J
John Wilks
My company network gets audited by an outside security
firm every month and what they do it to try to find an
exploit in my network either from the firewalls to the
servers and clients. I get this report saying that a
couple of my servers allow anonymous null SMB sessions.
They told me that and I knew it also that I can lock it
down by not allowing anonymous sessios by changing the
setting "Additional restrictions for anonymous
connections" in the domain security policy to "No access
without explicit anonymous permissions".
It just one thing I already had this as the setting. I
checked the registry and it has the right setting also. I
checked the servers, made the local security policy the
same setting just to be sure and it was already set that
way. When I got the second report it had the same SMB
null session warning for the same servers. Any
suggestions on how I can fix this would be appreciated.
firm every month and what they do it to try to find an
exploit in my network either from the firewalls to the
servers and clients. I get this report saying that a
couple of my servers allow anonymous null SMB sessions.
They told me that and I knew it also that I can lock it
down by not allowing anonymous sessios by changing the
setting "Additional restrictions for anonymous
connections" in the domain security policy to "No access
without explicit anonymous permissions".
It just one thing I already had this as the setting. I
checked the registry and it has the right setting also. I
checked the servers, made the local security policy the
same setting just to be sure and it was already set that
way. When I got the second report it had the same SMB
null session warning for the same servers. Any
suggestions on how I can fix this would be appreciated.