• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 6133
  • Last Modified:

Vista Home Basic -- Samba Network Shares not working Cannot enable LM & NTLM

We got a new Vista Home Basic computer at work ... We have a Server running Nitix - Samba ... and the vista Machine cannot connect to any network shares on it..

The following is the instructions that I find online to fix the problem::::

Click "Start -> Run." Then, type in the Run field: "secpol.msc." That will bring you to Vista's security policy system. Once there, use "Go to: Local Policies > Security Options" and then find "Network Security: LAN Manager" authentication level. Once there, change the Setting from "Send NTLMv2 response only" to "Send LM & NTLM -- use NTLMv2 session security if negotiated."


The problem is that on vista Home Basic there is no secpol.msc....
Does anyone know another way to enable NTLM ??????
0
joncrezk
Asked:
joncrezk
  • 3
  • 2
1 Solution
 
ShineOnCommented:
This could be one of those things Microsoft did to "home basic" to make it unusable in a business network...  It's possible that it's not possible.

However, anything that has a group policy setting also very likely has a registry setting to match.  The trick is finding out what registry setting you need to change or add, and having access permissions to make registry changes.

If they carried most of the registry structure over from XP (As they tend to do) then it could be in HKLM\SYSTEM\CurrentControlSet\Services\LanManWorkstation or it could be in HKLM\SYSTEM\CurrentControlSet\Control\Lsa\

I have no idea what would need to be set or changed, but it would be related to the lanman security level, I suppose...

0
 
joncrezkAuthor Commented:
Shineon I see where your going with this and

HKLM\SYSTEM\CurrentControlSet\Services\LanManWorkstation

Is definately in Vista now I just need to figure out what changes to make...

0
 
ShineOnCommented:
Found it.

HKLM\SYSTEM\CurrentControlSet\Control\Lsa\LmCompatibilityLevel

It should be a choice of 5 hex values.
0=send LM & NTLM responses  (never uses NTLMv2)
1=Send LM & NTLM - use NTLMv2 session security if negotiated
2=Send NTLM response only, use NTLMv2 if server supports it.
3=Send NTLMv2 response only, if DC accept LM, NTLM and NTLMv2 auth, use NTLMv2 security if supported.
4=Send NTLMv2 response only, if DC refuse LM, accept NTLM or NTLMv2 auth, use NTLMv2 security if supported.
5=Send NTLMv2 response only, if DC,refuse LM & NTLM and only accept NTLMv2 auth, use NTLMv2 security if supported.
0
 
joncrezkAuthor Commented:
Shineon I will be trying this out at the office tomorrow.

If it works I owe you one and you will be receiving the 250 points.

Thanks a lot pal I REALLY appreciate it.
0
 
joncrezkAuthor Commented:
Worked great man.

I am giving you the points now thanks
0

Featured Post

The 14th Annual Expert Award Winners

The results are in! Meet the top members of our 2017 Expert Awards. Congratulations to all who qualified!

  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now