diff --git a/windows/keep-secure/network-access-allow-anonymous-sidname-translation.md b/windows/keep-secure/network-access-allow-anonymous-sidname-translation.md index ce3d50eac0..6c14b5a06f 100644 --- a/windows/keep-secure/network-access-allow-anonymous-sidname-translation.md +++ b/windows/keep-secure/network-access-allow-anonymous-sidname-translation.md @@ -2,90 +2,96 @@ title: Network access Allow anonymous SID/Name translation (Windows 10) description: Describes the best practices, location, values, policy management and security considerations for the Network access Allow anonymous SID/Name translation security policy setting. ms.assetid: 0144477f-22a6-4d06-b70a-9c9c2196e99e -ms.pagetype: security ms.prod: W10 ms.mktglfcycl: deploy ms.sitesec: library +ms.pagetype: security author: brianlic-msft --- + # Network access: Allow anonymous SID/Name translation + **Applies to** - Windows 10 + Describes the best practices, location, values, policy management and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting. + ## Reference + This policy setting enables or disables the ability of an anonymous user to request security identifier (SID) attributes for another user. + If this policy setting is enabled, a user might use the well-known Administrators SID to get the real name of the built-in Administrator account, even if the account has been renamed. That person might then use the account name to initiate a brute-force password-guessing attack. + Misuse of this policy setting is a common error that can cause data loss or problems with data access or security. + ### Possible values + - Enabled + An anonymous user can request the SID attribute for another user. An anonymous user with knowledge of an administrator's SID could contact a computer that has this policy enabled and use the SID to get the administrator's name. This setting affects the SID-to-name translation as well as the name-to-SID translation + - Disabled + Prevents an anonymous user from requesting the SID attribute for another user. + - Not defined + ### Best practices + - Set this policy to Disabled. This is the default value on member computers; therefore, it will have no impact on them. The default value for domain controllers is Enabled. + ### Location + Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options + ### Default values + The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. -
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Note defined |
-
Stand-Alone Server Default Settings |
-Disabled |
-
DC Effective Default Settings |
-Enabled |
-
Member Server Effective Default Settings |
-Disabled |
-
Client Computer Effective Default Settings |
-Disabled |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Disabled |
-
DC Effective Default Settings |
-Disabled |
-
Member Server Effective Default Settings |
-Disabled |
-
Client Computer Effective Default Settings |
-Disabled |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Enabled |
-
DC Effective Default Settings |
-Enabled |
-
Member Server Effective Default Settings |
-Enabled |
-
Client Computer Effective Default Settings |
-Enabled |
-
Server type or Group Policy Object (GPO) | -Default value | -
---|---|
Default domain policy |
-Disabled |
-
Default domain controller policy |
-Disabled |
-
Stand-alone server default settings |
-Disabled |
-
Domain controller effective default settings |
-Not defined |
-
Member server effective default settings |
-Not defined |
-
Effective GPO default settings on client computers |
-Not defined |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Disabled |
-
DC Effective Default Settings |
-Disabled |
-
Member Server Effective Default Settings |
-Disabled |
-
Client Computer Effective Default Settings |
-Disabled |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Netlogon, samr, lsarpc |
-
Stand-Alone Server Default Settings |
-Null |
-
DC Effective Default Settings |
-Netlogon, samr, lsarpc |
-
Member Server Effective Default Settings |
-Not defined |
-
Client Computer Effective Default Settings |
-Not defined |
-
Named pipe | -Purpose | -
---|---|
COMNAP |
-SNABase named pipe. Systems network Architecture (SNA) is a collection of network protocols that were originally developed for IBM mainframe computers. |
-
COMNODE |
-SNA Server named pipe. |
-
SQL\QUERY |
-Default named pipe for SQL Server. |
-
SPOOLSS |
-Named pipe for the Print Spooler service. |
-
EPMAPPER |
-End Point Mapper named pipe. |
-
LOCATOR |
-Remote Procedure Call Locator service named pipe. |
-
TrlWks |
-Distributed Link Tracking Client named pipe. |
-
TrkSvr |
-Distributed Link Tracking Server named pipe. |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-See the following registry key combination |
-
DC Effective Default Settings |
-See the following registry key combination |
-
Member Server Effective Default Settings |
