<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/130060#M19087</link>
    <description>&lt;P&gt;indeed so - thank you, also seems you can revert the setting by choosing option 21 again from adlogconfig a&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;[ ] Override configuration&lt;BR /&gt;[ ] Enable Adlog&lt;BR /&gt;[ ] Enable log for login or logoff&lt;BR /&gt;[ ] Use log original creation time&lt;BR /&gt;Association timeout : 0&lt;BR /&gt;Full Name Query Interval (days, 0=disabled) : 0&lt;BR /&gt;Full Name Fetch Hour : 0&lt;BR /&gt;Multi-user host Detection Threshold: 7&lt;BR /&gt;Revoked user timeout interval : 14400&lt;BR /&gt;[X] Enable Multi-User Host persistence DB&lt;BR /&gt;Multi-User Host persistence machine timeout (minutes): 2592000&lt;BR /&gt;Service Account Detection Threshold: 10&lt;BR /&gt;[ ] Automatically Exclude Service Accounts&lt;BR /&gt;[ ] Override default communication parameters&lt;BR /&gt;Query Within count : 0&lt;BR /&gt;Query Max returned objects in each iteration: 0&lt;BR /&gt;[X] Disable password expiration check&lt;BR /&gt;[X] Use NTLMv2 &amp;lt;===========you are correct!&lt;BR /&gt;[ ] Single User Assumption&lt;BR /&gt;[ ] Don't report machines&lt;BR /&gt;[X] LDAP groups update notifications&lt;BR /&gt;Notifications accumulation time : 10 (sec)&lt;BR /&gt;[X] Notify only user-related LDAP changes&lt;BR /&gt;[ ] Prefer IPv6 DC addresses&lt;BR /&gt;[1] WMI query Type&lt;/P&gt;&lt;P&gt;====================================================&lt;/P&gt;&lt;P&gt;1 - Override file&lt;BR /&gt;2 - AD Log feature&lt;BR /&gt;3 - Enable log for login or logoff&lt;BR /&gt;4 - Use log original creation time&lt;BR /&gt;5 - Association timeout&lt;BR /&gt;6 - Full Name Query Interval&lt;BR /&gt;7 - Full Name Fetch Hour&lt;BR /&gt;8 - Add Domain name&lt;BR /&gt;9 - Delete Domain&lt;BR /&gt;10 - Username&lt;BR /&gt;11 - Password&lt;BR /&gt;12 - Domain Controllers&lt;BR /&gt;13 - Change Multi-User detection threshold&lt;BR /&gt;14 - Change Revoked User timeout interval&lt;BR /&gt;15 - Multi-User Host Persistence DB&lt;BR /&gt;16 - Multi-User Host Persistence machine timeout&lt;BR /&gt;17 - Override Default Communication Parameters&lt;BR /&gt;18 - Query Within interval&lt;BR /&gt;19 - Max returned objects in each iteration&lt;BR /&gt;20 - Password expiration check&lt;BR /&gt;21 - Use NTLMv2&lt;BR /&gt;22 - Single User Assumption&lt;BR /&gt;23 - Change Service Account Detection Threshold&lt;BR /&gt;24 - Ignore Events From Different Domains&lt;BR /&gt;25 - Automatically Exclude Service Accounts&lt;BR /&gt;26 - Don't report machines&lt;BR /&gt;27 - Turn LDAP groups update on/off&lt;BR /&gt;28 - Notifications accumulation time&lt;BR /&gt;29 - Update only user-related LDAP changes&lt;BR /&gt;30 - Prefer IPv6 DC addresses&lt;BR /&gt;31 - WMI Query Type&lt;BR /&gt;32 - Exit without saving&lt;BR /&gt;33 - Exit and save&lt;/P&gt;&lt;P&gt;Please enter your choice: 33&lt;BR /&gt;- Saving configuration file '/opt/CPsuite-R81.10/fw1/conf/ad_log_override.C'&lt;BR /&gt;Note: you can run 'adlogconfig a -test domainName' in order to test connectivity&lt;BR /&gt;[Expert@r81mgmt:0]# adlogconfig&lt;/P&gt;&lt;P&gt;adlogconfig usage:&lt;BR /&gt;adlogconfig l [-test domainName] - if you are using Identity Logging&lt;BR /&gt;adlogconfig a [-test domainName] - if you are using AD Query (Identity Awareness)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do suspect the steps to disable and re-enable the identity awareness blade are necessary though and i expect we can only validate gateways are doing ntlmv2 in packet captures(?)&lt;/P&gt;</description>
    <pubDate>Thu, 23 Sep 2021 11:03:12 GMT</pubDate>
    <dc:creator>LazarusG</dc:creator>
    <dc:date>2021-09-23T11:03:12Z</dc:date>
    <item>
      <title>Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/125078#M18067</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;Forgive me if this has been asked before, I could not find any posts which answered this... currently have Identity Awareness configured and using NTLMv1. Planning to migrate to NTLMv2.&lt;/P&gt;&lt;P&gt;Version R80.40 181&lt;/P&gt;&lt;P&gt;Reviewed ...&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_IdentityAwareness_AdminGuide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_IdentityAwareness_AdminGuide/148701" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_IdentityAwareness_AdminGuide/Topics-IDAG/Configuring-Identity-Sources-Configuring-AD-Query.htm?Highlight=ntlm&lt;BR /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Would like to confirm the steps for a platform already using IA.&lt;/P&gt;&lt;P&gt;After step ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;EM&gt;On the &lt;SPAN class="mc-variable Vars_Other.tp_sms variable"&gt;Security Management Server&lt;/SPAN&gt;:&lt;/EM&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;EM&gt;Connect to the command line.&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;EM&gt;Log in to the &lt;SPAN class="mc-variable Vars_Other.tp_expert_mode variable"&gt;Expert mode&lt;/SPAN&gt;.