mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #6863 from vinaypamnani-msft/vp-issue10726
Remove reference to broken script
This commit is contained in:
commit
3e429a90e2
@ -17,6 +17,7 @@ ms.technology: windows-sec
|
||||
# Network access: Restrict clients allowed to make remote calls to SAM
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10, version 1607 and later
|
||||
- Windows 10, version 1511 with [KB 4103198](https://support.microsoft.com/help/4013198) installed
|
||||
- Windows 10, version 1507 with [KB 4012606](https://support.microsoft.com/help/4012606) installed
|
||||
@ -28,7 +29,6 @@ ms.technology: windows-sec
|
||||
- Windows Server 2012 with [KB 4012220](https://support.microsoft.com/help/4012220/march-2017-preview-of-monthly-quality-rollup-for-windows-server-2012) installed
|
||||
- Windows Server 2008 R2 with [KB 4012218](https://support.microsoft.com/help/4012218/march-2017-preview-of-monthly-quality-rollup-for-windows-7-sp1-and-windows-server-2008-r2-sp1) installed
|
||||
|
||||
|
||||
The **Network access: Restrict clients allowed to make remote calls to SAM** security policy setting controls which users can enumerate users and groups in the local Security Accounts Manager (SAM) database and Active Directory.
|
||||
The setting was first supported by Windows 10 version 1607 and Windows Server 2016 (RTM) and can be configured on earlier Windows client and server operating systems by installing updates from the KB articles listed in **Applies to** section of this topic.
|
||||
|
||||
@ -83,6 +83,7 @@ To avoid setting it manually in this case, you can configure the GPO itself on a
|
||||
> For example, suppose a local administrator configures this setting as part of a local policy using the Local Security Policy snap-in (Secpol.msc), which edits that same registry path. If an enterprise administrator configures this setting as part of an enterprise GPO, that enterprise GPO will overwrite the same registry path.
|
||||
|
||||
## Default values
|
||||
|
||||
Beginning with Windows 10, version 1607 and Windows Server 2016, computers have hard-coded and more restrictive default values than earlier versions of Windows.
|
||||
The different default values help strike a balance where recent Windows versions are more secure by default and older versions don’t undergo any disruptive behavior changes.
|
||||
Administrators can test whether applying the same restriction earlier versions of Windows will cause compatibility problems for existing applications before implementing this security policy setting in a production environment.
|
||||
@ -110,16 +111,17 @@ Audit-only mode configures the SAMRPC protocol to do the access check against th
|
||||
|Setting|RestrictRemoteSamAuditOnlyMode|
|
||||
|Data Type|REG_DWORD|
|
||||
|Value|1|
|
||||
|Notes|This setting can't be added or removed by using predefined Group Policy settings. <br> Administrators may create a custom policy to set the registry value if needed. <br> SAM responds dynamically to changes in this registry value without a reboot. <br> You can use the [Events 16962 - 16969 Reader](https://gallery.technet.microsoft.com/Events-16962-16969-Reader-2eae5f1d) script to parse the event logs, as explained in the next section.|
|
||||
|Notes|This setting can't be added or removed by using predefined Group Policy settings. Administrators may create a custom policy to set the registry value if needed. SAM responds dynamically to changes in this registry value without a reboot. |
|
||||
|
||||
### Related events
|
||||
|
||||
There are corresponding events that indicate when remote calls to the SAM are restricted, what accounts attempted to read from the SAM database, and more. The following workflow is recommended to identify applications that may be affected by restricting remote calls to SAM:
|
||||
|
||||
1. Dump event logs to a common share.
|
||||
2. Parse them with the [Events 16962 - 16969 Reader](https://gallery.technet.microsoft.com/Events-16962-16969-Reader-2eae5f1d) script.
|
||||
3. Review Event IDs 16962 to 16969, as listed in the following table, in the System log with event source Directory-Service-SAM.
|
||||
4. Identify which security contexts are enumerating users or groups in the SAM database.
|
||||
5. Prioritize the callers, determine if they should be allowed or not, then include the allowed callers in the SDDL string.
|
||||
1. Right click the System log, select **Filter Current Log**, and specify `16962-16969` in the Event IDs field.
|
||||
1. Review Event IDs 16962 to 16969, as listed in the following table, with event source **Directory-Service-SAM**.
|
||||
1. Identify which security contexts are enumerating users or groups in the SAM database.
|
||||
1. Prioritize the callers, determine if they should be allowed or not, then include the allowed callers in the SDDL string.
|
||||
|
||||
|Event ID|Event Message Text|Explanation |
|
||||
|---|---|---|
|
||||
|
Loading…
x
Reference in New Issue
Block a user