Home
%3CLINGO-SUB%20id%3D%22lingo-sub-571985%22%20slang%3D%22en-US%22%3ESharePoint%20Tidbit%20-%20Disabling%20SMB1%20so%20that%20you%20can%20sleep%20better%20at%20night%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-571985%22%20slang%3D%22en-US%22%3E%0A%20%26lt%3Bmeta%20http-equiv%3D%22Content-Type%22%20content%3D%22text%2Fhtml%3B%20charset%3DUTF-8%22%20%2F%26gt%3B%3CSTRONG%3EFirst%20published%20on%20TECHNET%20on%20Dec%2020%2C%202018%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%20Hello%20All%2C%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20Recently%20I%20performed%20a%20%3CA%20href%3D%22https%3A%2F%2Fservices.premier.microsoft.com%2Fassess%3FCulture%3Den-US%26amp%3BCultureAutoDetect%3Dtrue%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%20RaaS%20%3C%2FA%3E%20with%20a%20customer%20and%20it%20provided%20a%20new%20recommendation%20that%20I%20thought%20would%20be%20great%20to%20pass%20along%20to%20you.%20%3CBR%20%2F%3E%3CP%3EDisable%20SMB1%20on%20your%20server.%3C%2FP%3E%3CBR%20%2F%3E%20This%20is%20an%20amazing%20suggestion%20as%20we%20have%20other%20versions%20of%20the%20protocol%20to%20do%20the%20work%20for%20you%20and%20due%20to%20the%20mess%20caused%20by%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.thewindowsclub.com%2Fwhat-is-wannacrypt-ransomware%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20Wannacrypt%20ransomware%20%3C%2FA%3E%20it%20has%20become%20obvious%20that%20we%20should%20clean%20up%20these%20older%20protocols.%20And%20if%20you%20can%E2%80%99t%20remember%20SMB%20or%20Server%20Message%20Block%20is%20a%20network%20file%20sharing%20protocol%20meant%20for%20sharing%20files%2C%20printers%2C%20etc%2C%20between%20computers.%20There%20are%20three%20versions%20%E2%80%93%20Server%20Message%20Block%20(SMB)%20version%201%20(SMBv1)%2C%20SMB%20version%202%20(SMBv2)%2C%20and%20SMB%20version%203%20(SMBv3).%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20Follow%20these%20steps%20to%20Disable%20the%20protocol%20on%20a%20per%20Server%20basis%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20For%20Windows%207%2C%20Windows%202008%2C%20and%20Windows%202008%20R2%20via%20PowerShell%20(This%20requires%20a%20reboot%20of%20the%20server)%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fmodule%2FMicrosoft.PowerShell.Management%2FSet-ItemProperty%3Fview%3Dpowershell-5.1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%20Set-ItemProperty%20%3C%2FA%3E%20-Path%20%22HKLM%3A%5CSYSTEM%5CCurrentControlSet%5CServices%5CLanmanServer%5CParameters%22%20SMB1%20-Type%20DWORD%20-Value%200%20%E2%80%93Force%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20For%20Windows%208.1%2C%20and%20Windows%2010%20via%20PowerShell%20%3CBR%20%2F%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Fitpro%2Fpowershell%2Fwindows%2Fdism%2Fdisable-windowsoptionalfeature%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EDisable-WindowsOptionalFeature%20%3C%2FA%3E%20-Online%20-FeatureName%20SMB1Protocol%3C%2FP%3E%3CBR%20%2F%3E%20For%20Windows%202012%20R2%2C%20and%20Windows%202016%20via%20PowerShell%20%3CBR%20%2F%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Fitpro%2Fpowershell%2Fwindows%2Fdism%2Fdisable-windowsoptionalfeature%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EDisable-WindowsOptionalFeature%20%3C%2FA%3E%20-Online%20-FeatureName%20smb1protocol%3C%2FP%3E%3CBR%20%2F%3E%20For%20more%20info%20check%20this%20%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F2696547%2Fhow-to-detect-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%20article%20%3C%2FA%3E%20%3CBR%20%2F%3E%20%3CBR%20%2F%3E%20Pax%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-571985%22%20slang%3D%22en-US%22%3EFirst%20published%20on%20TECHNET%20on%20Dec%2020%2C%202018%20Hello%20All%2CRecently%20I%20performed%20a%20RaaS%20with%20a%20customer%20and%20it%20provided%20a%20new%20recommendation%20that%20I%20thought%20would%20be%20great%20to%20pass%20along%20to%20you.%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-571985%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Edisable%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESharePoint%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESMB%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
First published on TECHNET on Dec 20, 2018
Hello All,

Recently I performed a RaaS with a customer and it provided a new recommendation that I thought would be great to pass along to you.

Disable SMB1 on your server.


This is an amazing suggestion as we have other versions of the protocol to do the work for you and due to the mess caused by the Wannacrypt ransomware it has become obvious that we should clean up these older protocols. And if you can’t remember SMB or Server Message Block is a network file sharing protocol meant for sharing files, printers, etc, between computers. There are three versions – Server Message Block (SMB) version 1 (SMBv1), SMB version 2 (SMBv2), and SMB version 3 (SMBv3).

Follow these steps to Disable the protocol on a per Server basis

For Windows 7, Windows 2008, and Windows 2008 R2 via PowerShell (This requires a reboot of the server)

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" SMB1 -Type DWORD -Value 0 –Force

For Windows 8.1, and Windows 10 via PowerShell

Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol


For Windows 2012 R2, and Windows 2016 via PowerShell

Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol


For more info check this article

Pax