WN19-SO-000230 - Windows Server 2019 must not allow anonymous enumeration of shares.

Information

Allowing anonymous logon users (null session connections) to list all account names and enumerate all shared resources can provide a map of potential points to attack the system.

Solution

Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V3R2_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-4, CAT|I, CCI|CCI-001090, Rule-ID|SV-205724r958524_rule, STIG-ID|WN19-SO-000230, STIG-Legacy|SV-103623, STIG-Legacy|V-93537, Vuln-ID|V-205724

Plugin: Windows

Control ID: 4b06b41683278323ab8730d860fdb8b26162055487dc643a56df79f816033716