-See the following registry key combination |
-
Client Computer Effective Default Settings |
-See the following registry key combination |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-See the following registry key combination |
-
DC Effective Default Settings |
-See the following registry key combination |
-
Member Server Effective Default Settings |
-See the following registry key combination |
-
Client Computer Effective Default Settings |
-See the following registry key combination |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Enabled |
-
DC Effective Default Settings |
-Enabled |
-
Member Server Effective Default Settings |
-Enabled |
-
Client Computer Effective Default Settings |
-Enabled |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Not defined |
-
DC Effective Default Settings |
-Not defined |
-
Member Server Effective Default Settings |
-Not defined |
-
Client Computer Effective Default Settings |
-Not defined |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Classic (local users authenticate as themselves) |
-
DC Effective Default Settings |
-Classic (local users authenticate as themselves) |
-
Member Server Effective Default Settings |
-Classic (local users authenticate as themselves) |
-
Client Computer Effective Default Settings |
-Classic (local users authenticate as themselves) |
-
Setting | -Windows Server 2008 and Windows Vista | -At least Windows Server 2008 R2 and Windows 7 | -
---|---|---|
Enabled |
-Services running as Local System that use Negotiate will use the computer identity. This might cause some authentication requests between Windows operating systems to fail and log an error. |
-Services running as Local System that use Negotiate will use the computer identity. This is the default behavior. |
-
Disabled |
-Services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously. This is the default behavior. |
-Services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously. |
-
Neither |
-Services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously. |
-Services running as Local System that use Negotiate will use the computer identity. This might cause some authentication requests between Windows operating systems to fail and log an error. |
-
Server type or Group Policy object (GPO) | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-Not applicable |
-
Member server effective default settings |
-Not applicable |
-
Effective GPO default settings on client computers |
-Not defined |
-
Server type or Group Policy Object (GPO) | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-Not applicable |
-
Member server effective default settings |
-Not applicable |
-
Effective GPO default settings on client computers |
-Not applicable |
-
Server type or Group Policy Object (GPO) | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-Disabled |
-
Member server effective default settings |
-Disabled |
-
Effective GPO default settings on client computers |
-Disabled |
-
Encryption type | -Description and version support | -
---|---|
DES_CBC_CRC |
-Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function -Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7 and Windows Server 2008 R2 operating systems do not support DES by default. |
-
DES_CBC_MD5 |
-Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function -Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7 and Windows Server 2008 R2 operating systems do not support DES by default. |
-
RC4_HMAC_MD5 |
-Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function -Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. |
-
AES128_HMAC_SHA1 |
-Advanced Encryption Standard in 128 bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1). -Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003. Supported in Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. |
-
AES256_HMAC_SHA1 |
-Advanced Encryption Standard in 256 bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1). -Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003. Supported in Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. |
-
Future encryption types |
-Reserved by Microsoft for additional encryption types that might be implemented. |
-
Server type or Group Policy Object (GPO) | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-None of these encryption types that are available in this policy are allowed. |
-
Member server effective default settings |
-None of these encryption types that are available in this policy are allowed. |
-
Effective GPO default settings on client computers |
-None of these encryption types that are available in this policy are allowed. |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Enabled |
-
DC Effective Default Settings |
-Enabled |
-
Member Server Effective Default Settings |
-Enabled |
-
Client Computer Effective Default Settings |
