Security Watch

Lock Down Remote Registry Access

Block anonymous users from accessing confidential information.

When hardening Windows 2000 Server and Windows NT 4.0, I hope you've been able to restrict remote anonymous access to the Registry (see Microsoft Knowledge Base article 153183), along with anonymous exposure of account names, shares and other information (KB 143474).

By doing so, you ensure that only authorized individuals can connect remotely to the Registry and get that sensitive information. Both processes require Registry configuration (detailed in the KB articles), and both may be impossible if legacy applications are using anonymous access. In order to continue to use those legacy applications and still block some forms of anonymous access, there are workarounds. For example, you can add the name of the service to the NT Registry value AllowedPaths at HKEY_LOCAL_MACHINE\SYSTEM\ CurrentControlSet\Control\SecurePipeServers\winreg\ or by adding the required pipe and share names to the Win2K Registry values NullSessionShares and NullSessionPipes at HKEY_LOCAL_MACHINE\SYSTEM\Services\LanmanServer\ Parameters\.

Alternatively, to help legacy applications, it's possible to configure the RestrictNullSessAccess value at HKEY_LOCAL_MACHINE\SYSTEM\Services\ LanmanServer\Parameters\.

It's critical to note that this value, if set to 0, overrides anonymous restrictions set elsewhere.

Since you may have Windows computers on which this setting has been configured, I'm asking you to take a look. Check the Registry in NT 3.51, NT 4.0 and Win2K computers. Pay special attention to those Win2K computers that may be been upgraded from earlier versions of NT. Look for the RestrictNullSessions value in the Registry. If the value doesn't exist or is set to 1 -- the default -- you're OK.

If the value is 0, it may be possible to anonymously access that machine's Registry. To fix the problem, set the value to 1 and, if applications require anonymous access, configure that access using appropriate Registry keys as detailed in the articles above. You can read more about this problem in the KB 830070.

About the Author

Roberta Bragg, MCSE: Security, CISSP, Security+, and Microsoft MVP is a Redmond contributing editor and the owner of Have Computer Will Travel Inc., an independent firm specializing in information security and operating systems. She's series editor for Osborne/McGraw-Hill's Hardening series, books that instruct you on how to secure your networks before you are hacked, and author of the first book in the series, Hardening Windows Systems.


  • How To Remove the Windows 10 Action Center

    Microsoft meant well with Windows 10's Action Center, but the constant pop-up notifications are often more annoying than helpful. Here's how to get rid of them.

  • Google IDs on Azure Active Directory B2B Service Now at 'General Availability'

    Microsoft announced on Wednesday that users of the Google identity and access service can use their personal log-in IDs with the Azure Active Directory B2B service to access resources as "guests."

  • Top 4 Overlooked Features of a Data Backup Strategy

    When it comes to implementing an airtight backup-and-recovery plan, these are the four must-have features that many enterprises nevertheless tend to forget.

  • Microsoft Bolsters Kubernetes with Azure Confidential Computing

    Microsoft on Tuesday announced various developments concerning the use of Kubernetes, an open source container orchestration solution fostered by Google.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.