%3CLINGO-SUB%20id%3D%22lingo-sub-1169569%22%20slang%3D%22en-US%22%3ERe%3A%20Exchange%20Server%20and%20SMBv1%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1169569%22%20slang%3D%22en-US%22%3E%3CP%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1165615%22%20slang%3D%22en-US%22%3EExchange%20Server%20and%20SMBv1%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1165615%22%20slang%3D%22en-US%22%3E%3CP%3ETo%20make%20sure%20that%20your%20Exchange%20organization%20is%20better%20protected%20against%20the%20latest%20threats%20(for%20example%20Emotet%2C%20TrickBot%20or%20WannaCry%20to%20name%20a%20few)%20we%20recommend%20disabling%20SMBv1%20if%20it%E2%80%99s%20enabled%20on%20your%20Exchange%20(2013%2F2016%2F2019)%20server.%3C%2FP%3E%0A%3CP%3EThere%20is%20no%20need%20to%20run%20the%20nearly%2030-year-old%20SMBv1%20protocol%20when%20Exchange%202013%2F2016%2F2019%20is%20installed%20on%20your%20system.%20SMBv1%20isn%E2%80%99t%20safe%20and%20you%20lose%20key%20protections%20offered%20by%20later%20SMB%20protocol%20versions.%20If%20you%20want%20to%20learn%20more%20about%20SMBv1%20and%20why%20you%20should%20stop%20using%20it%2C%20I%E2%80%99d%20recommend%20reading%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fstorage-at-microsoft%2Fstop-using-smb1%2Fba-p%2F425858%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Ethis%20blog%20post%3C%2FA%3E%3C%2FSPAN%3E%20published%20and%20updated%20by%20Ned%20Pyle.%3C%2FP%3E%0A%3CP%3EMicrosoft%20publicly%20deprecated%20the%20SMBv1%20protocol%20in%202014%20and%20so%20we%20stopped%20installing%20it%20by%20default%20when%20using%20Windows%20Server%202016%201709%20(RS3).%20Please%20see%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4034314%2Fsmbv1-is-not-installed-by-default-in-windows%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethis%20KB%3C%2FA%3E%3C%2FSPAN%3E%20for%20more%20information.%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%226%22%3EWhat%20about%20Exchange%202010%3F%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EAs%20announced%20earlier%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fexchange-team-blog%2Fexchange-2010-end-of-support-is-coming%2Fba-p%2F607810%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Ehere%3C%2FA%3E%3C%2FSPAN%3E%2C%20Exchange%20Server%202010%20end%20of%20support%20is%20coming%20soon.%3C%2FP%3E%0A%3CP%3EWe%20did%20not%20nor%20will%20validate%20if%20Exchange%202010%20server%20works%20properly%20with%20SMBv1%20disabled.%20Please%20follow%20our%20recommendation%20and%20migrate%20from%20Exchange%202010%20to%20Office%20365%20or%20newer%20version%20of%20Exchange%20Server%20if%20you%20want%20to%20stay%20on-premises.%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%226%22%3EWhat%20about%20DAG%20witness%20server%3F%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EBefore%20disabling%20SMBv1%20you%20should%20make%20sure%20that%20you%20use%20a%20correctly%20configured%20and%20supported%20DAG%20witness%20server%20which%20supports%20at%20least%20SMBv2.%3C%2FP%3E%0A%3CP%3EYou%20should%20make%20sure%20that%20the%20witness%20server%20is%20running%20a%20supported%20version%20of%20Windows%20Server%20which%20is%20Windows%20Server%202012%2F2012R2%2F2016%20or%202019.%3C%2FP%3E%0A%3CP%3EPlease%20find%20more%20information%20about%20Exchange%20and%20DAG%20witness%20server%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fexchange%2Fhigh-availability%2Fmanage-ha%2Fmanage-dags%3Fview%3Dexchserver-2019%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%3C%2FSPAN%3E.%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%226%22%3EHow%20can%20I%20check%20if%20SMBv1%20is%20in%20use%20on%20my%20server%3F%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EIt%20depends%20on%20your%20operating%20system!