Hi Tarvin, Brandie,
Microsoft has officially announced the deprecation of NTLM, which signifies an end to active development rather than an immediate removal from the ecosystem. Your legacy applications and older servers will not lose NTLM functionality unexpectedly, as Microsoft's deprecation process is designed to span multiple years to ensure enterprise stability. NTLM will remain fully operational in your current environment until your organization explicitly decides to disable it through local or domain policy changes.
The new Local Key Distribution Center and IAKerb features are being introduced specifically in Windows 11 and Windows Server 2025 to enable Kerberos authentication for local accounts. Because these features require fundamental changes to the underlying security architecture, they will not be backported to older operating systems like Windows Server 2019 or 2022. Your older servers will continue relying on standard Kerberos for domain accounts and NTLM as the fallback protocol. To safely prepare for the eventual transition, you should map out legacy dependencies by enabling NTLM auditing. You can do this by navigating through Group Policy to Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options, and configuring the policy named Network security: Restrict NTLM: Audit Incoming NTLM Traffic. Reviewing the resulting Event ID 8004 in your Windows Event Viewer will help you identify exactly which applications and devices still rely on the older protocol.
For official timelines and ongoing guidance, you should bookmark and monitor the Microsoft Learn article titled The evolution of Windows authentication. This dedicated hub is where the Microsoft engineering team will continue to post enforcement dates, changes to insider builds, and transition resources for administrators mapping out their infrastructure upgrades.
Hope this answer brought you some useful information. If it did, please hit “accept answer”. Should you have any questions, feel free to leave a comment.
VP