5.1 Security Considerations for Implementers

Implementers ought to familiarize themselves with the security considerations associated with using NTLM authentication. Those security considerations are described in [MS-NLMP].

Show: