So I have a Windows Server 2016 domain and whenever changing a password in Active Directory, even when creating a new account, anonymous logon is being written to the logs (event 4738) even though I'm logged in with a domain administrator account. It does this no matter who makes the password change. I have the following settings applied through group policy and have verified in the registry but it is still occurring:
Network access: Allow anonymous SID/Name translation - Disabled
Network access: Do not allow anonymous enumeration of SAM accounts - Enabled
Network access: Do not allow anonymous enumeration of SAM accounts and shares -Enabled
Network access: Let Everyone permissions apply to anonymous users - Disabled
Network access: Named Pipes that can be accessed anonymously - Enabled and empty
Network access: Shares that can be accessed anonymously - Enabled and empty
For a little bit more information every time I reset a password on the system 3 User Account Management security audit success logs are written. 4767 and 4724 list the correct admin account that made the change. But then 4738 has ANONYMOUS LOGON as the account that made the change. I don't view this as an issue but security is requiring that the anonymous logon not be written ever and it shouldn't be with it disabled in group policy and registry.