Therefore, even if you rename the Administrator account, an attacker could launch a brute force attack by using the SID to log on.

updating system settings-64

The local accounts with blank passwords would still function.

Anyone who knows the name of one of these unprotected accounts could then use it to log on.

If you disable the Guest account and the Network Access: Sharing and Security Model option is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail.

This policy setting should have little impact on most organizations because it is the default setting in Microsoft Windows® 2000, Windows XP, Windows Vista®, and Windows Server® 2003.

I am stuck at Windows Technical Preview Evaluation copy.

The Security Options section of Group Policy configures computer security settings for digital data signatures, Administrator and Guest account names, access to floppy disk and CD drives, driver installation behavior, and logon prompts.

Possible values: This policy setting does not affect interactive logons that are performed physically at the console or logons that use domain accounts.

It is possible for non-Microsoft applications that use remote interactive logons to bypass this policy setting.

Blank passwords are a serious threat to computer security and should be forbidden through both organizational policy and suitable technical measures.