<SNIP> XP also has a second, not very well documented registry value called
RestrictAnonymousSam. For information on it, don't bother trying to search
the Microsoft site, it hasn't been there for over two years, last time I checked.
<SNIP> Possibly an article on that has been added in the past few months <SNIP>
Searching for RestrictAnonymousSam (no other "options" selected) using the
Microsoft_com Advanced Search Web Site
http://search.microsoft.com/search/search.aspx?st=a&View=en-us
returns the following hit:
TechNet Home | Security | Security Topics | Hardening Systems and Servers -
Checklists and Guides | Threats and Countermeasures Guide:
Chapter 5 - Security Options
http://www.microsoft.com/technet/tr...chnet/security/topics/hardsys/TCG/TCGCH05.asp
< BEGIN QUOTE>
Network access: Do not allow anonymous enumeration of SAM accounts
The Network access: Do not allow anonymous enumeration of SAM accounts setting
determines what additional permissions will be granted for anonymous connections to
the computer.
Windows allows anonymous users to perform certain activities, such as enumerating the
names of domain accounts and network shares. This is convenient, for example, when an
administrator wants to grant access to users in a trusted domain that does not
maintain a reciprocal trust. By default, an anonymous user has the same access that
is granted to the Everyone group for a given resource.
Note This setting has no impact on domain controllers.
In Windows 2000, a similar setting called Additional Restrictions for Anonymous
Connections managed a registry value called RestrictAnonymous, located in the
HKLM\SYSTEM\CurrentControlSet\Control\LSA registry key. In Windows Server 2003, the
policies called Network access: Do not allow anonymous enumeration of SAM accounts
and Network access: Do not allow anonymous enumeration of SAM accounts and shares
replace the Windows 2000 setting. They manage registry values called
RestrictAnonymousSAM and RestrictAnonymous respectively, both located in the
HKLM\System\CurrentControlSet\Control\Lsa\ registry key.
The possible values for this Group Policy setting are:
Enabled
Disabled
Not defined
Vulnerability
An unauthorized user could anonymously list account names and use the information to
attempt to guess passwords or perform social engineering attacks. Social engineering
is a hacker term for tricking people into revealing their password or some form of
security information.
Countermeasure
Configure Network access: Do not allow anonymous enumeration of SAM accounts to
Enabled.
Potential Impact
It will be impossible to establish trusts with NT 4.0 - based domains. This setting
will also cause problems with down - level clients such as Windows NT 3.51 and
Windows 95 that are trying to use resources on the server.
< END QUOTE>