&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;EM&gt;Run:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;adlogconfig a&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;EM&gt;Enter the number of this option:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Use &lt;SPAN class="SearchHighlight SearchHighlight1"&gt;NTLM&lt;/SPAN&gt;v2&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;EM&gt;Enter the number of this option:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Exit and save&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My concern is step (c). Do you need to disable / enable IA blade - then run back through the wizard to essentially reinstall IA?&lt;/P&gt;&lt;P&gt;Just need a little clarification.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Shane&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jul 2021 04:10:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/125078#M18067</guid>
      <dc:creator>checkandmate</dc:creator>
      <dc:date>2021-07-28T04:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/125082#M18069</link>
      <description>&lt;P&gt;Pretty sure this is not required.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jul 2021 05:43:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/125082#M18069</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-28T05:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/128293#M18679</link>
      <description>&lt;P&gt;Thanks for the prompt response &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Aug 2021 04:55:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/128293#M18679</guid>
      <dc:creator>checkandmate</dc:creator>
      <dc:date>2021-08-29T04:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/129962#M19077</link>
      <description>&lt;P&gt;how would you validate the change from the checkpoint estate? if disabling and re-enabling/configuring the blade isn't necessary can the instructions be updated?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 15:35:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/129962#M19077</guid>
      <dc:creator>LazarusG</dc:creator>
      <dc:date>2021-09-22T15:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/129964#M19078</link>
      <description>&lt;P&gt;I assume you can see the changes reflected in the adlogconfig output.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 15:38:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/129964#M19078</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-22T15:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/130060#M19087</link>
      <description>&lt;P&gt;indeed so - thank you, also seems you can revert the setting by choosing option 21 again from adlogconfig a&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;[ ] Override configuration&lt;BR /&gt;[ ] Enable Adlog&lt;BR /&gt;[ ] Enable log for login or logoff&lt;BR /&gt;[ ] Use log original creation time&lt;BR /&gt;Association timeout : 0&lt;BR /&gt;Full Name Query Interval (days, 0=disabled) : 0&lt;BR /&gt;Full Name Fetch Hour : 0&lt;BR /&gt;Multi-user host Detection Threshold: 7&lt;BR /&gt;Revoked user timeout interval : 14400&lt;BR /&gt;[X] Enable Multi-User Host persistence DB&lt;BR /&gt;Multi-User Host persistence machine timeout (minutes): 2592000&lt;BR /&gt;Service Account Detection Threshold: 10&lt;BR /&gt;[ ] Automatically Exclude Service Accounts&lt;BR /&gt;[ ] Override default communication parameters&lt;BR /&gt;Query Within count : 0&lt;BR /&gt;Query Max returned objects in each iteration: 0&lt;BR /&gt;[X] Disable password expiration check&lt;BR /&gt;[X] Use NTLMv2 &amp;lt;===========you are correct!&lt;BR /&gt;[ ] Single User Assumption&lt;BR /&gt;[ ] Don't report machines&lt;BR /&gt;[X] LDAP groups update notifications&lt;BR /&gt;Notifications accumulation time : 10 (sec)&lt;BR /&gt;[X] Notify only user-related LDAP changes&lt;BR /&gt;[ ] Prefer IPv6 DC addresses&lt;BR /&gt;[1] WMI query Type&lt;/P&gt;&lt;P&gt;====================================================&lt;/P&gt;&lt;P&gt;1 - Override file&lt;BR /&gt;2 - AD Log feature&lt;BR /&gt;3 - Enable log for login or logoff&lt;BR /&gt;4 - Use log original creation time&lt;BR /&gt;5 - Association timeout&lt;BR /&gt;6 - Full Name Query Interval&lt;BR /&gt;7 - Full Name Fetch Hour&lt;BR /&gt;8 - Add Domain name&lt;BR /&gt;9 - Delete Domain&lt;BR /&gt;10 - Username&lt;BR /&gt;11 - Password&lt;BR /&gt;12 - Domain Controllers&lt;BR /&gt;13 - Change Multi-User detection threshold&lt;BR /&gt;14 - Change Revoked User timeout interval&lt;BR /&gt;15 - Multi-User Host Persistence DB&lt;BR /&gt;16 - Multi-User Host Persistence machine timeout&lt;BR /&gt;17 - Override Default Communication Parameters&lt;BR /&gt;18 - Query Within interval&lt;BR /&gt;19 - Max returned objects in each iteration&lt;BR /&gt;20 - Password expiration check&lt;BR /&gt;21 - Use NTLMv2&lt;BR /&gt;22 - Single User Assumption&lt;BR /&gt;23 - Change Service