Kerberos.
Of course.
Yes the kerberos the std protocol used by AD earlier version used NTLM
kerberos version 5 NTLM protocols are used by AD
"Kerberos" is a network security system, designed to prevent unauthorised access to sensitive data. The system is dependent on passwords and is used on computers operating in the Windows environment.
Kerberos is the default protocol used by Windows Vista/XP
Kerberos is the default protocol used by Window 2000/XP.
NTLM AND kerberos Microsoft adopted Kerberos as the preferred authentication protocol for Windows 2000 and subsequent Active Directory domains.[5] Kerberos is typically used when a server belongs to a Windows Server domain, or if a trust relationship with a Windows Server Domain is established in some other way (such as Linux to Windows AD authentication).[citation needed] NTLM is still used in the following situations: * The client is authenticating to a server using an IP address. * The client is authenticating to a server that belongs to a different Active Directory forest that has a legacy NTLM trust instead of a transitive inter-forest trust * The client is authenticating to a server that doesn't belong to a domain. * No Active Directory domain exists (commonly referred to as "workgroup" or "peer-to-peer"). * Where a firewall would otherwise restrict the ports required by Kerberos (of which there are quite a few) In Windows Vista and above, neither LM nor NTLM are used by default[citation needed]. NTLM is still supported for inbound authentication, but for outbound authentication a newer version of NTLM, called NTLMv2, is sent by default instead. Prior versions of Windows (back as far as Windows NT 4.0 Service Pack 4) could be configured to behave this way, but it was not the default.
== == I am not to sure, but it should be as long it is the same version or a newer version. IT MAY NOT WORK with older versions.
Windows 7 is commonly used on client computers.
TCP Port 88
dos