Hello CMIT2
Based on the details you provided, the behavior you are seeing is consistent with NTLM hardening changes introduced in Windows 11 24H2. Microsoft has disabled NTLMv1 by default and tightened SMB signing requirements. If the affected workstation is negotiating NTLM incorrectly or caching a corrupted credential, authentication will fail even though the same credentials succeed from other clients.
To isolate the issue, I recommend forcing NTLMv2 only on the client by setting LmCompatibilityLevel to 5 under HKLM\SYSTEM\CurrentControlSet\Control\Lsa. You should also check the SMB client configuration with Get-SmbClientConfiguration and confirm whether RequireSecuritySignature is enabled. If the server does not support signing, temporarily disable it with Set-SmbClientConfiguration -RequireSecuritySignature $false. Additionally, clear any cached credentials using cmdkey /list and cmdkey /delete:<target> to ensure no stale entries remain.
On the server side, enabling NTLM auditing will confirm whether the client is attempting NTLMv1 or malformed NTLMv2. If you see repeated failures only from this workstation, it is likely a local stack corruption introduced during the 24H2 upgrade. Running dism /online /cleanup-image /restorehealth can repair the SMB client components.
If none of these steps resolve the issue, you may be encountering a regression in the NTLM stack specific to 24H2. In that case, opening a support case with Microsoft is the most reliable path forward, as only they can confirm and provide a hotfix if required.
I hope you've found something useful here. If it helps you get more insight into the issue, it's appreciated to accept the answer. Should you have more questions, feel free to leave a message. Have a nice day!
Harry.