Account Detection Threshold&lt;BR /&gt;24 - Ignore Events From Different Domains&lt;BR /&gt;25 - Automatically Exclude Service Accounts&lt;BR /&gt;26 - Don't report machines&lt;BR /&gt;27 - Turn LDAP groups update on/off&lt;BR /&gt;28 - Notifications accumulation time&lt;BR /&gt;29 - Update only user-related LDAP changes&lt;BR /&gt;30 - Prefer IPv6 DC addresses&lt;BR /&gt;31 - WMI Query Type&lt;BR /&gt;32 - Exit without saving&lt;BR /&gt;33 - Exit and save&lt;/P&gt;&lt;P&gt;Please enter your choice: 33&lt;BR /&gt;- Saving configuration file '/opt/CPsuite-R81.10/fw1/conf/ad_log_override.C'&lt;BR /&gt;Note: you can run 'adlogconfig a -test domainName' in order to test connectivity&lt;BR /&gt;[Expert@r81mgmt:0]# adlogconfig&lt;/P&gt;&lt;P&gt;adlogconfig usage:&lt;BR /&gt;adlogconfig l [-test domainName] - if you are using Identity Logging&lt;BR /&gt;adlogconfig a [-test domainName] - if you are using AD Query (Identity Awareness)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do suspect the steps to disable and re-enable the identity awareness blade are necessary though and i expect we can only validate gateways are doing ntlmv2 in packet captures(?)&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 11:03:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/130060#M19087</guid>
      <dc:creator>LazarusG</dc:creator>
      <dc:date>2021-09-23T11:03:12Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/150421#M24418</link>
      <description>&lt;P&gt;Hi, Can you please confirm if this apply for R80.30 too. Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2022 12:56:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/150421#M24418</guid>
      <dc:creator>Edi</dc:creator>
      <dc:date>2022-06-08T12:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/150461#M24421</link>
      <description>&lt;P&gt;After I made the initial change / tested, we confirmed IA was still reaching out to AD via NTLMv1. We are utilising R81.&lt;/P&gt;&lt;P&gt;Reaching out to TAC they recommended reinstalling IA, ie.. general properties, disable / reenable IA (without OK) and follow the wizard. This has now been done on CP, and Im waiting from monitoring back from Server.&lt;/P&gt;&lt;P&gt;Once I have the results.. .I will post again.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2022 03:52:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/150461#M24421</guid>
      <dc:creator>checkandmate</dc:creator>
      <dc:date>2022-06-09T03:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/151562#M24855</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/66589"&gt;@checkandmate&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm looking at the same thing, did this work for you? Can you share your feedback on the procedure?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 10:25:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/151562#M24855</guid>
      <dc:creator>ThierryReboul</dc:creator>
      <dc:date>2022-06-23T10:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/154445#M26170</link>
      <description>&lt;P&gt;This was extremely helpful for me. Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2022 13:03:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/154445#M26170</guid>
      <dc:creator>AndreasD</dc:creator>
      <dc:date>2022-08-03T13:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/154484#M26187</link>
      <description>&lt;P&gt;Update&lt;/P&gt;&lt;P&gt;After performing the above procedure we still found NTLMv1 traffic reaching out to the DC's. Another ticket was raised with TAC and confirmed this is expected behavior. See CP reply :-&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;"As we discussed over the phone,&amp;nbsp; even you move to NTLMv2, the gateway will still show the NTLMv1. Even if the GW is set to use v2, it still tries v1 before anything else.&amp;nbsp;If&amp;nbsp; the SMS output of "adlogconfig" shows&amp;nbsp;Use NTLMv2, then the database will be pushed to FW to use NTLMv2&lt;BR /&gt;&lt;BR /&gt;Regards,"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 00:39:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/154484#M26187</guid>
      <dc:creator>checkandmate</dc:creator>
      <dc:date>2022-08-04T00:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: Switching Identity Awareness AD - NTLMv1 to NTLMv2</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/207006#M39124</link>
      <description>&lt;P&gt;I see this old post, but from my changes I been making on the mgmt via adlogconfig a or l i have to issue this command once exit and save to reconfigure with new settings.&lt;/P&gt;&lt;P&gt;adlog l control reconf&lt;/P&gt;&lt;P&gt;adlog a control reconf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2024 10:47:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Switching-Identity-Awareness-AD-NTLMv1-to-NTLMv2/m-p/207006#M39124</guid>
      <dc:creator>frankcar</dc:creator>
      <dc:date>2024-02-23T10:47:08Z</dc:date>
    </item>
  </channel>
</rss>

