Thanks Steve,
there was a paragraph in the Windows Server Hardening
guide that covered dsiabling nullsessionhares and
nullsessionpipes that was helpful.
I don't know about that restricting anonymous access KB
article tho, that looks scary.
-----Original Message-----
Apparently they don't know how to do it. Kind of like
going to a doctor and he tells
you that you are sick but not what to do.
Here is a KB that discusses the use of those a bit.
http://support.microsoft.com/default.aspx?kbid=289655
There is a setting in Domain Controller Security Policy
security options for
additional restrictions for anonymous connection that if
you set to no access without
explicit anonymous permissions will disable the ability
to use null shares/named
pipes HOWEVER this can break things in a domain and cause
problems with downlevel
trusts, network browsing, and even changing passwords
before logging on particularly
if downlevel [NT, W9X] and even XP Pro computers are
used. I wonder if they knew that
before they told you to turn it off. The KB below
explains restricting anonymous
access and the possible ramifications.
http://support.microsoft.com/?kbid=246261 -- pay
attention to "The following tasks
are restricted when the RestrictAnonymous registry value
is set to 2 on a Windows
2000-based domain controller"
The Windows 2000 Security Hardening Guide also has more
info on W2K security,
including recommendations for specific networking
configurations. --- Steve
http://www.microsoft.com/technet/Security/prodtech/win2000
/win2khg/05sconfg.mspx --
chapter 5 W2SHG.
message
Does anyone know how to disable null sessions on domain
controllers?
Our auditors told us to turn off
nullsessionpipes\nullsessionshares on our domain
controllers.
But they didn't tell us what values to set them to.
Would anyone know?
Thanks!
.