<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Storage at Microsoft articles</title>
    <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/bg-p/FileCAB</link>
    <description>Storage at Microsoft articles</description>
    <pubDate>Tue, 28 Apr 2026 14:17:53 GMT</pubDate>
    <dc:creator>FileCAB</dc:creator>
    <dc:date>2026-04-28T14:17:53Z</dc:date>
    <item>
      <title>SMB security hardening in Windows Server 2025 &amp; Windows 11</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-security-hardening-in-windows-server-2025-amp-windows-11/ba-p/4226591</link>
      <description>&lt;P&gt;Heya folks, &lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener"&gt;Ned&lt;/A&gt; here again. Last November, Microsoft launched &lt;A href="https://blogs.microsoft.com/on-the-issues/2023/11/02/secure-future-initiative-sfi-cybersecurity-cyberattacks/" target="_blank" rel="noopener"&gt;the Secure Future Initiative&lt;/A&gt; (SFI) to prepare for the increasing scale and high stakes of cyberattacks. SFI brings together every part of Microsoft to advance cybersecurity protection across our company and products.&lt;/P&gt;
&lt;P&gt;Windows has focused on security options with each major release, and Windows 11 24H2 and Windows Server 2025 are no exception: they include a dozen new SMB features that make your data, your users, and your organization safer – and most are on by default. Today I’ll explain their usefulness, share some demos, and point to further details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The new OSes will soon be generally available and you can preview them right now: download &lt;A href="https://aka.ms/WindowsServer2025Eval" target="_blank" rel="noopener"&gt;Windows Server 2025&lt;/A&gt; and &lt;A href="https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewiso" target="_blank" rel="noopener"&gt;Windows 11 24H2&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On to the security.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB signing required by default&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;We now require signing by default for all Windows 11 24H2 SMB outbound and inbound connections and for all outbound connections in Windows Server 2025. This changes legacy behavior, where we required SMB signing by default only when connecting to shares named SYSVOL and NETLOGON and where Active Directory domain controllers required SMB signing for their clients.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;SMB signing has been available for decades and prevents data tampering and relay attacks that steal credentials. By requiring signing by default, we ensure that an admin or user must opt &lt;EM&gt;out &lt;/EM&gt;of this safer configuration, instead of requiring them to be very knowledgeable about SMB network protocol security and turn signing on.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-signing?tabs=group-policy" target="_blank" rel="noopener"&gt;Control SMB signing behavior (preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB NTLM blocking&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;The SMB client now supports blocking NTLM authentication for remote outbound connections. This changes the legacy behavior of always using negotiated authentication that could downgrade from Kerberos to NTLM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;Blocking NTLM authentication prevents tricking clients into sending NTLM requests to malicious servers, which counteracts brute force, cracking, relay, and pass-the-hash attacks. NTLM blocking is also required for forcing an organization's authentication to Kerberos, which is more secure because it verifies identities with its ticket system and better cryptography. Admins can specify exceptions to allow NTLM authentication over SMB to certain servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-ntlm-blocking-now-supported-in-windows-insider/ba-p/3916206" target="_blank" rel="noopener"&gt;SMB NTLM blocking now supported in Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-ntlm-blocking?tabs=group-policy" target="_blank" rel="noopener"&gt;Block NTLM connections on SMB (preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Demo:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;div data-video-id="https://youtu.be/BPC3plpGt40?t=1644" data-video-remote-vid="https://youtu.be/BPC3plpGt40?t=1644" class="lia-video-container lia-media-is-center lia-media-size-small"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FBPC3plpGt40%3Fstart%3D1644%26feature%3Doembed%26start%3D1644&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DBPC3plpGt40&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FBPC3plpGt40%2Fhqdefault.jpg&amp;amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB authentication rate limiter&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;The SMB server service now throttles failed authentication attempts by default. This applies to SMB sharing files on both Windows Server and Windows.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;Brute force authentication attacks bombard the SMB server with multiple username and password-guesses and the frequency can range from dozens to thousands of attempts per second. The SMB authentication rate limiter is enabled by default with a 2 second delay between each failed NTLM or Local KDC Kerberos-based authentication attempt. An attack that sends 300 guesses per second for 5 minutes, for example - 90,000 attempts - would now take 50 hours to complete. An attacker is far more likely to simply give up than keep trying this method.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/configure-smb-authentication-rate-limiter?tabs=powershell" target="_blank" rel="noopener"&gt;Configure SMB authentication rate limiter for Windows (preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Demo:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;div data-video-id="https://youtu.be/BPC3plpGt40?t=498" data-video-remote-vid="https://youtu.be/BPC3plpGt40?t=498" class="lia-video-container lia-media-is-center lia-media-size-small"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FBPC3plpGt40%3Fstart%3D498&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DBPC3plpGt40&amp;amp;image=http%3A%2F%2Fi.ytimg.com%2Fvi%2FBPC3plpGt40%2Fhqdefault.jpg&amp;amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB insecure guest auth now off by default in Windows Pro editions&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;Windows 11 Pro no longer allows SMB client guest connections or guest fallback to an SMB server by default. This makes Windows 11 Pro operate like Windows 10 and Windows 11 Enterprise, Education, and Pro for Workstation editions have for years.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;Guest logons don't require passwords &amp;amp; don't support standard security features like signing and encryption. Allowing a client to use guest logons makes the user vulnerable to attacker-in-the-middle scenarios or malicious server scenarios - for instance, a phishing attack that tricks a user into opening a file on a remote share or a spoofed server that makes a client think it's legitimate. The attacker doesn't need to know the user's credentials and a bad password is ignored. Only third-party remote devices might require guest access by default. Microsoft-provided operating systems haven't enabled guest in server scenarios since Windows 2000.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/enable-insecure-guest-logons-smb2-and-smb3?tabs=group-policy" target="_blank" rel="noopener"&gt;Enable insecure guest logons in SMB2 and SMB3 for Windows client and Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB dialect management&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;You can now mandate the SMB 2 and 3 protocol versions used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;Previously, the SMB server and client only supported automatically negotiating the highest matched dialect from SMB 2.0.2 to 3.1.1. This means you can intentionally block older protocol versions or devices from connecting. For example, you can specify connections to only use SMB 3.1.1, the most secure dialect of the protocol. The minimum and maximum can be set independently on both the SMB client and server, and you can set just a minimum if desired.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management now supported in Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/manage-smb-dialects?tabs=powershell" target="_blank" rel="noopener"&gt;Manage SMB dialects in Windows (preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Demo:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;div data-video-id="https://youtu.be/BPC3plpGt40?t=1935" data-video-remote-vid="https://youtu.be/BPC3plpGt40?t=1935" class="lia-video-container lia-media-is-center lia-media-size-small"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FBPC3plpGt40%3Fstart%3D1935%26feature%3Doembed%26start%3D1935&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DBPC3plpGt40&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FBPC3plpGt40%2Fhqdefault.jpg&amp;amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB client encryption mandate now supported&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;The SMB client now supports requiring encryption of all outbound SMB connections.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;Encryption of all outbound SMB client connections enforces the highest level of network security and brings management parity to SMB signing. When enabled, the SMB client won't connect to an SMB server that doesn't support SMB 3.0 or later, or that doesn't support SMB encryption. For example, a third-party SMB server might support SMB 3.0 but not SMB encryption. Unlike SMB signing, encryption is not required by default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/configure-smb-client-require-encryption?tabs=group-policy" target="_blank" rel="noopener"&gt;Configure the SMB client to require encryption in Windows (preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Remote Mailslots deprecated and disabled by default&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;Remote Mailslots are deprecated and disabled by default for SMB and for DC locator protocol usage with Active Directory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;The Remote Mailslot protocol is an obsolete, simple, unreliable, IPC method first introduced in MS DOS. It is completely unsafe and has no authentication or authorization mechanisms.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots-as-part-of-windows/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots as part of Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows/whats-new/deprecated-features" target="_blank" rel="noopener"&gt;Deprecated features in the Windows client | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/get-started/removed-deprecated-features-windows-server-2025" target="_blank" rel="noopener"&gt;Features removed or no longer developed starting with Windows Server 2025 (preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB over QUIC in Windows Server all editions&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;SMB over QUIC is now included in all Windows Server 2025 editions (Datacenter, Standard, Azure Edition), not just on Azure Edition like it was in Windows Server 2022.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;SMB over QUIC is an alternative to the legacy TCP protocol and is designed for use on untrusted networks like the Internet. It uses TLS 1.3 and certificates to ensure that all SMB traffic is encrypted and usable through edge firewalls for mobile and remote users without the need for a VPN. The user experience does not change at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank" rel="noopener"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/configure-smb-over-quic-client-access-control" target="_blank" rel="noopener"&gt;Configure SMB over QUIC client access control in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://learn.microsoft.com/windows-server/storage/file-server/smb-over-quic?tabs=windows-admin-center%2Cwindows-admin-center1#prerequisites" target="_blank" rel="noopener"&gt;SMB over QUIC in Windows | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Demo:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;div data-video-id="https://youtu.be/BPC3plpGt40?t=2131" data-video-remote-vid="https://youtu.be/BPC3plpGt40?t=2131" class="lia-video-container lia-media-is-center lia-media-size-small"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FBPC3plpGt40%3Fstart%3D2131%26feature%3Doembed%26start%3D2131&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DBPC3plpGt40&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FBPC3plpGt40%2Fhqdefault.jpg&amp;amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB over QUIC client access control&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;SMB over QUIC client access control lets you restrict which clients can access SMB over QUIC servers. The legacy behavior allowed connection attempts from any client that trusts the QUIC server’s certificate issuance chain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;Client access control creates allow and block lists for devices to connect to the file server. A client would now need its own certificate and be on an allow list to complete the QUIC connection before any SMB connection occurs. Client access control gives organizations more protection without changing the authentication used when making the SMB connection and the user experience does not change. You can also completely disable the SMB over QUIC client or only allow connection to specific servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/configure-smb-over-quic-client-access-control" target="_blank" rel="noopener"&gt;Configure SMB over QUIC client access control in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Demo:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;div data-video-id="https://youtu.be/BPC3plpGt40?t=2377" data-video-remote-vid="https://youtu.be/BPC3plpGt40?t=2377" class="lia-video-container lia-media-is-center lia-media-size-small"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FBPC3plpGt40%3Fstart%3D2377%26feature%3Doembed%26start%3D2377&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DBPC3plpGt40&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FBPC3plpGt40%2Fhqdefault.jpg&amp;amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB alternative ports&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;You can use the SMB client to connect to alternative TCP, QUIC, and RDMA ports than their IANA/IETF defaults of 445, 5445, and 443.