NTLM is a suite of authentication and session security protocols used in various Microsoft® network protocol implementations. Originally used for authentication and negotiation of secure DCE/RPC, NTLM is now used throughout Microsoft's systems as an integrated single sign-on mechanism. It is recognized as part of the Integrated Windows Authentication stack for HTTP authentication; however, it is also used in Microsoft implementations of SMTP, POP3, and IMAP (all part of Exchange). Sniffers decode NTLM authentication exchanges between clients and web servers, and extract the user name that end users enter when logging into an NTLM-enabled system. 
 
To enable Foglight to capture the user names, all you need to do is add a username rule called Authorization. No other action is required. If you use the Discovery tool, the Authorization username shows up in the list whenever NTLM exchanges are found in the monitored traffic.
 
You can create a username rule to capture the contents of variable2 (which contains the user name) using this format: