The Anonymous Access Overview table shows each Resource on the system that can be accessed by an Anonymous user (that is a user that is not subject to authentication and does not need to log on with a specific user name and password). For each protocol, it shows a summary of the access permissions that have been granted to anonymous users.
You should check this page after making any changes to your Access Control permissions to ensure that you have not left any unexpected security holes.