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;With Windows Server, this allows you to host an SMB over QUIC connection on an allowed firewall port other than 443. You can only connect to alternative ports if the SMB server is configured to support listening on that port. You can also configure your deployment to block configuring alternative ports or specify that ports can only connect to certain servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-alternative-ports-now-supported-in-windows-insider/ba-p/3974509" target="_blank" rel="noopener"&gt;SMB alternative ports now supported in Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-ports?tabs=powershell" target="_blank" rel="noopener"&gt;Configure alternative SMB ports for Windows Server (preview) | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB Firewall default port changes&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;The built-in firewall rules don’t contain the SMB NetBIOS ports anymore.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;The NetBIOS ports were only necessary for SMB1 usage, and that protocol is deprecated and removed by default. This change brings SMB firewall rules more in line with the standard behavior for the Windows Server File Server role. Administrators can reconfigure the rules to restore the legacy ports.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-firewall-rule-changes-in-windows-insider/ba-p/3974496" target="_blank" rel="noopener"&gt;SMB firewall rule changes in Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic#updated-firewall-rules-preview" target="_blank" rel="noopener"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB auditing improvements&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;What it is&lt;/H3&gt;
&lt;P&gt;SMB now supports auditing use of SMB over QUIC, missing third party support for encryption, and missing third party support for signing. These all operate at the SMB server and SMB client level.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;How it helps you&lt;/H3&gt;
&lt;P&gt;It is much easier for you to determine if Windows and Windows Server devices are making SMB over QUIC connections. It is also much easier to determine if third parties support signing and encryption before mandating their usage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Learn more&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/windows-insider-build-26090-brings-small-changes-for-smb/ba-p/4100200" target="_blank" rel="noopener"&gt;Windows Insider build 26090 brings small changes for SMB - Microsoft Community Hub&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Summary&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the release of Windows Server 2025 and Windows 11 24H2, we have made the most changes to SMB security since the introduction of SMB 2 in Windows Vista. Deploying these operating systems fundamentally alters your security posture and reduces risk to this ubiquitous remote file and data fabric protocol used by organizations worldwide.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on changes in Windows Server 2025, visit &lt;A href="https://techcommunity.microsoft.com/t5/tech-community-live/windows-server-summit-2024/ev-p/4068971" target="_blank" rel="noopener"&gt;Windows Server Summit 2024 - March 26-28, 2024 | Microsoft Event&lt;/A&gt;. You will find dozens of presentations and demos on the latest features arriving this fall in our latest operating system.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;And remember, you can try all of this &lt;EM&gt;right now&lt;/EM&gt;: preview &lt;A href="https://aka.ms/WindowsServer2025Eval" target="_blank" rel="noopener"&gt;Windows Server 2025&lt;/A&gt; and &lt;A href="https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewiso" target="_blank" rel="noopener"&gt;Windows 11 24H2&lt;/A&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Ned Pyle&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 16:19:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-security-hardening-in-windows-server-2025-amp-windows-11/ba-p/4226591</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-08-23T16:19:30Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2025 Storage Performance with Diskspd</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/windows-server-2025-storage-performance-with-diskspd/ba-p/4167713</link>
      <description>&lt;LI-SPOILER&gt;
&lt;P&gt;Windows Server 2025 is the most secure and performant release yet!&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/evalcenter/download-windows-server-2025" target="_blank" rel="noopener noreferrer"&gt;Download&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the evaluation now!&lt;/P&gt;
&lt;P&gt;Looking to migrate from VMware to Windows Server 2025? Contact your Microsoft account team!&lt;/P&gt;
&lt;/LI-SPOILER&gt;
&lt;H1&gt;&lt;SPAN&gt;Windows Server 2025 Storage Performance with Diskspd&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;Hi Folks - &lt;A href="https://www.linkedin.com/in/danielcuomo/" target="_self"&gt;Dan Cuomo&lt;/A&gt; here to talk about some improvements in Diskspd storage measurement and the improvements you'll see in Windows Server 2025 storage performance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you manage on-premises servers, you know one of the final tests you run before going to production is a performance test. You want to ensure that when you migrate virtual machines to that host, or you install SQL server on that machine, that you’re going to get the expected IOPS, the expected latency, or whatever other metrics you deem important for your business’ workloads.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, after all the group policies have been applied, firewall rules are set, agents are installed and configured (or anything else you do in your deployment playbook), you download &lt;A href="https://github.com/microsoft/diskspd/releases/latest/download/DiskSpd.ZIP" target="_blank" rel="noopener"&gt;Diskspd&lt;/A&gt;, &lt;A href="https://github.com/microsoft/ntttcp" target="_blank" rel="noopener"&gt;NTTTCP&lt;/A&gt;, and other performance testing tools you use to test this server compared to your baseline (if you don’t do this, you should be!).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having this performance baseline allows you to answer questions like, “Is this cluster ready for production” or “Is my VM performing as expected on this hardware?” Without a solid performance baseline, you simply cannot answer these questions with confidence. In Azure, we operate some of the most performance demanding workloads in the world, so it is equally important for Microsoft to understand the storage performance of our servers. To do this, teams across Microsoft use Diskspd, our in-house developed and publicly available storage measurement tool. We continually improve Diskspd’s measurement capability so both you and our internal Microsoft teams can be confident and informed as you’re running your Windows Server workloads.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this article, we’ll discuss two significant improvements (known as Batched Completions and Look-a-sides) in Diskspd measurement and what you need to know as a result. But before we begin, let’s put your mind at ease. Nothing is getting worse!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To that end, you may be wondering about the genesis of these improvements. Diskspd is being updated to handle modern workloads and hardware like NVMe. Our storage stack in Windows Server 2025 was also updated to leverage advances in NVMe storage (you can hear more about the storage performance improvements in Windows Server 2025 &lt;A href="https://www.youtube.com/live/e8E-_lk_y84?si=qgAkiOTzDfMcdUwV&amp;amp;t=361" target="_blank" rel="noopener"&gt;here&lt;/A&gt; and &lt;A href="https://www.youtube.com/live/j470Tp4b6es?si=y3dkeYCF8fjyHCjy&amp;amp;t=531" target="_blank" rel="noopener"&gt;here&lt;/A&gt;)! During our testing of these capabilities, we improved our methods of latency measurement and found that we were now hitting the disk device limits when using Windows Server 2025!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;The changes outlined in this article are available in Diskspd 2.2 and later. &lt;A href="https://github.com/microsoft/diskspd/releases/latest" target="_self"&gt;Download&lt;/A&gt; now!&lt;/PRE&gt;
&lt;H2&gt;New: Batched Completions&lt;/H2&gt;
&lt;P&gt;First, some background. When Diskspd starts, you specify the -o parameter which indicates the number of outstanding I/O requests to keep “in-flight.” If you specify -o 1 for example, Diskspd would issue one I/O, wait for its completion, then reissue another I/O. The higher the number of outstanding I/O’s, the more taxing in terms of performance requirements on the physical hardware.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let’s use an analogy to understand how Diskspd measurement accuracy is improved with batched completions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It’s that time of the day again – time to check the mailbox. You walk to the mailbox and find that there are 16 letters ready for you to pick up before you return to your home. Unless you’re counting steps for fitness-tracking, you’ll grab all the mail in the mailbox at one time before returning. How inefficient would it be to retrieve only one piece of mail from the mailbox, return to your home, read it, then go and get the next piece of mail from the mailbox again?!&amp;nbsp;But that’s how Diskspd historically worked without batched completions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Previously Diskspd would issue the requested number of I/Os (T0), then receive and record one I/O at a time (T1), then reissue that I/O (T2) before receiving and recording the other completed I/O (T3) even though it completed at the same time. This is the equivalent of taking one letter out of the mailbox, walking back to the house, reading and writing a response to the letter, then walking back to the mailbox, and picking up the next letter &amp;lt;repeat until all letters (I/Os) are read from the mailbox&amp;gt;. Historically, this wasn't a big problem because disks simply weren't fast enough for this issue to be observed anyway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The processing of completed I/Os one at a time caused Diskspd to report higher storage latency than you could actually achieve on your system. Simply put, as disks have become faster, Diskspd needed a new way to track, record, and reissue completed I/Os.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Diskspd with Batched Completions&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Now, with batched completions, Diskspd will receive all completed I/Os (letters in the mailbox) and record them as soon as they complete (T1). This reflects the actual time that I/Os completed and prevents Diskspd from inflating the storage latency.&lt;/P&gt;
&lt;P&gt;To continue the mailbox example, now we walk to the mailbox once, pick up all the mail and return back inside the house. We still respond to the mail (reissue I/Os) one at a time.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;New: Look-a-sides&lt;/H2&gt;
