstations Auditing
- Compliance Auditing
- Other features
- SIEM Integration
- Windows DNS - Schema Auditing
- Windows security event log monitoring
- SIEM audit solution
- Schedule Active Directory change reports
- Reports from Archived Data
- Aggregated summary reports
- AD new/old attribute changes
- Audit trail
- Audit Active Directory LAPS
- Scheduled Reports & Alerts
- Account lockout examiner
- Industry
- Documents
- Success Stories
- Related Products
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- ADManager Plus Active Directory Management & Reporting
- EventLog Analyzer Real-time Log Analysis & Reporting
- ADSelfService Plus Identity security with MFA, SSO, and SSPR
- DataSecurity Plus File server auditing & data discovery
- Exchange Reporter Plus Exchange Server Auditing & Reporting
- M365 Manager Plus Microsoft 365 Management & Reporting Tool
- RecoveryManager Plus Enterprise backup and recovery tool
- SharePoint Manager Plus SharePoint Reporting and Auditing
- AD360 Integrated Identity & Access Management
- AD Free Tools Active Directory FREE Tools
What is Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers setting?
Written by Titus Manohar, IT security team, ManageEngine • Updated on April 2026
'Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers' is a security policy setting that can block as well as audit outgoing NTLM traffic from client devices to remote servers. NTLM is an older Windows authentication software that has been known to be vulnerable to man-in-the-middle (MITM) attacks, brute force attacks, SMB relay, and so on. Therefore auditing the outgoing NTLM traffic to the remote servers can help a network administrator find the servers that receive NTLM authentication requests and decide whether the traffic needs to be blocked.
There are multiple ways to enable this policy setting:
- Deny All: Choosing this option leads to all outgoing NTLM traffic being blocked. The client devices will not be able to perform NTLM authentication with the remote servers. The blocked authentication requests will also be logged on the system.
- Allow all: If this option is enabled, there is no restriction placed on the client devices from performing NTLM authentication with a remote server.
- Audit all: If this option is enabled, the systems keeps logs on the NTLM authentication requests sent to remote servers. These logs are stored in the 'Operational' log located under Applications and Services Log\Microsoft\Windows\NTLM.
Choosing the option 'Not Defined', means that there is no restriction on the outgoing NTLM traffic to remote servers.
About ADAudit Plus:
ADAudit Plus is a real time change auditing software that helps keep your Active Directory, Azure AD, Windows file servers, NetApp filers, EMC file systems, Synology file systems, Windows member servers, and workstations secure and compliant. With ADAudit Plus, you can get visibility into:
- Authorized and unauthorized AD management changes
- User logons, logoffs, and account lockouts
- Group attribute and membership changes
- GPO changes
- Group attribute and membership changes
- OU changes
- Privileged access and permission changes
- Azure AD logons, and changes to roles, groups, and applications
- PowerShell scripts and modules
among other things.
There are more than 200 event-specific reports, and you can configure instant email alerts. You can also export the reports to XLS, HTML, PDF and CSV formats to assist in interpretation and forensics.
