windows server 2008 R2 Standard - 停止匿名登录

Sim*_*mon 5 windows windows-server-2008-r2 anonymous

在 Windows Server 2008 R2 Standard ED 上。我们在事件查看器下记录了大量匿名登录

如何阻止这个?如何禁用匿名登录?

留言副本:


An account was successfully logged on.

Subject:
    Security ID:        NULL SID
    Account Name:       -
    Account Domain:     -
    Logon ID:       0x0

Logon Type:         3

New Logon:
    Security ID:        ANONYMOUS LOGON
    Account Name:       ANONYMOUS LOGON
    Account Domain:     NT AUTHORITY
    Logon ID:       0x7863af9a
    Logon GUID:     {00000000-0000-0000-0000-000000000000}

Process Information:
    Process ID:     0x0
    Process Name:       -

Network Information:
    Workstation Name:   ZZC-01309261645
    Source Network Address: 111.xxx.xxx.134
    Source Port:        55xxx

Detailed Authentication Information:
    Logon Process:      NtLmSsp 
    Authentication Package: NTLM
    Transited Services: -
    Package Name (NTLM only):   NTLM V1
    Key Length:     128

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
    - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
    - Transited services indicate which intermediate services have participated in this logon request.
    - Package name indicates which sub-protocol was used among the NTLM protocols.
    - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Run Code Online (Sandbox Code Playgroud)

Wil*_*ris -1

您可以使用注册表项来限制它

\n\n

HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentcontrolSet\\Control\\Lsa

\n\n

将 DWORD \xe2\x80\x9cRestrictAnonymous\xe2\x80\x9d 更改为值 2

\n\n

这会将其设置为 2 级限制。但要小心,因为它可能会破坏某些东西,正如此处与 Windows 2000 相关的问题所示。

\n\n

http://support.microsoft.com/default.aspx?scid=KB;en-us;296405

\n\n

不过,您可能需要对您的机器以及可能的网络进行一些额外的检查。您已经运行了 NTLM,这是一个非常古老且非常不安全的协议,称为 NT Lan Manager。您还可能打开了不应该打开的端口,这表明您可能不受防火墙保护。多年来,Windows 安全性已得到改善,但在 Internet 上“裸”运行仍然很危险,特别是当发生 NTLM 时。将其置于防火墙后面,也许可以考虑让安全专家检查您的配置。

\n

  • 只是一个简短的评论,我做了更多的阅读,发现任何与 RDP 的连接都会首先成功地以匿名身份进行身份验证,然后询问登录信息,因此即使这些连接说“成功”,它们也不一定会成功身份验证,尤其是当您在该计算机上运行 RDP 以进行远程管理时。只是需要考虑一下,并且在更改注册表后进行测试以确保 rdp 仍然有效。不要远程进行更改! (2认同)