&lt;P&gt;Now let’s imagine you’re moving into a new home and have several new household items being delivered to the house. To simplify your move-in-day, you order some pizza for dinner as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The doorbell rings so you open your door and see the delivery truck with household items and the pizza delivery in front of your house. You take the box with all the household items, ignoring the pizza which is now sitting on your front porch getting cold, and begin to unbox everything in it. Once the box has been unpacked, you reopen your front door and pick up the pizza. For those of you that really enjoy cold pizza, this analogy might not seem like a big problem!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Diskspd recently implemented functionality called “look-a-sides” intended to address a scenario similar to the analogy above.&lt;/P&gt;
&lt;P&gt;To understand the challenge, imagine there are 16 I/Os issued (T0) and 2 of those I/Os complete shortly after. Next, Diskspd receives I/O 1 and 2 (T1 using batched completions). While Diskspd is receiving the first set of completed I/Os, more I/Os (3 and 4) complete.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But Diskspd doesn’t record I/Os 3 and 4 as having completed yet. Instead, it continues its goal of reissuing I/Os 1 and 2. This delay in receiving and recording completed I/Os inflates the latency time measured by Diskspd unnecessarily. The more I/Os kept in-flight (the larger value for -o parameter) the more prominent this issue will become.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Diskspd with Look-a-sides&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Now, with look-a-sides, Diskspd will receive I/Os 1 and 2 (T1) and begin to reissue IO 1 (T2). At the earliest possible opportunity, Diskspd will look at the completion queue to see if there are more I/Os that it can receive, and record as completed (T3).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: If there are no I/Os to receive, Diskspd simply moves on. In either event Diskspd continues reissuing any I/Os it has received (T4).&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Recommendation #1: Re-baseline your storage performance&lt;/H2&gt;
&lt;P&gt;Since these changes can be so dramatic, you should re-baseline your storage performance using the &lt;A href="https://github.com/microsoft/diskspd/releases/latest" target="_blank" rel="noopener"&gt;latest version of Diskspd&lt;/A&gt;. Here are comparisons we ran using some representative hardware.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The numbers reinforce two things. First, the latency reduction is fairly dramatic regardless of the drive you use. The example on the right includes enterprise grade hardware. Next, you can see that the more IO’s Diskspd is told to keep in flight (Queue Depth) the more dramatic the measurement improvement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Recommendation #2: Test IOPS and Latency Separately&lt;/H2&gt;
&lt;P&gt;There is a chance that when Diskspd performs a look-a-side it will find no additional competed I/Os. This is sort of a "&lt;A href="https://en.wikipedia.org/wiki/Schr%C3%B6dinger%27s_cat" target="_blank" rel="noopener"&gt;Schrödinger's cat&lt;/A&gt;" situation because Diskspd cannot know there are no I/O’s waiting without looking in the completion queue (look-a-side) which uses a small amount of CPU resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Each time Diskspd performs a latency test the extra CPU used to perform the look-a-side effects the overall amount of I/O that can be pushed and lowers the reported amount of IOPS on the system. In a simple test using single thread, random 4K reads on a consumer disk, we found that IOPS reduced nearly 6% (59.5K IOPS to 56.1K IOPS) when testing latency with look-a-sides.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, you might be asking yourself, “can I turn look-a-sides off if I just want to test IOPS?” The good news is that look-a-sides are only enabled once you specify the latency parameter (-L) with Diskspd. Therefore we recommend you perform two separate performance tests: one for IOPS (without -L) and one for latency (with -L). When using -L, your IOPS measurements will be a bit lower than the maximum achievable on the system.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are some example Diskspd commands for Latency and IOPS testing:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;IOPS Testing&lt;BR /&gt;Diskspd.exe -t8 -o8 -b4k -r -w0 -Suw&lt;/LI&gt;
&lt;/UL&gt;
&lt;PRE class="lia-indent-padding-left-30px"&gt;Note: This is only an example. You may need to try various values for -o to find the maximum.&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Latency Testing&lt;BR /&gt;Diskspd.exe -t1 -o1 -b4k -r -w0 -Suw -L&lt;/LI&gt;
&lt;/UL&gt;
&lt;PRE&gt;Note: With the fixes here, you could also try small increases like -o2 or -o4&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Summary&lt;/H2&gt;
&lt;P&gt;To keep pace with the advances in disk speeds and the improvements in Windows Server 2025, we’ve made investments in our storage performance benchmark tool to get you an accurate measure of latency. These improvements were so drastic that we recommend that you run separate performance tests for latency and IOPS and re-baseline the server performance in your environment. Remember to&amp;nbsp;&lt;SPAN&gt;download&amp;nbsp;the latest version of&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/diskspd/releases/latest/download/DiskSpd.ZIP" target="_blank" rel="noopener noreferrer"&gt;Diskspd&lt;/A&gt;&amp;nbsp;along with &lt;A href="https://www.microsoft.com/en-us/evalcenter/download-windows-server-2025" target="_self"&gt;Windows Server 2025 evaluation&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always, we’d love to hear your feedback below as we continue to improve these tools.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dan "Latency Reducer" Cuomo&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2024 20:59:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/windows-server-2025-storage-performance-with-diskspd/ba-p/4167713</guid>
      <dc:creator>DanCuomo</dc:creator>
      <dc:date>2024-06-14T20:59:34Z</dc:date>
    </item>
    <item>
      <title>Accessing a third-party NAS with SMB in Windows 11 24H2 may fail</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/accessing-a-third-party-nas-with-smb-in-windows-11-24h2-may-fail/ba-p/4154300</link>
      <description>&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again. With the publication of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://blogs.windows.com/windows-insider/2024/05/22/releasing-windows-11-version-24h2-to-the-release-preview-channel/" target="_self"&gt;Windows 11 24H2 Release Preview&lt;/A&gt;, customers are trying out the new OS prior to general availability. If you were in the Windows Insider Canary or Dev release program for the past few years, nothing I'm about to share is new. But if you weren't and you're now having issues mapping a drive to your third-party network attached storage (NAS) devices using SMB, this article is for you.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 data-unlink="true"&gt;&lt;SPAN&gt;What changed&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;In Windows 11 24H2, we've made two major security changes that can affect mapping drives to third-party consumer NAS or routers with USB storage:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;By default, SMB signing is required on all connections.&lt;/STRONG&gt; This increases your security by preventing tampering on the network and stops relay attacks that send your credentials to malicious servers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Guest fallback is disabled on Windows 11 Pro edition.&lt;/STRONG&gt;&amp;nbsp;This increases your security when connecting to untrustworthy devices. Guest allows you to connect to an SMB server with no username or password. While convenient for the maker of your NAS, it means that your device can be tricked into connecting to a malicious server without prompting for credentials, then given ransomware or having your data stolen.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;SMB signing has been available in Windows for 30 years but, for the first time, is now required by default on all connections. Guest has been disabled in Windows for 25 years and SMB guest fallback disabled since Windows 10 in Enterprise, Education, and Pro for Workstation editions. Both changes will make billions of devices - not just Windows, but everything running SMB that wants to talk to Windows - more secure. They've been in Windows Insider Dev and Canary builds for a year.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 data-unlink="true"&gt;&lt;SPAN&gt;What happens with a third-party NAS&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;There's one unavoidable consequence, though: we don't know when someone&amp;nbsp;&lt;EM&gt;intended&lt;/EM&gt; to be unsafe.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;We don't know the difference between a NAS that doesn't have SMB signing enabled and an evil server that doesn't&amp;nbsp;&lt;EM&gt;want&lt;/EM&gt; SMB signing enabled.&lt;/LI&gt;
&lt;LI&gt;We also don't know the difference between a consumer NAS - where the manufacturer used guest access to simplify connecting to their storage at the expense of security - and an evil server that&amp;nbsp;&lt;EM&gt;wants&lt;/EM&gt; you to connect without any security prompts in order to steal all of your files and or deliver malware. Furthermore, SMB signing&amp;nbsp;&lt;EM&gt;cannot be used with guest credentials. &lt;/EM&gt;So even if you have guest fallback enabled, SMB signing will prevent it from working.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you have installed Windows 11 24H2 Release Preview and see one of these errors trying to connect to your third-party device afterwards that was working fine previously, you're in the right place.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;If signing isn't supported by your third-party device, you may get error:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;0xc000a000&lt;/LI&gt;
&lt;LI&gt;-1073700864&lt;/LI&gt;
&lt;LI&gt;STATUS_INVALID_SIGNATURE&lt;/LI&gt;
&lt;LI&gt;The cryptographic signature is invalid&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;If guest access is required by your third party, you may get error:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You can't access this shared folder because your organization's security policies block unauthenticated guest access. These policies help protect your PC from unsafe or malicious devices on the network&lt;/LI&gt;
&lt;LI&gt;0x80070035&lt;/LI&gt;
&lt;LI&gt;0x800704f8&lt;/LI&gt;
&lt;LI&gt;The network path was not found&lt;/LI&gt;
&lt;LI&gt;System error 3227320323 has occurred&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 data-unlink="true"&gt;&lt;SPAN&gt;How to solve the issues&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;To solve these issues, we recommend you do the following in this order. It's ordered from the safest to the least safe approach, and our goal is for your data to be protected, not to help third parties sell you unsafe products.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Enable SMB signing in your third-party NAS. Your vendor will have steps to do this online if it's possible in the device's management software.&lt;/LI&gt;
&lt;LI&gt;Disable guest access in your third-party NAS. Your vendor will have steps to do this online if it's possible in the device's management software.&lt;/LI&gt;
&lt;LI&gt;Enable a username and password in your third-party NAS. Your vendor will have steps to do this online if it's possible in the device's management software.&lt;/LI&gt;
&lt;LI&gt;Upgrade your NAS if you cannot enable signing, cannot disable guest, or cannot use a username and password. The NAS will usually have an upgrade option in its management software, possibly labeled as "firmware update."&lt;/LI&gt;