%3C%2FP%3E%0A%3CP%3EThe%20required%20steps%20for%20the%20mostly%20used%20operating%20systems%20with%20SMBv1%20enabled%20are%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWindows%20Server%202008%20R2%3A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3EGet-Item%20HKLM%3A%5CSYSTEM%5CCurrentControlSet%5CServices%5CLanmanServer%5CParameters%20%7C%20ForEach-Object%20%7BGet-ItemProperty%20%24_.pspath%7D%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDefault%20configuration%20%3D%20Enabled%20(No%20registry%20key%20is%20created)%2C%20so%20no%20SMB1%20value%20will%20be%20returned.%20If%20query%20returns%20a%20value%20of%201%2C%20SMBv1%20is%20enabled.%20A%20value%20of%200%20means%20SMBv1%20is%20disabled%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWindows%20Server%202012%3A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3EGet-SmbServerConfiguration%20%7C%20Select%20EnableSMB1Protocol%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20get%20a%20return%20of%20True%20it%20means%20SMBv1%20is%20enabled%20and%20False%20means%20SMBv1%20is%20not%20enabled.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWindows%20Server%202012%20R2%20or%20higher%3A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3E(Get-WindowsFeature%20FS-SMB1).Installed%0AGet-SmbServerConfiguration%20%7C%20Select%20EnableSMB1Protocol%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20get%20a%20return%20of%20True%20it%20means%20SMBv1%20is%20enabled%20and%20False%20means%20SMBv1%20is%20not%20enabled%3C%2FP%3E%0A%3CP%3EThe%20latest%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FExchangeHealthChecker%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eversion%202.39.1%20of%20Exchange%20HealthChecker%20script%3C%2FA%3E%3C%2FSPAN%3E%20may%20help%20you%20to%20detect%20if%20SMBv1%20is%20enabled%20on%20your%20Exchange%20servers%2C%20so%20you%20can%20easily%20use%20it%20to%20just%20figure%20out%20what's%20going%20on.%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%226%22%3EHow%20can%20I%20disable%20SMBv1%20on%20my%20Exchange%20Server%3F%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EThis%20will%20also%20differ%20based%20on%20the%20OS%20version%20in%20use%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWindows%20Server%202008%20R2%3A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3ESet-ItemProperty%20-Path%20%22HKLM%3A%5CSYSTEM%5CCurrentControlSet%5CServices%5CLanmanServer%5CParameters%22%20-Name%20SMB1%20-Type%20DWORD%20-Value%200%20%E2%80%93Force%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWindows%20Server%202012%3A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3ESet-SmbServerConfiguration%20-EnableSMB1Protocol%20%24false%20-force%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWindows%20Server%202012%20R2%20or%20higher%3A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-markup%22%3E%3CCODE%3EDisable-WindowsOptionalFeature%20-Online%20-FeatureName%20smb1protocol%0ASet-SmbServerConfiguration%20-EnableSMB1Protocol%20%24false%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIt%20is%20also%20possible%20to%20disable%20SMBv1%20on%20the%20server%20via%20Group%20Policy.%20You%20can%20find%20more%20information%20about%20this%20topic%20in%20the%20article%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows-server%2Fstorage%2Ffile-server%2Ftroubleshoot%2Fdetect-enable-and-disable-smbv1-v2-v3%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHow%20to%20detect%2C%20enable%20and%20disable%20SMBv1%2C%20SMBv2%2C%20and%20SMBv3%20in%20Windows%3C%2FA%3E%3C%2FSPAN%3E.%20Please%20check%20that%20document%2C%20because%20server%20restart%20needs%20might%20vary%20depending%20on%20the%20OS%20in%20question%20(SMB%20settings%20are%20OS%20settings%2C%20not%20Exchange).%3C%2FP%3E%0A%3CP%3EThanks%20for%20reading%20and%20stay%20safe!