-Enabled |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Disabled |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Disabled |
-
DC Effective Default Settings |
-Disabled |
-
Member Server Effective Default Settings |
-Disabled |
-
Client Computer Effective Default Settings |
-Disabled |
-
Setting | -Description | -Registry security level | -
---|---|---|
Send LM & NTLM responses |
-Client devices use LM and NTLM authentication, and they never use NTLMv2 session security. Domain controllers accept LM, NTLM, and NTLMv2 authentication. |
-0 |
-
Send LM & NTLM – use NTLMv2 session security if negotiated |
-Client devices use LM and NTLM authentication, and they use NTLMv2 session security if the server supports it. Domain controllers accept LM, NTLM, and NTLMv2 authentication. |
-1 |
-
Send NTLM response only |
-Client devices use NTLMv1 authentication, and they use NTLMv2 session security if the server supports it. Domain controllers accept LM, NTLM, and NTLMv2 authentication. |
-2 |
-
Send NTLMv2 response only |
-Client devices use NTLMv2 authentication, and they use NTLMv2 session security if the server supports it. Domain controllers accept LM, NTLM, and NTLMv2 authentication. |
-3 |
-
Send NTLMv2 response only. Refuse LM |
-Client devices use NTLMv2 authentication, and they use NTLMv2 session security if the server supports it. Domain controllers refuse to accept LM authentication, and they will accept only NTLM and NTLMv2 authentication. |
-4 |
-
Send NTLMv2 response only. Refuse LM & NTLM |
-Client devices use NTLMv2 authentication, and they use NTLMv2 session security if the server supports it. Domain controllers refuse to accept LM and NTLM authentication, and they will accept only NTLMv2 authentication. |
-5 |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Send NTLMv2 response only |
-
DC Effective Default Settings |
-Send NTLMv2 response only |
-
Member Server Effective Default Settings |
-Send NTLMv2 response only |
-
Client Computer Effective Default Settings |
-Not defined |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Negotiate signing |
-
DC Effective Default Settings |
-Negotiate signing |
-
Member Server Effective Default Settings |
-Negotiate signing |
-
Client Computer Effective Default Settings |
-Negotiate signing |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Require 128-bit encryption |
-
DC Effective Default Settings |
-Require 128-bit encryption |
-
Member Server Effective Default Settings |
-Require 128-bit encryption |
-
Client Computer Effective Default Settings |
-Require 128-bit encryption |
-
Server type or GPO | -Default value | -
---|---|
Default Domain Policy |
-Not defined |
-
Default Domain Controller Policy |
-Not defined |
-
Stand-Alone Server Default Settings |
-Require 128-bit encryption |
-
DC Effective Default Settings |
-Require 128-bit encryption |
-
Member Server Effective Default Settings |
-Require 128-bit encryption |
-
Client Computer Effective Default Settings |
-Require 128-bit encryption |
-
Server type or GPO | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-Not defined |
-
Member server effective default settings |
-Not defined |
-
Client computer effective default settings |
-Not defined |
-
Server type or GPO | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-Not defined |
-
Member server effective default settings |
-Not defined |
-
Client computer effective default settings |
-Not defined |
-
Server type or GPO | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-Not defined |
-
Member server effective default settings |
-Not defined |
-
Client computer effective default settings |
-Not defined |
-
Server type or GPO | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-Not defined |
-
Member server effective default settings |
-Not defined |
-
Client computer effective default settings |
-Not defined |
-
Server type or GPO | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-Not defined |
-
Member server effective default settings |
-Not defined |
-
Client computer effective default settings |
-Not defined |
-
Server type or GPO | -Default value | -
---|---|
Default domain policy |
-Not configured |
-
Default domain controller policy |
-Not configured |
-
Stand-alone server default settings |
-Not configured |
-
Domain controller effective default settings |
-Not configured |
-
Member server effective default settings |
-Not configured |
-
Client computer effective default settings |
-Not configured |
-
Server type or GPO | -Default value | -
---|---|
Default domain policy |
-Not defined |
-
Default domain controller policy |
-Not defined |
-
Stand-alone server default settings |
-Not defined |
-
Domain controller effective default settings |
-Not defined |
-
Member server effective default settings |
-Not defined |
-
Client computer effective default settings |
-Not defined |
-