&lt;LI&gt;Replace your NAS if you cannot upgrade your NAS software to support signing and credentials (you will need to use steps 6 and later to copy your data off of it to your new NAS first)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#DF0000"&gt;Now we're into the less recommended steps, as they will make your Windows device and your data much less safe. They will, however, let you access this unsafe NAS.&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;6. Disable the SMB client signing requirement:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;a. On the Start Menu search, type &lt;STRONG&gt;gpedit&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;and start the &lt;STRONG&gt;Edit Group Policy&lt;/STRONG&gt; app (i.e. Local Group Policy Editor)&lt;/SPAN&gt;. If you are using &lt;EM&gt;Home&lt;/EM&gt; edition, skip to step 8.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;b. In the console tree, select&amp;nbsp;&lt;STRONG&gt;Computer Configuration&amp;nbsp;&amp;gt;&amp;nbsp;Windows Settings&amp;nbsp;&amp;gt;&amp;nbsp;Security Settings&amp;gt;&amp;nbsp;Local Policies &amp;gt; Security Options&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;c. Double-click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Microsoft network client: Digitally sign communications (always)&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;d. Select&amp;nbsp;&lt;STRONG&gt;Disabled&amp;nbsp;&lt;/STRONG&gt;&amp;gt;&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;7. Disable the guest fallback protection:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;a. On the Start Menu search, type &lt;STRONG&gt;gpedit&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;and start the &lt;STRONG&gt;Edit Group Policy&lt;/STRONG&gt; app (i.e. Local Group Policy Editor)&lt;/SPAN&gt;.&amp;nbsp;If you are using &lt;EM&gt;Home&lt;/EM&gt; edition, skip to step e.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;b. In the console tree, select&amp;nbsp;&lt;STRONG&gt;Computer Configuration&amp;nbsp;&amp;gt;&amp;nbsp;Administrative Templates&amp;gt;&amp;nbsp;Network &amp;gt; Lanman Workstation.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;c. Double-click&amp;nbsp;&lt;STRONG&gt;Enable insecure guest logons&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;d. Select&amp;nbsp;&lt;STRONG&gt;Enabled&amp;nbsp;&lt;/STRONG&gt;&amp;gt;&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;8. If you're running Windows 11 &lt;EM&gt;Home edition&lt;/EM&gt;, the guest fallback option is still enabled by default, so you're probably not reading this blog post. But if for some reason it is on, or you need to turn off SMB signing due to some third-party NAS, you will need to use PowerShell to configure your machine because there is no gpedit tool by default. To do this:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;a.&amp;nbsp;On the Start Menu search, type &lt;STRONG&gt;powershell&amp;nbsp;&lt;/STRONG&gt;then under the &lt;STRONG&gt;Windows PowerShell&lt;/STRONG&gt; app, click &lt;STRONG&gt;Run as administrator.&amp;nbsp;&lt;/STRONG&gt;Accept the elevation prompt.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;b. To disable SMB signing requirement, type:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="lia-indent-padding-left-30px"&gt;Set-SmbClientConfiguration -RequireSecuritySignature $false&lt;/PRE&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;d. Hit enter, then hit Y to accept.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;c. To disable guest fallback, type:&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="lia-indent-padding-left-30px"&gt;Set-SmbClientConfiguration -EnableInsecureGuestLogons $true&lt;/PRE&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;e. Hit enter, then hit Y to accept.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At this point you will be working if Signing or Guest were your real problems.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#DF0000"&gt;&lt;STRONG&gt;Important&lt;/STRONG&gt;:&amp;nbsp;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;we have not removed your ability to enable SMB1.&lt;/STRONG&gt; All editions of Windows 11 have SMB1 disabled by default - this has been the case for over a year now and, in some editions, going back to Windows 10 - but you are free to re-enable it if you have a third-party NAS that only supports SMB1. &lt;EM&gt;SMB1 supports signing but your NAS may not&lt;/EM&gt;, so the steps above for disabling signing can still apply. SMB1 always allows guest fallback and it cannot be stopped, so the guest steps are not applicable. If your third-party NAS still requires SMB1, it's likely listed here&amp;nbsp;&lt;A href="https://aka.ms/stillneedssmb1" target="_blank" rel="noopener"&gt;https://aka.ms/stillneedssmb1&lt;/A&gt;. If you find that it&amp;nbsp;&lt;EM&gt;also&amp;nbsp;&lt;/EM&gt;doesn't support SMB signing, please let us know with the email address below.&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Learning more &amp;amp; helping the community&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;If you have a third-party NAS device that doesn't support SMB signing, we want to hear about it. Please email&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="mailto:wontsignsmb@microsoft.com" target="_blank" rel="noopener"&gt;wontsignsmb@microsoft.com&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;with the make and model of your NAS device so we can share with the world and perhaps get the vendor to fix it with an update.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;For more details on these technologies, what they do, and what the future holds, review blog posts:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-unlink="true"&gt;&lt;SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider - Microsoft Community Hub&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;&lt;SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions - Microsoft Community Hub&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;&lt;SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-and-guest-authentication/ba-p/3846679" target="_blank" rel="noopener"&gt;SMB Signing and Guest Authentication - Microsoft Community Hub&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;&lt;SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/bg-p/FileCAB" target="_blank" rel="noopener"&gt;Storage at Microsoft - Microsoft Community Hub&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;For the official MS Learn docs, review:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-unlink="true"&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/storage/file-server/smb-signing?tabs=windows" target="_blank" rel="noopener"&gt;Control SMB signing behavior (preview) | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/guest-access-in-smb2-is-disabled-by-default" target="_blank" rel="noopener"&gt;Guest access in SMB2 and SMB3 is disabled - Windows Server | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/storage/file-server/enable-insecure-guest-logons-smb2-and-smb3?tabs=group-policy" target="_blank" rel="noopener"&gt;Enable insecure guest logons in SMB2 and SMB3 for Windows client and Windows Server | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2024 16:26:34 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/accessing-a-third-party-nas-with-smb-in-windows-11-24h2-may-fail/ba-p/4154300</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-06-14T16:26:34Z</dc:date>
    </item>
    <item>
      <title>Completing DFSR SYSVOL migration of domains that use Entra ID passwordless SSO</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/completing-dfsr-sysvol-migration-of-domains-that-use-entra-id/ba-p/4138977</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again.&amp;nbsp;A customer recently reached out to me in the comments section of the well-worn&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/streamlined-migration-of-frs-to-dfsr-sysvol/ba-p/425405" target="_blank" rel="noopener"&gt;Streamlined Migration of FRS to DFSR SYSVOL&lt;/A&gt;&amp;nbsp;article, asking about a problem he was seeing with a single DC that wouldn't complete the process. Today I'll explain how to fix the issue introduced by a very modern authentication add-on.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Background&amp;nbsp;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-unlink="true"&gt;Decades after Windows 2000 first shipped and introduced the world to Domain Controllers, the File Replication Service, and SYSVOL, Azure released the &lt;A href="https://learn.microsoft.com/entra/identity/authentication/howto-authentication-passwordless-security-key-on-premises" target="_self"&gt;Entra ID&amp;nbsp;Passwordless security key sign-in to on-premises resources&lt;/A&gt;. With it, Entra ID can issue Kerberos ticket-granting tickets for your Active Directory domain. Users can sign in to Windows with modern credentials, such as FIDO2 security keys, and then access traditional Active Directory-based resources. Kerberos Service Tickets and authorization continue to be controlled by your on-premises DCs.&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorNedPyle_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;Under the covers, this works by an admin provisioning an Entra DC. A pseudo-Domain Controller, as it were, named "AzureADKerberos". It's not a real physical or virtual DC, but simply a computer object in AD pretending to be a DC so that Entra ID works in this scenario.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;The Issue&lt;/H2&gt;
&lt;P&gt;So, with that in mind, you're following the DFSR migration steps and notice that one domain controller named "AzureADKerberos" is not migrating, but instead always stays in the Started state:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;dfsrmig.exe /getmigrationstate&lt;BR /&gt;&lt;BR /&gt;The following domain controllers have not reached Global state ('Eliminated'):&lt;BR /&gt;&lt;BR /&gt;Domain Controller (Local Migration State) - DC Type&lt;BR /&gt;===================================================&lt;BR /&gt;&lt;BR /&gt;AzureADKerberos ('Start') - Writable DC&lt;BR /&gt;&lt;BR /&gt;Migration has not yet reached a consistent state on all domain controllers.&lt;BR /&gt;State information might be stale due to Active Directory Domain Services latency.&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since this isn't a real domain controller, it's not participating in FRS or DFSR SYSVOL replication. It doesn't even have the AD leaf object and links to do so! But DFSRMIG doesn't know this, it just sees a DC and therefore thinks it must be migrated.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Fixing the issue&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;OK, so how do we fix this pseudo-domain controller blocking the migration? It's pretty straightforward once you understand how migration state works under the covers. For that, take a look at&amp;nbsp;&lt;A href="https://learn.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd639789(v=ws.10)#to-check-whether-active-directory-objects-for-dfs-replication-still-exist" target="_self"&gt;Verifying the State of SYSVOL Migration&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;and the equally well-worn AskDS blog post&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/dfsr-sysvol-migration-faq-useful-trivia-that-may-save-your/ba-p/395891" target="_blank" rel="noopener"&gt;DFSR SYSVOL Migration FAQ: Useful trivia that may save your follicles.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Anyway, let's do this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Logon to one of your DCs as a domain admin.&lt;/P&gt;
&lt;P&gt;2. Run ADSIEDIT.MSC, right click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;ADSI Edit&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and connect to the 'Default Naming Context'.&lt;BR /&gt;3. Navigate to the Domain Controllers OU.&lt;BR /&gt;4 Right click the "AzureADKerberos" computer object and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Object&lt;/STRONG&gt;.&lt;BR /&gt;5. In 'Select a class', choose&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;msDFSR-LocalSettings&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Next&lt;/STRONG&gt;.&lt;BR /&gt;6. In 'Value', type&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;DFSR-LocalSettings&lt;/STRONG&gt;&amp;nbsp;and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Next&lt;/STRONG&gt;.&lt;BR /&gt;7. Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Finish&lt;/STRONG&gt;.&lt;BR /&gt;8. Right-click the new 'DFSR-LocalSettings' leaf object and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Properties&lt;/STRONG&gt;.&lt;BR /&gt;9. Scroll to 'msDFSR-Flags' and set it to a value of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;48&lt;/STRONG&gt;.&lt;BR /&gt;10. Click ok and ok, close ADSIEDIT.MSC.&lt;BR /&gt;11. Allow AD replication to complete.&lt;BR /&gt;12 Continue your migration until completed and verify all DCs are now in Global state eliminated by running:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;dfsrmig.exe /getmigrationstate&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;All domain controllers have migrated successfully to the Global state ('Eliminated').&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Migration has reached a consistent state on all domain controllers.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Succeeded.&lt;/EM&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Last thoughts&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Technical debt is a real pita, but you already knew that! Just be glad that you're finally getting that old FRS system out and moving to DFSR for your SYSVOL.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That streamlined migration article has 702,000 views even after being migrated from the old TechNet blog platform. But the old dog still learns new tricks :).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Until next time,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ned Pyle&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 21:18:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/completing-dfsr-sysvol-migration-of-domains-that-use-entra-id/ba-p/4138977</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-05-13T21:18:19Z</dc:date>
    </item>
    <item>
