Windows NT Anonymous User Connections

Red Button access attack uses Anonymous
User Connections
, also called Null User
, to discover which account is the administrative account and
what the network shares are. You can disable this discovery by preventing
anonymous connections to domains using the following Windows NT registry hack.
Caution: this can have severe consequences on sql server access and creating /
maintaining domain trusts.

Key: SYSTEM\CurrentControlSet\Control\Lsa
Value: 1

Windows 2000 has the same setting and adds the value of 2 which is much more
restrictive. Its so restrictive, it does not seem viable in anything but a pure
W2K environment – no NT4, no – Mac clients. See kb article Q246261.
Q143474 –
Restricting Information Available to Anonymous Logon Users

Q184018 –
NDS for NT does not support restrict anonymous connections

Q168464 –
Directory Replication Fails with Event ID 3216

Q246261 –
How to Use the RestrictAnonymous Registry Value in Windows 2000

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top