Hello @Persson, Magnus (SE-TLX)
This may be achieved by enabling NTLMv2 for the local accounts changing the next registry:
-in: HKEY_LOCAL_MACHINE, then SYSTEM, CurrentControlSet, Control, and finally LSA.
-In the right pane, double-click the LMCompatibilityLevel value.
-In the "Data" field of the DWORD Editor window, enter 5. Click OK.
-In the Registry menu, select Exit.
-Restart your system for the registry changes to take effect.
I can recommend you also the next thread where there is a current open discussion about this change (since the phase 1) nd the different effects and workarounds found by the community: https://learn.microsoft.com/en-us/answers/questions/564347/server-2019-update-kb5005568-sept-2021-forcing-new.html?page=2&pageSize=10&sort=oldest
Besides that, here is more information about the exploit: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26414
Hope this helps with your query,
------
--If the reply is helpful, please Upvote and Accept as answer--