      <title>Storage in Windows Server 2025, from the Server Summit</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/storage-in-windows-server-2025-from-the-server-summit/ba-p/4099901</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again. The &lt;A href="https://techcommunity.microsoft.com/t5/tech-community-live/windows-server-summit-2024/ev-p/4068971" target="_self"&gt;three-day Windows Server Summit 2024&lt;/A&gt; just completed and there are great on-demand sessions about Windows Server 2025 and Windows vNext. Some of the most interesting ones for this blog's audience are below, but the whole summit is worth a watch if you're an IT Pro, decision maker, consultant, architect, or C-level.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-events/next-generation-smb-file-services/ev-p/4080113" target="_blank"&gt;Next-generation SMB file services | Windows Server Summit 2024 (microsoft.com)&lt;/A&gt;&lt;/STRONG&gt; – “Radical changes are coming to the Server Message Block (SMB) and file services in Windows Server 2025 and Windows 11. Learn about new security behaviors, new functionality, and new scenarios available to your organization.” Speaker: Ned Pyle&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-events/new-storage-features-in-windows-server-2025/ev-p/4080111" target="_blank"&gt;&lt;STRONG&gt;New storage features in Windows Server 2025 | Windows Server Summit 2024 (microsoft.com)&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;&amp;nbsp;-&lt;/STRONG&gt; "Explore storage features in Windows Server 2025. We'll showcase exciting new capabilities in the ReFS file system, software-defined storage with Storage Spaces, innovation in Storage-spaces Direct (S2D), and new enhancements for Storage Area Networks (SANs) such as NVMe over Fabrics (NVMeoF). We will also show some of the incredible storage performance enhancements that make upgrading to Windows Server 2025 a must. Come for an overview of everything new, then dive into demos and a look "under the hood" of storage in Windows Server." Speaker: Dan Cuomo&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-events/demo-bytes-ssh-for-azure-arc-storage-replica/ev-p/4080098" target="_blank"&gt;&lt;STRONG&gt;Demo bytes: SSH for Azure Arc, Storage Replica | Windows Server Summit 2024 (microsoft.com)&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;&amp;nbsp;-&lt;/STRONG&gt; "Storage Replica was first released in Windows Server 2016 and has come a long way. See how we've improved performance by enhancing logs and compression. Watch demos where we replace DFSR with this modern replication system that will replicate in-use files and protect your organization from disasters." Speaker: Ned Pyle&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-events/windows-server-2025-refs-booted-images-for-confidential-vms/ev-p/4080172" target="_blank"&gt;Windows Server 2025 ReFS booted images for confidential VMs | Windows Server Summit 2024 (microsoft.com)&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;- "The Resilient File System (ReFS) is Microsoft's newest file system, designed to maximize data availability, scale efficiently to large data sets across diverse workloads, and provide integrity against data tampering. There is an initiative in the Windows Storage team to make ReFS the default filesystem for all Windows customers and the first step is to enable ReFS boot so that it can be leveraged by confidential VMs (CVMs). With Windows ReFS support for confidential VMs, we are introducing new features such as data integrity protection and rollback protection for the OS disk to further improve the security posture and protect your data end to end." Speakers: Simran Parkhe, Tina Wu, and Vikas Tikoo&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-events/the-evolution-of-windows-authentication/ec-p/4092431#M307" target="_blank"&gt;The evolution of Windows authentication | Windows Server Summit 2024 (microsoft.com)&lt;/A&gt;&lt;/STRONG&gt; – “As the security landscape evolves, Windows must continue to change to protect users and organizations. Foundational to this is user authentication. In Windows Server 2025 and Windows vNext, we have created completely new Kerberos features to minimize use of NTLM in your environments. This session explains and demonstrates IAKerb, Local KDC, IP SPN, and the roadmap to the end of NTLM.” Speaker: Ned Pyle&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-events/hotpatching-improving-server-security-and-productivity/ev-p/4080162" target="_blank"&gt;Hotpatching: Improving server security and productivity | Windows Server Summit 2024 (microsoft.com)&lt;/A&gt; &lt;/STRONG&gt;– “When it comes to installing securing updates, organizations are often concerned about the potential for business disruption and reduced system availability. This is a thing of the past with Hotpatching! Come see how Hotpatching enables you to apply critical security updates without rebooting your servers, reducing downtime and improving productivity. Hear from the Xbox team, who have successfully adopted Hotpatching for the online gaming platform. Discover what is in store as we expand the service and make it more broadly available.” Speakers: Vishal Bajaj, Viraj Desai, Tim Dreyling&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-events/windows-server-2025-os-security-for-it-and-security-pros/ev-p/4080240" target="_blank"&gt;Windows Server 2025 OS security for IT and security pros | Windows Server Summit 2024 (microsoft.com)&lt;/A&gt; –&lt;/STRONG&gt; “Advancements in security have been a core part of Windows Server 2025 development. Come for an overview of service account hardening, Secured-core, security baselines as a first-class product feature, authentication protocols, and more. Want a deeper dive on NTLM and Kerberos? See The evolution of Windows authentication.” Speakers: Dona Mukherjee, Matthew Reynolds&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-events/windows-server-2025-the-upgrade-and-update-experience/ev-p/4080229" target="_blank"&gt;Windows Server 2025: The upgrade and update experience | Windows Server Summit 2024 (microsoft.com)&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;- "Discover the streamlined upgrade process to Windows Server 2025 in our session. We will cover N-4 media-based upgrades, feature upgrades through Windows Update, and efficient management of feature and quality updates with Windows Server Update Services (WSUS). Gain insights into best practices and tools for a smooth transition, ensuring your infrastructure aligns seamlessly with the latest advancements. Don't miss this opportunity for valuable insights, practical tips, and a roadmap to upgrade your Windows Servers effectively." Speakers: Yutong Liao, Harpreet Kaur, Rob Hindman, Riddhi Ameser&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-events/what-s-new-in-windows-server-2025/ev-p/4080091" target="_blank"&gt;What's new in Windows Server 2025 | Windows Server Summit 2024 (microsoft.com)&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;- "Get a closer look at Windows Server 2025. Explore improvements, enhancements, and new capabilities. We'll walk you through the big picture and offer a guide to which Windows Server Summit sessions will help you learn more."&amp;nbsp;Speaker: Elden Christensen&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;There are 30+ sessions at the &lt;A href="https://techcommunity.microsoft.com/t5/tech-community-live/windows-server-summit-2024/ev-p/4068971" target="_self"&gt;Windows Server Summit&lt;/A&gt; - I learned all kinds of stuff myself! Dive in.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Ned Pyle&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 22:02:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/storage-in-windows-server-2025-from-the-server-summit/ba-p/4099901</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-03-28T22:02:51Z</dc:date>
    </item>
    <item>
      <title>Windows Insider build 26090 brings small changes for SMB</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/windows-insider-build-26090-brings-small-changes-for-smb/ba-p/4100200</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again. We continue to make SMB changes to Windows vNext and Windows Server 2025 based on customer feedback and last mile work. With the release of&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://blogs.windows.com/windows-insider/2024/03/28/announcing-windows-11-insider-preview-build-26090-canary-and-dev-channels/" target="_blank" rel="noopener"&gt;Windows 11 Insider Preview Build 26090 (Canary and Dev Channels)&lt;/A&gt;, we have a few more small ones. Some of these were based on Insider feedback from customers - your opinions really do matter to us!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SMB over QUIC client disable&lt;/STRONG&gt;: Administrators can now disable the SMB over QUIC client with Group Policy and PowerShell. To disable SMB over QUIC using PowerShell, run the following command in an elevated console:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Set-SmbClientConfiguration -EnableSMBQUIC $false&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To disable SMB over QUIC using Group Policy, use GPMC.MSC or GPEDIT.MSC to configure the following setting:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Workstation \ Enable SMB over QUIC&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This option already exists for the SMB over QUIC server in two ways: either you can actively disable it with group policy and PowerShell, or you can simply not configure SMB over QUIC with a certificate, which accomplishes the same thing and is the out of box experience, obviously.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SMB over QUIC client connection auditing&lt;/STRONG&gt;: Successful SMB over QUIC client connection events are now written to the event log to include the QUIC transport. You can view these events using EVENTVWR.MSC under the following path:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Applications and Services Logs \ Microsoft \ Windows\ SMBClient \ Connectivity (Event ID: 30832)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SMB signing and encryption auditing&lt;/STRONG&gt;: Administrators can now enable auditing of the SMB server and client for support of SMB signing and encryption. This shows if a third-party client or server doesn’t support SMB encryption or signing. If your third-party device or software claims to support SMB 3.1.1 but doesn't support SMB signing, you need to get your money back, as that breaks the strict&amp;nbsp;&lt;A href="https://learn.microsoft.com/archive/blogs/openspecification/smb-3-1-1-pre-authentication-integrity-in-windows-10?WT.mc_id=ITOPSTALK-blog-abartolo" target="_self"&gt;pre-authentication integrity&lt;/A&gt;&amp;nbsp;protocol requirement, and they are only using SMB 3.0.2 or older!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can configure these settings with PowerShell and Group Policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To configure SMB client or server signing or encryption auditing using Group Policy, use GPMC.MSC or GPEDIT.MSC to configure the following settings:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Workstation \ Audit server does not support encryption&lt;/LI&gt;
&lt;LI&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Workstation \ Audit server does not support signing&lt;/LI&gt;
&lt;LI&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Server \ Audit client does not support encryption&lt;/LI&gt;
&lt;LI&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Server \ Audit client does not support signing&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To&amp;nbsp;configure SMB client or server signing or encryption auditing using using PowerShell, run the following command in an elevated console:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Set-SmbClientConfiguration -AuditServerDoesNotSupportEncryption $true&lt;/PRE&gt;
&lt;PRE&gt;Set-SmbClientConfiguration -AuditServerDoesNotSupportSigning $true&lt;/PRE&gt;
&lt;PRE&gt;Set-SmbServerConfiguration -AuditClientDoesNotSupportEncryption $true&lt;/PRE&gt;
&lt;PRE&gt;Set-SmbServerConfiguration -AuditClientDoesNotSupportSigning $true&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can view these events using EVENTVWR.MSC under the following paths:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Applications and Services Logs \ Microsoft \ Windows\ SMBClient \ Audit (Event ID: 31998 and Event ID: 31999)&lt;/LI&gt;