%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%23FF9900%22%3ELukas%20Sassl%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1165615%22%20slang%3D%22en-US%22%3E%3CP%3ETo%20make%20sure%20that%20your%20Exchange%20organization%20is%20better%20protected%20against%20the%20latest%20threats%20(for%20example%20Emotet%2C%20TrickBot%20or%20WannaCry%20to%20name%20a%20few)%20we%20recommend%20disabling%20SMBv1%20if%20it%E2%80%99s%20enabled%20on%20your%20Exchange%20(2013%2F2016%2F2019)%20server.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1165615%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAdministration%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%202013%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%202016%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EExchange%202019%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOn%20Premises%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1172525%22%20slang%3D%22en-US%22%3ERe%3A%20Exchange%20Server%20and%20SMBv1%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1172525%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20only%20way%20to%20deal%20with%20this%2C%20IMNSHO%2C%20is%20the%20following%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%3ERemove-WindowsFeature%20FS-SMB1%20-Restart%3C%2FPRE%3E%0A%3CP%3ERemove%20it%20don't%20disable%20it.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1173441%22%20slang%3D%22en-US%22%3ERe%3A%20Exchange%20Server%20and%20SMBv1%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1173441%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Guys%2C%20When%20this%20advisory%20is%20released%20by%20Ms..is%20it%20on%20last%20Wednesday%3F%3F%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1179447%22%20slang%3D%22en-US%22%3ERe%3A%20Exchange%20Server%20and%20SMBv1%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1179447%22%20slang%3D%22en-US%22%3EI'd%20love%20for%20Microsoft%20to%20back-port%20to%20Windows%20Server%202012%20the%20ability%20to%20remove%20SMBv1.%20That%20was%20introduced%20in%202012%20R2.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1182716%22%20slang%3D%22en-US%22%3ERe%3A%20Exchange%20Server%20and%20SMBv1%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1182716%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F63673%22%20target%3D%22_blank%22%3E%40Philip%20Elder%3C%2FA%3E%26nbsp%3BDisable-WindowsOptionalFeature%20should%20do%20the%20same%20as%20Remove-WindowsFeature.%20The%20difference%20is%20that%20Remove-WindowsFeature%20only%20exists%20on%20machines%20with%20Server%20Manager%20RSAT%20installed.%20Disable-WindowsOptionalFeature%20exists%20everywhere.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20idea%20of%20running%26nbsp%3BSet-SmbServerConfiguration%20-EnableSMB1Protocol%20%24false%20on%20Windows%20Server%202012%20R2%20and%20higher%20is%20to%20have%20a%20failsafe.%20It%20should%20stay%20disabled%20even%20if%20Install-WindowsFeature%20-Name%20FS-SMB1%20is%20executed%20to%20add%20SMB1%20protocol%20support%20again.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F550607%22%20target%3D%22_blank%22%3E%40Yogesh11%3C%2FA%3E%26nbsp%3BThe%20article%20was%20released%20on%2002%2F12%2F2020%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1748552%22%20slang%3D%22en-US%22%3ERe%3A%20Exchange%20Server%20and%20SMBv1%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1748552%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F63673%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E%3CSPAN%3EHi%20Guys%2C%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3EI%20am%20upgrading%20Exchange%20from%202013%20to%202019%20but%20I%20have%20a%20problem%3A%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E%26nbsp%3B%20Exchange%202013%20is%20still%20available%20in%20the%20windows%20server%202019%20environment%20active%20directory%20even%20though%20it%20says%20it%20doesn't%20support%20it%3Fwhy%3C%2FSPAN%3E%3C%2FP%3E%3CDIV%3E%3CDIV%20class%3D%22gtx-trans-icon%22%3E%26nbsp%3B%3C%2FDIV%3E%3C%2FDIV%3E%3C%2FLINGO-BODY%3E

