3.018 - Anonymous shares are not restricted.

Information

This is a Category 1 finding because it allows anonymous logon users (null session connections) to list all account names and enumerate all shared resources, thus providing a map of potential points to attack the system.

Solution

Configure the policy values for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> 'Network access: Do not allow anonymous enumeration of SAM accounts' and 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2008_DC_V6R47_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10), CAT|I, CCI|CCI-001090, CSCv6|16, Rule-ID|SV-28983r1_rule, STIG-ID|3.018, Vuln-ID|V-1093

Plugin: Windows

Control ID: cb095b3aecfbc0cf4eb5fa44477b508f15555c869c9967ee97afac28a89ffb59