&lt;LI&gt;Applications and Services Logs \ Microsoft \ Windows\ SMBServer \ Audit (Event ID: 3021 and Event ID: 3022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on SMB over QUIC in Windows and Windows Server Insider Preview builds, review&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/SMBoverQUICServer" target="_blank" rel="noopener"&gt;https://aka.ms/SMBoverQUICServer&lt;/A&gt;&amp;nbsp;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/SmbOverQuicCAC" target="_blank" rel="noopener"&gt;https://aka.ms/SmbOverQuicCAC&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on SMB signing and encryption in Windows and Windows Server Insider Preview builds, review&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/SmbSigningRequired" target="_blank" rel="noopener"&gt;https://aka.ms/SmbSigningRequired&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/SmbClientEncrypt" target="_blank" rel="noopener"&gt;https://aka.ms/SmbClientEncrypt&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The changes will keep coming, our work is never done. Keep checking back here for news and new things to try out in Windows and Windows Server Insider.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 23:28:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/windows-insider-build-26090-brings-small-changes-for-smb/ba-p/4100200</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-04-10T23:28:13Z</dc:date>
    </item>
    <item>
      <title>Windows Server Insider Preview 26040 is out - and so is the new name</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/windows-server-insider-preview-26040-is-out-and-so-is-the-new/ba-p/4040914</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again.&amp;nbsp;We've resumed the Windows Server Insider program after our winter break and there's a new build, new features, and - finally - the official branding: &lt;/SPAN&gt;&lt;FONT color="#0000FF"&gt;&lt;SPAN&gt;&lt;STRONG&gt;Windows Server 2025&lt;/STRONG&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;New features in 26040&lt;/SPAN&gt;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Windows Server Flighting&lt;/STRONG&gt;: Windows Server Insider now support flighting and downloadable in-place upgrades, exactly like Windows 11; no need to grab ISOs and run manual setup. For more info, visit&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-news-and-best/welcome-to-windows-insider-flighting-on-windows-server/ba-p/4040284" target="_blank" rel="noopener"&gt;Welcome to Windows Insider flighting on Windows Server&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;SMB over QUIC alternative ports&lt;/STRONG&gt;: Change from using the default UDP/443 port for SMB over QUIC to any port you define. For more info, visit&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-alternative-ports-now-supported-in-windows-insiders/ba-p/3974509" target="_blank" rel="noopener"&gt;SMB alternative ports now supported in Windows Insiders&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Windows Server 2025 and Insider Previews&lt;/SPAN&gt;&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Release notes, feedback links&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-26040/m-p/4040858" target="_blank" rel="noopener"&gt;Announcing Windows Server Preview Build 26040&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Download&lt;/STRONG&gt;:&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewserver" target="_blank" rel="noopener"&gt;Download Windows Server Insider Preview (microsoft.com)&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Review the SMB changes in Windows Insiders and Windows Server Insiders:&amp;nbsp;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank" rel="noopener"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_blank" rel="noopener"&gt;SMB alternative ports in Windows and Windows Server Insider&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_blank" rel="noopener"&gt;SMB Firewall changes in Windows and Windows Server insider&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener"&gt;SMB NTLM blocking in Windows and Windows Server Insider&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management in Windows and Windows Server Insider&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows and Windows Server Insider&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows and Windows Server Insider&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;STRONG&gt;Catch up on all the other new features and scenarios disclosed so far:&lt;/STRONG&gt;&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-news-and-best/introducing-windows-server-2025/ba-p/4026374" target="_blank" rel="noopener"&gt;Introducing Windows Server 2025!&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Until next time,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- Ned Pyle&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 19:24:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/windows-server-insider-preview-26040-is-out-and-so-is-the-new/ba-p/4040914</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-01-26T19:24:44Z</dc:date>
    </item>
    <item>
      <title>What's new in Windows Server vNext Ignite Session Now Available</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/what-s-new-in-windows-server-vnext-ignite-session-now-available/ba-p/3994620</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again. T&lt;/SPAN&gt;he &lt;A href="https://ignite.microsoft.com/" target="_self"&gt;Microsoft Ignite 2023&lt;/A&gt; session "&lt;STRONG&gt;What's new in Windows Server vNext&lt;/STRONG&gt;" is now up if you weren't able to attend in person. It covers many of the new features coming to Windows Server including Active Directory, File Server, Hyper-V, storage, and more. Many announcements were made - Hotpatch and SMB over QUIC for Datacenter and Standard editions, for example - along with some big surprises and some great demos.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/f3901190-1154-45e3-9726-d2498c26c2c9?source=sessions" target="_blank" rel="noopener"&gt;What’s New in Windows Server v.Next (microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/f3901190-1154-45e3-9726-d2498c26c2c9?source=sessions" target="_self"&gt;&lt;img /&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/f3901190-1154-45e3-9726-d2498c26c2c9?source=sessions" target="_self"&gt;&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can stream it or download the video for offline viewing, and the slides are available too. It's a really fun &amp;amp; interesting session; Jeff Woolsey and Elden Christensen are great speakers, and it was standing room only.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Enjoy!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 17:42:59 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/what-s-new-in-windows-server-vnext-ignite-session-now-available/ba-p/3994620</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2023-11-28T17:42:59Z</dc:date>
    </item>
    <item>
      <title>SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again.&amp;nbsp;&lt;/SPAN&gt;Starting with &lt;A href="https://aka.ms/WindowsServerInsiders" target="_self"&gt;Windows Server Insider Preview Build 25997&lt;/A&gt;, the SMB over QUIC server feature is now available in Datacenter and Standard editions. This changes the previous behavior where it was only available in Windows Server Azure Edition.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId--1204721027"&gt;SMB over QUIC&lt;/H2&gt;
&lt;P&gt;&lt;A href="https://aka.ms/smboverquic" target="_blank" rel="noopener noreferrer"&gt;SMB over QUIC&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;introduced an alternative to TCP and RDMA, supplying secure connectivity to edge file servers over untrusted networks like the Internet. QUIC has significant advantages, the largest being mandatory certificate-based encryption instead of relying on passwords.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SMB over QUIC offers an "SMB VPN" for telecommuters, mobile device users, and on highest security internal networks. The server certificate creates a TLS 1.3-encrypted tunnel over a UDP port instead of the legacy TCP/445. No SMB traffic - including authentication and authorization - is exposed to the underlying network. SMB behaves normally within the QUIC tunnel, meaning the user experience doesn't change and capabilities like&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn610980(v=ws.11)" target="_blank" rel="noopener noreferrer"&gt;multichannel&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/smbcompression" target="_blank" rel="noopener noreferrer"&gt;compression&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;continue to&amp;nbsp;&lt;/SPAN&gt;work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A file server administrator must opt in to enabling SMB over QUIC, it isn't on by default and a client can't force a file server to enable SMB over QUIC.&lt;SPAN&gt;&amp;nbsp;We recently added an additional option called &lt;A href="https://aka.ms/SmbOverQuicCAC" target="_self"&gt;Client Access Control&lt;/A&gt; that lets you further secure the file server through an allow-list for clients.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;What changed&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;In Windows Server 2022, the SMB over QUIC server is limited to Azure Edition machines. Now in Windows Server Insider Preview servers, you can configure SMB over QUIC on all editions, including Datacenter and Standard. There are no additional requirements, it is now just available everywhere. Azure Edition is designed to be a cutting-edge&amp;nbsp;platform for new features and organizations who want state-of-the-art-technology, but it is not a final destination for all of them. Windows 11, Windows Server 2022, Windows Insider clients, and third parties can connect to the server like usual.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because Windows Admin Center still checks that you're on Azure Edition for now, you'll need to use PowerShell to configure the feature. Follow the configuration steps at&amp;nbsp;&lt;A href="https://aka.ms/smboverquic" target="_blank" rel="noopener"&gt;https://aka.ms/smboverquic&lt;/A&gt;&amp;nbsp;to get your certificate, but skip the WAC steps and use the &lt;A href="https://learn.microsoft.com/powershell/module/smbshare/new-smbservercertificatemapping?view=windowsserver2022-ps" target="_self"&gt;New-SmbServerCertificateMapping&lt;/A&gt;&amp;nbsp;command to setup the server for now:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;New-SmbServerCertificateMapping -Name &lt;EM&gt;server FQDN -&lt;/EM&gt;ThumbPrint&lt;EM&gt; certificate thumbprint &lt;/EM&gt;-Storename My &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can also now specify the SMB over QUIC listening ports, as mentioned in the &lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports blog post&lt;/A&gt; recently. The default is UDP/443 but you can now change it using:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Set-SmbServerAlternativePort -TransportType QUIC -Port &lt;EM&gt;&amp;lt;a number between 0 and 65536&amp;gt;&lt;/EM&gt;&amp;nbsp;-EnableInstances Default&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can then connect to it using that port from a recent Windows 11 Insider client using NET USE /QUICPORT or New-SmbMapping -QuicPort:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Final Notes&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;As mentioned in the &lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports blog post&lt;/A&gt; recently, you will also be able to configure SMB over QUIC to listen on a UDP port other than the default 443. Look for this option in a coming Windows Server Insiders release.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_self"&gt;SMB Firewall changes in Windows insider&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions &lt;/A&gt;(November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;(October 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(October 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener noreferrer"&gt;SMB NTLM blocking&lt;/A&gt;&amp;nbsp;(September 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management&lt;/A&gt;&amp;nbsp;(September 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider&lt;/A&gt;&amp;nbsp;(June 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on securing SMB on Windows in-market, check out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self" rel="noopener noreferrer"&gt;SMB security enhancements | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic" target="_self" rel="noopener noreferrer"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy" target="_self" rel="noopener noreferrer"&gt;Protect SMB traffic from interception | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:50:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-07-02T17:50:04Z</dc:date>
    </item>
    <item>
      <title>SMB alternative ports now supported in Windows Insider</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-alternative-ports-now-supported-in-windows-insider/ba-p/3974509</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Starting with &lt;A href="https://aka.ms/25992" target="_self"&gt;Windows 11 Insider preview Build 25992 (Canary)&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-25997/m-p/3983949" target="_blank" rel="noopener"&gt;Windows Server Preview Build 25997&lt;/A&gt;,&amp;nbsp;&lt;/SPAN&gt;the SMB client now supports connecting to an SMB server over TCP, QUIC, or RDMA using alternative network ports. Today I'll explain how to configure this and talk about the near future of this in Windows and Windows Server Insiders a bit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update April 3, 2024:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;official documentation now available at&amp;nbsp;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-ports?tabs=powershell" target="_self"&gt;Configure alternative SMB ports for Windows Server (preview) | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update&lt;/STRONG&gt;: &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-26040/m-p/4040858" target="_self"&gt;Windows Server Insider build 26040&lt;/A&gt;&amp;nbsp;now allows configuring alternative ports for SMB over QUIC. See below for details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Previous port behaviors&lt;/H2&gt;
