The administration and maintenance of Microsoft Exchange Server to ensure secure, reliable, and efficient email and collaboration services across an organization.
As far as I know, this behavior occurs because the CU1 update automatically hardens the authentication methods of the IIS virtual directories to "Negotiate:Kerberos" to enhance security and phase out NTLM.
So, we can say that there are no hidden registry keys or system configurations available to enable an automatic NTLM grace period, which means legacy devices incapable of processing Kerberos tickets are immediately denied access at the server level.
In order to resolve this permanently and maintain future stability, you must manually configure Service Principal Names (SPNs) for all load-balancer aliases to satisfy the Kerberos authentication requirements.
Additionally, for immediate emergency service restoration, you can temporarily use PowerShell to inject NTLM back into the IISAuthenticationMethods parameter for specific endpoints (such as using the Set-WebServicesVirtualDirectory cmdlet).
Run the following commands to force the system to accept NTLM alongside Negotiate (Kerberos) for EWS and Autodiscover—the two endpoints most commonly used by legacy devices and internal apps.
For EWS:
Set-WebServicesVirtualDirectory -Identity "YOUR_SERVER_NAME\EWS (Default Web Site)" -IISAuthenticationMethods Ntlm, Negotiate
For Autodiscover:
Set-AutodiscoverVirtualDirectory -Identity "YOUR_SERVER_NAME\Autodiscover
Hope this helps
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.