You probably do not have a security breach if just anonymous access is showing in the
logs. Anonymous access or "null" sessions are used in Windows networking for things
like maintaining the browse list [probably main reason] , and users changing
passwords before expiring. If you have downlevel clients you may see more than in a
all W2K/XP Pro network. A security breach would be indicated more by lots of
unexplained failed logons in the security log, particularly of the administrator
account, and account lockouts. The link below can explain more. I am not advocating
you make the change it discusses on domain controllers, but read the paste under the
link. --- Steve
http://support.microsoft.com/?kbid=246261
"The following tasks are restricted when the RestrictAnonymous registry value is set
to 2 on a Windows 2000-based domain controller:
a.. Down-level member workstations or servers are not able to set up a netlogon
secure channel.
b.. Down-level domain controllers in trusting domains are not be able to set up a
netlogon secure channel.
c.. Microsoft Windows NT users are not able to change their passwords after they
expire. Also, Macintosh users are not able to change their passwords at all.
d.. The Browser service is not able to retrieve domain lists or server lists from
backup browsers, master browsers or domain master browsers that are running on
computers with the RestrictAnonymous registry value set to 2. Because of this, any
program that relies on the Browser service does not function properly"