&lt;P&gt;SMB server in Windows has required inbound connections using the &lt;A href="https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?&amp;amp;page=8" target="_self"&gt;IANA-registered&lt;/A&gt;&amp;nbsp;port TCP/445 for decades, and the SMB TCP client has only supported connecting outbound to that TCP port. The newer SMB over QUIC protocol requires the QUIC-mandated UDP/443, both for server and client. Until now these were hard-coded and unalterable.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Configuring alternative ports&lt;/H2&gt;
&lt;P&gt;You can now connect to alternative TCP, QUIC, and RDMA ports with the SMB client as long as the SMB server supports listening on that port and has been configured to do so. You can do this through mapped drive commands NET USE or New-SmbMapping now, and in a coming release, specify ports to connect to on specific servers using Group Policy or PowerShell or through DNS SRV records. An administrator can also block the use of SMB client alterative ports completely using Group Policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Map an alternative port with NET USE&lt;/H3&gt;
&lt;P&gt;To map an alternative TCP port using NET USE, use the following syntax:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;NET USE \\&lt;EM&gt;server&lt;/EM&gt;\&lt;EM&gt;share&lt;/EM&gt; /TCPPORT:&lt;EM&gt;&amp;lt;some port between 0 and 65536&amp;gt;&lt;BR /&gt;&lt;/EM&gt;NET USE \\&lt;EM&gt;server&lt;/EM&gt;\&lt;EM&gt;share &lt;/EM&gt;/QUICPORT:&lt;EM&gt;&amp;lt;some port between 0 and 65536&amp;gt;&lt;BR /&gt;&lt;/EM&gt;NET USE \\&lt;EM&gt;server&lt;/EM&gt;\&lt;EM&gt;share &lt;/EM&gt;/RDMAPORT&lt;EM&gt;:&amp;lt;some port between 0 and 65536&amp;gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;For example, to map the G: drive port to TCP/847, use:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;NET USE G: \\waukeganfs1.contoso.com\share /TCPPORT:847&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Map an alternative port with New-SmbMapping&lt;/H3&gt;
&lt;P&gt;To map an alternative TCP port using New-SmbMapping PowerShell, use the following syntax:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;New-SmbMapping -RemotePath \\&lt;EM&gt;server&lt;/EM&gt;\&lt;EM&gt;share&lt;/EM&gt; -TcpPort &lt;EM&gt;&amp;lt;some port between 0 and 65536&amp;gt;&lt;/EM&gt;&lt;BR /&gt;New-SmbMapping -RemotePath \\&lt;EM&gt;server&lt;/EM&gt;\share -QuicPort &lt;EM&gt;&amp;lt;some port between 0 and 65536&amp;gt;&lt;/EM&gt;&lt;BR /&gt;New-SmbMapping -RemotePath \\&lt;EM&gt;server&lt;/EM&gt;\&lt;EM&gt;share&lt;/EM&gt; -RdmaPort &lt;EM&gt;&amp;lt;some port between 0 and 65536&amp;gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;For example, to map the G: drive port to TCP/847, use:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;New-SmbMapping -LocalPath G -RemotePath \\waukeganfs1.contoso.com\share -TcpPort 847&lt;/PRE&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;Control use of SMB client alternative ports&amp;nbsp; &amp;nbsp;&lt;/H3&gt;
&lt;P&gt;To control SMB client alternative port&amp;nbsp;usage, configure the group policy under:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Workstation \ &lt;STRONG&gt;Enable Alternative Ports&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;&lt;img /&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Configuring SMB over QUIC alternative listening port&lt;/H2&gt;
&lt;P&gt;Windows Server Insider does&amp;nbsp;&lt;STRONG&gt;not&amp;nbsp;&lt;/STRONG&gt;support changing the SMB server TCP listening port to something besides the default 445. However, you can configure the SMB over QUIC server to use an alternative port, via the following powershell cmdlets:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Get-SmbServerAlternativePort&lt;BR /&gt;New-SmbServerAlternativePort&lt;BR /&gt;Remove-SmbServerAlternativePort&lt;BR /&gt;Set-SmbServerAlternativePort&lt;/PRE&gt;
&lt;P&gt;The configure the SMB over QUIC listener to use a port other than its default UDP/443, use the New-SMBServerAlternativePort cmdlet. For example, to configure the port to UDP/1775, run the following on the Windows Server Insider SMB over QUIC machine:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;New-SmbServerAlternativePort -TransportType QUIC -port 1775 -EnableInstances Default&lt;/PRE&gt;
&lt;P&gt;If you then run NETSTAT you'll see the server listening on that UDP port&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;NETSTAT -anob&lt;BR /&gt;...&lt;BR /&gt; UDP 0.0.0.0:1775 *:* 2848&lt;BR /&gt;LanmanServer&lt;/PRE&gt;
&lt;H2&gt;Final notes&lt;/H2&gt;
&lt;P&gt;Windows Server does not support configuring alternative SMB server TCP ports, but third parties such as Samba do.&amp;nbsp;For more information on configuring non-standard SMB server ports in third parties, consult their product documentation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_self"&gt;SMB Firewall changes in Windows insider&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank" rel="noopener"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions &lt;/A&gt;(November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;(October 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(October 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener noreferrer"&gt;SMB NTLM blocking&lt;/A&gt;&amp;nbsp;(September 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management&lt;/A&gt;&amp;nbsp;(September 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider&lt;/A&gt;&amp;nbsp;(June 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on securing SMB on Windows in-market, check out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self" rel="noopener noreferrer"&gt;SMB security enhancements | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic" target="_self" rel="noopener noreferrer"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy" target="_self" rel="noopener noreferrer"&gt;Protect SMB traffic from interception | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:51:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-alternative-ports-now-supported-in-windows-insider/ba-p/3974509</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-07-02T17:51:09Z</dc:date>
    </item>
    <item>
      <title>SMB firewall rule changes in Windows Insider</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-firewall-rule-changes-in-windows-insider/ba-p/3974496</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again.&amp;nbsp;&lt;/SPAN&gt;Starting with &lt;A href="https://aka.ms/25992" target="_self"&gt;Windows 11 Insider preview Build 25992 (Canary)&lt;/A&gt;&amp;nbsp;and &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-25997/m-p/3983949" target="_blank" rel="noopener"&gt;Windows Server Preview Build 25997&lt;/A&gt;, creating SMB shares changes a longtime Windows Defender Firewall default behavior.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update April 4, 2024:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;official documentation now available at&amp;nbsp;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic#updated-firewall-rules-preview" target="_self"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Before&lt;/H2&gt;
&lt;P&gt;Previously, creating a share automatically configured the firewall to enable the rules in the “File and Printer Sharing” group for the given firewall profiles. This began in Windows XP SP2 with the introduction of the then-new built in firewall, and the rule was designed for both SMB1 and ease of deployment of a wide array of SMB-using technology, including printing, legacy group policy, and others.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Now&lt;/H2&gt;
&lt;P&gt;Windows now automatically configures the new “File and Printer Sharing (Restrictive)” group when you create an SMB share, which no longer contains inbound NetBIOS ports 137-139. Those ports are not used by SMB2 or later and are an artifact of SMB1. If you reinstall SMB1 server for some legacy compatibility reason, you will need to ensure that those firewall ports are reopened.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;This change enforces a higher degree of default of network security as well as bringing SMB firewall rules closer to the Windows Server “File Server” role behavior, which only opens the minimum ports needed to connect and manage sharing. Administrators can still configure the “File and Printer Sharing” group if necessary as well as modify this new firewall group, these are just default behaviors.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Final Note&lt;/H2&gt;
&lt;P&gt;We plan future updates for this rule to also remove inbound ICMP, LLMNR, and Spooler Service ports and restrict down to the SMB sharing-necessary ports only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_self"&gt;SMB Firewall changes in Windows insider&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions &lt;/A&gt;(November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;(October 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(October 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener noreferrer"&gt;SMB NTLM blocking&lt;/A&gt;&amp;nbsp;(September 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management&lt;/A&gt;&amp;nbsp;(September 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider&lt;/A&gt;&amp;nbsp;(June 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on securing SMB on Windows in-market, check out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self" rel="noopener noreferrer"&gt;SMB security enhancements | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic" target="_self" rel="noopener noreferrer"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy" target="_self" rel="noopener noreferrer"&gt;Protect SMB traffic from interception | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:51:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-firewall-rule-changes-in-windows-insider/ba-p/3974496</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-07-02T17:51:53Z</dc:date>
    </item>
    <item>
      <title>DR 2.0: Migrating from DFSR to Storage Replica</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/dr-2-0-migrating-from-dfsr-to-storage-replica/ba-p/3972406</link>
      <description>&lt;P&gt;Heya folks, &lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener"&gt;Ned&lt;/A&gt; here again. Today I’m sharing advice on migrating from Distributed File System Replication (DFSR) to Storage Replica. This includes deciding when SR is a good replacement, inventorying your DFSR and DFS Namespaces, backing up your existing configuration, validating your existing replication and converging it, migrating to SR, then updating your disaster recovery runbook.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let’s get to re-replicating!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;What is Storage Replica?&lt;/H2&gt;
&lt;P&gt;We introduced &lt;A href="https://aka.ms/storagereplica" target="_blank" rel="noopener"&gt;Storage Replica&lt;/A&gt; in Windows Server 2016. SR replicates volumes between servers, between clusters and within stretch clusters. We designed SR for disaster recovery – I prefer the term disaster&lt;EM&gt; prevention&lt;/EM&gt; – scenarios where organizations need to protect critical data from floods, fires, superstorms, and war. It supports synchronous and asynchronous replication:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Synchronous replication mirrors data over short range, low latency networks with zero data loss during a disaster&lt;/LI&gt;
