Network access: Shares that can be accessed anonymously

Active Directory Auditing Tool

The Who, Where and When information is very important for an administrator to have complete knowledge of all activities that occur on their Active Directory. This helps them identify any desired / undesired activity happening. ADAudit Plus assists an administrator with this information in the form of reports. In real-time, ensure critical resources in the network like the Domain Controllers are audited, monitored and reported with the entire information on AD objects - Users, Groups, GPO, Computer, OU, DNS, AD Schema and Configuration changes with 200+ detailed event specific GUI reports and email alerts.

Object Access » Network access: Shares that can be accessed anonymously

How to enable network access: shares that can be accessed anonymously

This policy setting determines which shared folders can be accessed by anonymous users. The policy setting can be configured for a user-defined list of shared folders or left undefined.

This policy can be set to a null value. This is the default value. With this setting all users will have to be authenticated into the network before they can access shared resources on the server.

Location:

You can find this setting in the following location: Computer Configuration>Windows Settings>Security Settings>Local Policies>Security Options.

Security considerations:

Any shared folders that are listed can be accessed by any network user, which could lead to sensitive data being leaked or tampered with. Configure the Network access: Shares that can be accessed anonymously setting to a null value. Only authenticated users have access to shared resources on the server.

About ADAudit Plus:

ADAudit Plus is a real time change auditing software that helps keep your Active Directory, Azure AD, Windows file servers, NetApp filers, EMC file systems, Synology file systems, Windows member servers, and workstations secure and compliant. With ADAudit Plus, you can get visibility into:

  • Authorized and unauthorized AD management changes
  • User logons, logoffs, and account lockouts
  • GPO changes
  • Group attribute and membership changes
  • OU changes
  • Privileged access and permission changes
  • Azure AD logons, and changes to roles, groups, and applications
  • PowerShell scripts and modules

among other things.

There are more than 200 event-specific reports, and you can configure instant email alerts. You can also export the reports to XLS, HTML, PDF and CSV formats to assist in interpretation and forensics. For more information on ADAudit Plus, visit: https://www.manageengine.com/active-directory-audit/.