3.019 - Anonymous enumeration of SAM accounts will not be allowed.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

This is a Category 1 finding as it allows anonymous logon users (null session connections) to list all account names, thus providing a list of potential points to attack the system.

Solution

Configure the policy values for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> 'Network access: Do not allow anonymous enumeration of SAM accounts' to 'Enabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2008_R2_MS_V1R33_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10), CAT|I, CCI|CCI-000366, CSCv6|16, Rule-ID|SV-33732r1_rule, STIG-ID|3.019, Vuln-ID|V-26283

Plugin: Windows

Control ID: 6a1961bbb6b9f8802906dfbb8970151401eeb4236811880a1e51ed37d7dc84aa