Hi Guys,
Here is the security options policy settings for Windows server continuation..
Microsoft network client: Send Unencrypted Password to Connect to Third-party SMB servers -Disabled
Microsoft Network Server: Amount of Idle Time required before Suspending a Session - 15 minutes
Microsoft Network Server: Disconnect clients when Logon Hours Expire – Enabled
Microsoft Network Server: Server SPN target Name Validation Level – Accept if Provided by Client or Required from Client
Microsoft Network Server: Digitally Sign Communications (always) – Enabled
Network Access: Allow anonymous SID/name translation – Disabled
Network Access: Do not allow anonymous enumeration of SAM accounts – Enabled
Network Access: Do not allow storage of passwords or credentials for network authentication – Enabled
Network Access: Let Everyone Permissions Apply to Anonymous Users - Disable
Network Access: Named Pipes that can be Accessed Anonymously – Set to Null, review system functionality
Network Access: Remotely Accessible Registry Paths and Sub-paths - Set to Null, review system functionality
Network Access: Shares that can be Accessed Anonymously - <no one>
Network Access: Sharing and Security Model for Local Accounts – For Network Servers, ‘Classic – local users authenticate as themselves’. On end-user computers, ‘Guest only – local users authenticate as guest’
Network Security: Allow Local System NULL session fallback – Disabled
Network Security: Allow Local System to use computer identity for NTLM – Enabled
Network Security: Allow PKU2U authentication requests to this computer to use online identities - Disabled
Network Security: Do not store LAN Manager Hash value on Next password Change – Enabled
Network Security: Force Logoff when Logon Hours Expire - Enabled
Network Security: LAN Manager authentication level - Send NTLMv2 response only\refuse LM & NTLM
Network Security: LDAP Client Signing Requirements - Negotiate Signing
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients - Require NTLMv2 session security
Network security: Minimum session security for NTLM SSP based (including secure RPC) servers - Require NTLMv2 session security
Domain controller: LDAP server signing requirements - Require signing
Domain controller: Refuse machine account password changes - Disabled
Feel free to tune this as per your requirements.
Thank you for stopping by.