19.06.2014 Views

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.3.46 Network access: Remotely accessible registry paths<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedexactpaths\machi<br />

ne=7,<br />

The ‘allowedexactpaths\machine’ registry value defines which registry paths can be accessed<br />

over the network. This <strong>Baseline</strong> configuration has no requirement for remotely accessible<br />

registry information.<br />

4.4.3.47 Network access: Remotely accessible registry paths and Sub-paths<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedpaths\machine=7,<br />

The ‘allowedpaths\machine’ registry value defines registry paths and sub-paths that can be<br />

accessed over the network. This <strong>Baseline</strong> configuration has no requirement for remotely<br />

accessible registry information.<br />

4.4.3.48 Network access: Restrict anonymous access to Named Pipes and Shares<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\restrictnullsessaccess=4,<br />

1<br />

The ‘restrictnullsessaccess’ registry value determines if anonymous access is allowed to named<br />

pipes and shares. The setting ‘1’ disallows anonymous access to named pipes and shares. Access<br />

to resources is predicated on authorization for that resource. If anonymous access is granted,<br />

there would be no ability to identify who is accessing the objects.<br />

4.4.3.49 Network access: Shares that can be accessed anonymously<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionshares=7,<br />

The ‘nullsessionshares’ registry value defines which shares can be accessed anonymously over<br />

the network. The empty setting disallows anonymous access to any share. All system access<br />

should be authorized. Anonymous access prevents accurate authorization of shares.<br />

4.4.3.50 Network access: Sharing and security model for local accounts<br />

machine\system\currentcontrolset\control\lsa\forceguest=4, 0<br />

The ‘forceguest’ registry value determines the sharing and security model for local accounts. The<br />

setting ‘0’ requires user authentication to access resources. This allows individual access to be<br />

audited.<br />

<strong>Server</strong> Policy Files March 2004 65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!