Windows NT LAN Manager (NTLM) protocol used for Client-Server authentication and NTLM Security Support Provider (NTLMSSP) allows negotiation of challenge-response authentication. NTLM is mostly used for backward compatibility and was replaced by Kerberos. It is considered not secure as it uses outdated cryptography that is vulnerable to several modes of attacks such as brute force and pass-the-hash attacks.
This is just an informational level signature used to detect when NTLMSSP is used to authenticate and this is not an indication of an attack. The default action is Alert which should not be impacting any production traffic. Significant amount of Alert logs for this particular Threat ID 92322 may be generated if you are using NTLMSSP in your environment, please set an exception with action allow for Threat ID 92322 in the specific Vulnerability Profile attached to the Security Policy .
Hope this resolves your Query !!
--If the reply is helpful, please Upvote and Accept it as an answer–