To make sure that your Exchange organization is better protected against the latest threats (for example Emotet, TrickBot or WannaCry to name a few) we recommend disabling SMBv1 if it’s enabled on your Exchange (2013/2016/2019) server.

There is no need to run the nearly 30-year-old SMBv1 protocol when Exchange 2013/2016/2019 is installed on your system. SMBv1 isn’t safe and you lose key protections offered by later SMB protocol versions. If you want to learn more about SMBv1 and why you should stop using it, I’d recommend reading this blog post published and updated by Ned Pyle.

Microsoft publicly deprecated the SMBv1 protocol in 2014 and so we stopped installing it by default when using Windows Server 2016 1709 (RS3). Please see this KB for more information.

What about Exchange 2010?

As announced earlier here, Exchange Server 2010 end of support is coming soon.

We did not nor will validate if Exchange 2010 server works properly with SMBv1 disabled. Please follow our recommendation and migrate from Exchange 2010 to Office 365 or newer version of Exchange Server if you want to stay on-premises.

What about DAG witness server?

Before disabling SMBv1 you should make sure that you use a correctly configured and supported DAG witness server which supports at least SMBv2.

You should make sure that the witness server is running a supported version of Windows Server which is Windows Server 2012/2012R2/2016 or 2019.

Please find more information about Exchange and DAG witness server here.

How can I check if SMBv1 is in use on my server?

It depends on your operating system!

The required steps for the mostly used operating systems with SMBv1 enabled are:

  • Windows Server 2008 R2:

 

Get-Item HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters | ForEach-Object {Get-ItemProperty $_.pspath}

 

Default configuration = Enabled (No registry key is created), so no SMB1 value will be returned. If query returns a value of 1, SMBv1 is enabled. A value of 0 means SMBv1 is disabled

  • Windows Server 2012:

 

Get-SmbServerConfiguration | Select EnableSMB1Protocol

 

If you get a return of True it means SMBv1 is enabled and False means SMBv1 is not enabled.

  • Windows Server 2012 R2 or higher:

 

(Get-WindowsFeature FS-SMB1).Installed
Get-SmbServerConfiguration | Select EnableSMB1Protocol

 

If you get a return of True it means SMBv1 is enabled and False means SMBv1 is not enabled

The latest version 2.39.1 of Exchange HealthChecker script may help you to detect if SMBv1 is enabled on your Exchange servers, so you can easily use it to just figure out what's going on.

How can I disable SMBv1 on my Exchange Server?

This will also differ based on the OS version in use:

  • Windows Server 2008 R2:

 

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" -Name SMB1 -Type DWORD -Value 0 –Force

 

  • Windows Server 2012:

 

Set-SmbServerConfiguration -EnableSMB1Protocol $false -force

 

  • Windows Server 2012 R2 or higher:

 

Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol
Set-SmbServerConfiguration -EnableSMB1Protocol $false

 

It is also possible to disable SMBv1 on the server via Group Policy. You can find more information about this topic in the article How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows. Please check that document, because server restart needs might vary depending on the OS in question (SMB settings are OS settings, not Exchange).

Thanks for reading and stay safe!

Lukas Sassl

6 Comments
Regular Visitor

.

The only way to deal with this, IMNSHO, is the following:

 

Remove-WindowsFeature FS-SMB1 -Restart

Remove it don't disable it.

Occasional Contributor

Hi Guys, When this advisory is released by Ms..is it on last Wednesday???

Senior Member
I'd love for Microsoft to back-port to Windows Server 2012 the ability to remove SMBv1. That was introduced in 2012 R2.
Microsoft

@Philip Elder Disable-WindowsOptionalFeature should do the same as Remove-WindowsFeature. The difference is that Remove-WindowsFeature only exists on machines with Server Manager RSAT installed. Disable-WindowsOptionalFeature exists everywhere.  

The idea of running Set-SmbServerConfiguration -EnableSMB1Protocol $false on Windows Server 2012 R2 and higher is to have a failsafe. It should stay disabled even if Install-WindowsFeature -Name FS-SMB1 is executed to add SMB1 protocol support again.

 

@Yogi The article was released on 02/12/2020

Occasional Visitor

Hi Guys, I am upgrading Exchange from 2013 to 2019 but I have a problem:

  Exchange 2013 is still available in the windows server 2019 environment active directory even though it says it doesn't support it?why