5.1 Security Considerations for Implementers

Implementers have to be aware of the security considerations of using NTLM authentication, as described in [MS-NLMP].

Show: