Silver Bullet wrote: Does that help?
what about an NTFS folder residing somewhere on a server within my enterprise?
sprkymrk wrote: Sorry I don't have a better explanation of all the different reasons anonymous logons appear in the event logs.
_omni_ wrote: The IUSR account as was said is for accessing the website without needing to have a username + pwd, it will just assign that account to you.
_omni_ wrote: Anon isn't part of the Everyone group.
_omni_ wrote: About the IUSR_xxxxxx account, I don't believe that has anything to do with the Anonymous Logon group.
_omni_ wrote: Here's a scenario: A couple days ago in My Network Places I saw my flatmate's workgroup. I double clicked it and was able to access it, I could see the shares. However I was unable to access the shares as I was unauthenticated. Now if he were to add the Anon Logon to the permissions on the share, perhaps I would have been able to access it?
Silver Bullet wrote: _omni_ wrote: The IUSR account as was said is for accessing the website without needing to have a username + pwd, it will just assign that account to you. UHHHH.....wouldn't that be anonymous
Silver Bullet wrote: And I apoologize w^orld.....I thought you were just looking for an explanation of Anonymous Logons. Didn't realise you were troubleshooting a problem here. Going to get a cold beer now.
w^rl0rd wrote: If I have a folder w/ it's ACL allowing Anonymous Logon and someone plugged into my network having already locally authenticated locally, they could just type in the UNC path to this folder and access it w/o being prompted for domain credentials. Right?
_omni_ wrote: Silver Bullet wrote: _omni_ wrote: The IUSR account as was said is for accessing the website without needing to have a username + pwd, it will just assign that account to you. UHHHH.....wouldn't that be anonymous I don't think so. Granted, the user accessing the site is anonymous, but he is using the IUSR account which is an authenticated account, and therefore not anonymous to the system (and thus not a member of the Anonymous Logon group).
Silver Bullet wrote: w^rl0rd wrote: If I have a folder w/ it's ACL allowing Anonymous Logon and someone plugged into my network having already locally authenticated locally, they could just type in the UNC path to this folder and access it w/o being prompted for domain credentials. Right? No....I just tested on my lab. Shared a folder on my Server and attempted to access it from another computer and was denied. Folder was shared as only having the Anonymous Logon Group with Full Control Share Permissions.
sprkymrk wrote: Silver Bullet wrote: w^rl0rd wrote: If I have a folder w/ it's ACL allowing Anonymous Logon and someone plugged into my network having already locally authenticated locally, they could just type in the UNC path to this folder and access it w/o being prompted for domain credentials. Right? No....I just tested on my lab. Shared a folder on my Server and attempted to access it from another computer and was denied. Folder was shared as only having the Anonymous Logon Group with Full Control Share Permissions. What were the NTFS permissions used?
The top line reads: Anonymous authentication gives users access to the public areas of your Web or FTP site without prompting them for a user name or password. By default, the IUSR_computername account is used to allow anonymous access.
_omni_ wrote: Now to get back to arguing a point that I'm completely theorising on but am sure I'm right: Quote: The top line reads: Anonymous authentication gives users access to the public areas of your Web or FTP site without prompting them for a user name or password. By default, the IUSR_computername account is used to allow anonymous access. I believe it is referring to the concept of anonymous access. Where, oh where can you see anything that says "The IUSR account then automatically becomes a member of the Anonymous Logon group..."? If you wanted real anonymous access, you would configure the website to grant the Anonymous Logon group access instead of the IUSR account. The fact that the IUSR account must authenticate with the system in order to be used makes it, well, AUTHENTICATED and therefore a member of the Authenticated Users and not the Anonymous Logons. icon_biggrin.gif
Silver Bullet wrote: But again, could not with only the Anonymous Logon group in the ACL.
sprkymrk wrote: And did you log in from a computer that was a member of a domain? Then you are not anon possibly, are you? (asking) In which case were there any other permissions applied to other groups? Try accessing the share through a net use \\servername\sharename u:"" "" (that's a u: no space, double quote no space double quote SPACE double quote no space double quote) - if I remember correctly....
_omni_ wrote: I believe it is referring to the concept of anonymous access. Where, oh where can you see anything that says "The IUSR account then automatically becomes a member of the Anonymous Logon group..."?
sprkymrk wrote: When the Internet Information Server product is installed, Setup creates a user account on the server computer to be used for anonymous connections. The username of this account has the form IUSR_<computer_name>. For example, if the server computer name is WEB1, the username created will be IUSR_WEB1. The same anonymous-logon user account is set up for all Internet Information Server services installed on the computer. The account is made a member of the computer's Guest group. This will, in most cases, give anonymous client requests access to public content published on the server.
sprkymrk wrote: Silver Bullet wrote: But again, could not with only the Anonymous Logon group in the ACL. In W2K3, anonymous group is no longer a member of the everyone group.