Hi Chaps,
again, thanks for all your efforts - PorkChopExpress: I missed your link, sorry about that...
So far, I've set the following in my default domain GP:
Domain Member: Digitally encrypt or sign secure channel data (always): Disabled
Domain Member: Digitally encrypt secure channel data (when possible): Disabled
Domain Member: Digitally sign secure channel (when possible): Disabled
Microsoft network client: Digitally sign communications (always): Disabled
Microsoft network client: Digitally sign communications (if server agress): Disabled
Microsoft network server: Digitally sign communications (always): disabled
Microsoft network server: Digitally sign communications (if client agrees): Disabled
Microsoft network client: Send unencrypted password to third-party SMB servers: Enabled
Network access: Allow anonymous SID/Name translation: Enabled
Network access: Let Everyone permissions apply to anonymous users: Enabled
Network security: Minimum session security for NTLM based (incluing secure RPC) clients: No minimum
Network security: Minimum session security for NTLM based (incluing secure RPC) servers: No minimum
Domain controller: LDAP server signning requirements: None
Network security: LDAP client signing requirements: None
Network security: LAN Manager authentication level: Send LM & NTLM responses
I'd be very interested to know what you have set in your Group Policy Loki1973, as I think I may be attempting a similar operation to you; I have an automated build system that starts from a DOS boot disk, logs onto the domain and then installs XP on each client machine from the server.
All the best,
Paul