
50
Control\Terminal
Server;
System\CurrentControl
Set\
Control\Terminal
Server\ UserConfig;
System\CurrentControl
Set\
Control\Terminal
Server\
DefaultUserConfigurati
on;
Software\Microsoft\W
indows
NT\CurrentVersion\Per
flib;
System\CurrentControl
Set\ Services\
SysmonLog
Control\Terminal
Server;
System\CurrentControl
Set\
Control\Terminal
Server\ UserConfig;
System\CurrentControl
Set\
Control\Terminal
Server\
DefaultUserConfigurati
on;
Software\Microsoft\W
indows
NT\CurrentVersion\Per
flib;
System\CurrentControl
Set\ Services\
SysmonLog
Control\Terminal
Server;
System\CurrentControl
Set\
Control\Terminal
Server\ UserConfig;
System\CurrentControl
Set\
Control\Terminal
Server\
DefaultUserConfigurati
on;
Software\Microsoft\W
indows
NT\CurrentVersion\Per
flib;
System\CurrentControl
Set\ Services\
SysmonLog
Control\Terminal
Server;
System\CurrentControl
Set\
Control\Terminal
Server\ UserConfig;
System\CurrentControl
Set\
Control\Terminal
Server\
DefaultUserConfigurati
on;
Software\Microsoft\W
indows
NT\CurrentVersion\Per
flib;
System\CurrentControl
Set\ Services\
SysmonLog
The
Network access: Remotely accessible registry paths and sub-paths
security option setting
determines which registry paths and sub-paths can be accessed over the network. It is recommended
to enforce the default setting in the baseline security templates for all three security environments
defined in this guide.
Network access: Restrict anonymous access to Named Pipes and Shares
Member Server Default
Legacy Client
Enterprise Client
High Security Client
Enabled Enabled Enabled Enabled
The
Network access: Restrict anonymous access to Named Pipes and Shares
security option setting
restricts anonymous access to shares and named pipes when it is enabled to the settings for:
•
Network access: Named pipes that can be accessed anonymously
•
Network access: Shares that can be accessed anonymously
This setting is configured to the default for the three environments defined in this guide.
Network access: Shares that can be accessed anonymously
Member Server Default
Legacy Client
Enterprise Client
High Security Client
COMCFG,DFS$ None
None
None
Important:
Enabling this Group Policy setting is very dangerous; any shares that are listed can be
accessed by any network user. This could lead to the exposure or corruption of sensitive corporate
data. However, administrators within multi-protocol heterogeneous environments may need to check