RestrictAnonymous Access Enabled Lets Anonymous Connections Obtain the Password PolicyID: Q129457
|
Windows NT 4.0 with Service Pack 3 (SP3) installed provides the capability to restrict anonymous users from obtaining system information. For more information, please see the following article in the Microsoft Knowledge Base:
Q143474: Restricting Information Available to Anonymous Logon UsersHowever, with RestrictAnonymous access enabled, anonymous connections are able to obtain the password policy from a Windows NT Server. The password policy defines the Windows NT domain policy with respect to the minimum password length, whether blank passwords are permitted, maximum password age, and password history.
Your password must be at least 8 characters long. Your new password cannot be the same as any of your previous 5 passwords.
Microsoft has a fix available that disables anonymous access to password
policy information when the RestrictAnonymous access is enabled. When the
hotfix is applied and RestrictAnonymous is enabled, anonymous connections
cannot obtain password policy information.
Microsoft recommends installing the hotfix on all domain controllers that
have Service Pack 3 installed.
To resolve this problem, obtain the latest service pack for Windows NT 4.0 or Windows NT Server 4.0, Terminal Server Edition. For additional information, please see the following article in the
Microsoft Knowledge Base:
Q152734 How to Obtain the Latest Windows NT 4.0 Service Pack
Microsoft has confirmed this to be a problem in Windows NT 4.0 and Windows NT Server 4.0, Terminal Server Edition. This problem was first corrected in Windows NT 4.0 Service Pack 4.0 and Windows NT Server 4.0, Terminal Server Edition Service Pack 4.
Additional query words: 4.00 sp3
Keywords : kbenv NT4SP4Fix ntsecurity kbfix4.00.sp4 kbbug4.00.sp3 NTSrvWkst
Version : WinNT:4.0
Platform : winnt
Issue type : kbbug
Last Reviewed: April 10, 1999