&lt;LI&gt;Asynchronous replication mirrors data over long range, high latency networks with minimal data loss during a disaster&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In the first release, SR supported bandwidth throttling, encryption, delegation, network constraint, and was available only on Datacenter edition. In Windows Server 2019 we offered an additional &lt;A href="https://learn.microsoft.com/windows-server/storage/storage-replica/storage-replica-overview#storage-replica-prerequisites" target="_blank" rel="noopener"&gt;limited version for Standard edition servers&lt;/A&gt; and the ability to &lt;A href="https://learn.microsoft.com/windows-server/storage/storage-replica/storage-replica-frequently-asked-questions#can-i-bring-a-destination-volume-online-for-read-only-access-" target="_blank" rel="noopener"&gt;mount a destination volume&lt;/A&gt; for testing or backups. In Windows Server 2022 Azure Edition, we offered &lt;A href="https://learn.microsoft.com/windows-server/storage/storage-replica/storage-replica-overview#storage-replica-prerequisites" target="_blank" rel="noopener"&gt;compression&lt;/A&gt; to improve performance for over congested or lower-throughput networks. In September 2021, we began previewing that greatly lowers synchronous replication latency and is the future of SR. For instance, using DISKSPD on our test hardware here, you can see the improvement in IO on the source device when writing a volume protected by SR with the new enhanced (“RAW”) log is far better than the legacy (“CLFS”) log:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;IO size&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;CLFS&amp;nbsp;(in MiB/s)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;RAW (in MiB/s)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;4K&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;FONT color="#DF0000"&gt;35.25&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;56.53&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;8K&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;FONT color="#DF0000"&gt;68.16&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;112.16&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;2MB&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;FONT color="#DF0000"&gt;521.32&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;1450.57&lt;/FONT&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;When to replace DFSR with Storage Replica&lt;/H2&gt;
&lt;P&gt;Customers have deployed &lt;A href="https://learn.microsoft.com/windows-server/storage/dfs-replication/dfsr-overview" target="_blank" rel="noopener"&gt;DFSR&lt;/A&gt; for 17 years. It shipped in Windows Server 2003 R2 and millions of organizations use it to replicate domain controller SYSVOL and file servers. DFSR scales to thousands of nodes across extremely poor networks for smaller datasets and has an excellent differential compression algorithm, but has significant limitations as a modern DR solution:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;It doesn't replicate in-use files.&lt;/LI&gt;
&lt;LI&gt;It doesn't replicate synchronously.&lt;/LI&gt;
&lt;LI&gt;Its asynchronous replication latency can be many minutes, hours, or even days.&lt;/LI&gt;
&lt;LI&gt;Its &lt;A href="https://learn.microsoft.com/windows-server/storage/dfs-replication/dfsr-faq#what-are-the-supported-limits-of-dfs-replication-" target="_blank" rel="noopener"&gt;maximum size limits&lt;/A&gt; are low by modern standards&lt;/LI&gt;
&lt;LI&gt;Its initial replication is much slower than just copying data manually, requiring &lt;A href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn482443(v=ws.11)" target="_blank" rel="noopener"&gt;additional steps like preseeding and database cloning&lt;/A&gt; for larger datasets&lt;/LI&gt;
&lt;LI&gt;It relies on a database that can require lengthy consistency checks after interruption.&lt;/LI&gt;
&lt;LI&gt;It's often configured for multi-writer replication, which allows changes to flow in many directions to many servers, leading to (perceived) data loss from user updates and latency.&lt;/LI&gt;
&lt;LI&gt;It does not scale well on clusters.&lt;/LI&gt;
&lt;LI&gt;It’s &lt;A href="https://learn.microsoft.com/windows-server/storage/dfs-replication/dfsr-overview#requirements" target="_blank" rel="noopener"&gt;not supported&lt;/A&gt; with the modern ReFS file system.&lt;/LI&gt;
&lt;LI&gt;While still supported, we no longer actively develop or improve DFSR.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Storage Replica is an excellent alternative under the right circumstances:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You need zero or minimal data loss during a disaster.&lt;/LI&gt;
&lt;LI&gt;You have good throughput – lower latency, higher bandwidth - networks between locations.&lt;/LI&gt;
&lt;LI&gt;You only need two copies of the data and don’t need users or applications writing to multiple copies at once.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important:&amp;nbsp;&lt;/STRONG&gt;DFSR is still required for domain controller SYSVOL replication and you can't replace it with SR. It's ok, that replica is usually pretty small and self-managing. Usually.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That’s the “if”. Let’s get to the “how”.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;1. Inventorying your environment&lt;/H2&gt;
&lt;P&gt;Before migrating to Storage Replica, inventory your organization for their current DFS Replication and DFS Namespace topologies and your file server versions. You need this to build your project and future DR plan. Locating domain-based DFSN is easy but standalone DFSN requires knowing your namespace hosts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Inventory domain-based DFSN&lt;/H3&gt;
&lt;P&gt;Use DFSMGMT, PowerShell or DFSUTIL to inventory all your domain-based DFSN including roots, links (“folders”), and link targets (“folder targets”). If you end up adding new servers or using the switch to Storage Replica as an opportunity to replace servers, &lt;A href="https://learn.microsoft.com/en-us/archive/blogs/askds/migrating-your-dfs-namespaces-in-three-sorta-easy-steps" target="_blank" rel="noopener"&gt;you can modify the DSFUTIL export’s XML files to become easy input file&lt;/A&gt;&lt;SPAN&gt;s&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;There’s a sample script from IT Pro &lt;A href="https://britv8.com/author/britv8admin/" target="_blank" rel="noopener"&gt;BritV8&lt;/A&gt; for listing all the domain-based DFSN folder targets in the domain out to the console:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://britv8.com/powershell-get-list-of-all-folder-targets-in-domain-namespace/" target="_blank" rel="noopener"&gt;Powershell – Get List Of All Folder Targets In Domain Namespace | BritV8&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;#Requires -modules DFSN&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#008000"&gt;#Gets a list of all the folder targets in the Domain Namespace&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;#Example use&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;#$results Get-DfsnAllFolderTargets&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;#$results |select namespacepath,TargetPath,ReferralPriorityRank,ReferralPriorityClass,state&amp;nbsp;&amp;nbsp; |ogv&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;function Get-DfsnAllFolderTargets ()&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;{&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #Get a list of all Namespaces in the Domain&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Write-Progress -Activity "1/3 - Getting List of Domain NameSpaces"&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $RootList = Get-DfsnRoot&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #Get a list of all FolderPaths in the Namespaces&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Write-Progress -Activity "2/3 - Getting List of Domain Folder Paths"&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $FolderPaths = foreach ($item in $RootList)&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Get-DfsnFolder -Path "$($item.path)\*"&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #Get a list of all Folder Targets in the Folder Paths, in the Namespaces"&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Write-Progress -Activity "2/3 - Getting List of Folder Targets"&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $FolderTargets = foreach ($item in $FolderPaths)&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Get-DfsnFolderTarget -Path $item.Path&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; return $FolderTargets&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;}&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;Get-DfsnAllFolderTargets&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;You can use &lt;FONT color="#008000"&gt;Get-SmbShare -CimSession&lt;/FONT&gt; to dig deeper into the shared folders and their volume usage, or just look at the folders in File Explorer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;Reminder: Standalone DFSN doesn’t store any data in Active Directory, making inventory difficult. You’ll need to know which servers are hosting data in a standalone namespace and inventory them manually. Hopefully you’ve kept good records.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Inventory DFSR&lt;/H3&gt;
&lt;P&gt;The DFSR PowerShell module is the best way to inventory your replication groups and associated replicated folders. To get all DFSR member machines and their storage configuration in the domain, just run:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;Get-DFSRMembership&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can format table the output for this inventory using:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;Get-DfsrMembership | FT groupname,computername,contentpath,dfsnpath&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;Notice how you can’t rely on DfsnPath – that value is only set when you used DFSMGMT to create replication of an DFS Namespace. You can create replication groups without DFSN or even a shared folder, so be sure to reconcile that in your plans.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DFSMGMT is the graphical alternative:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H3&gt;Inventory OS Versions&lt;/H3&gt;
&lt;P&gt;If you are running Windows Server 2012 R2 and older or Windows Server 2016/2019/2022 Standard edition, you’ll also need to inventory the machines you collected from DFSN and DFSR above – remember that Storage Replica only became available in WS2016 and is limited on Standard Edition WS2019+. This migration to SR may be an OS upgrade, hardware replacement, or data migration story.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The easiest way is to use the Active Directory PowerShell module to query AD, either based on your list of identified servers or all of them:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;Get-ADComputer -Filter 'OperatingSystem -Like "Windows *Server*"' -Property * | Format-Table Name,OperatingSystem -Wrap -Auto&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;Look for machines running Standard Edition or older OSes, they may need upgrade or replacement before you can get to Storage Replica.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;2. Backup DFSN and DFSR&lt;/H2&gt;
&lt;P&gt;Before you migrate, ensure you backup your DFSR and domain-based DFSN configurations. A normal &lt;A href="https://learn.microsoft.com/windows-server/identity/ad-ds/manage/ad-forest-recovery-backing-up-system-state" target="_blank" rel="noopener"&gt;Active Directory System State backup contains&lt;/A&gt; all that info, and you’re getting those backups nightly, right?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Besides that, you can save the domain-based DNS targets into XML files using DFSUTIL inside PowerShell:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;$formatString = ".\dfsn-{0:D2}.xml"&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;$i = 0&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;$root = get-dfsnroot | Get-DfsnRootTarget&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;foreach ($targetpath in $root)&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;{&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $i = $i + 1&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $fileName = $formatString -f $i&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dfsutil.exe root export ($targetpath).targetpath $fileName verbose&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;}&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;These DFSR PowerShell commands will save the configuration for later review or recreation:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT color="#008000"&gt;Get-DFSReplicationGroup &amp;gt; rgs.txt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#008000"&gt;Get-DFSReplicatedFolder &amp;gt; rfs.txt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#008000"&gt;Get-DFSRMember &amp;gt; members.txt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#008000"&gt;Get-DFSRMembership &amp;gt; memberships.txt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#008000"&gt;Get-DFSRConnection &amp;nbsp;&amp;gt; conns.txt&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;3. Pick your Primaries, examine volume &amp;amp; log storage&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Now you will determine who will be primary and evaluate your storage options.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Unlike DFSR, Storage Replica doesn’t have “multi-master” replication, there is always just one source and one destination. You need to pick which of your DFSR servers that you want to become primary – where all writes occur – and then existing or new servers to make secondary, where you will replicate data for safety. Your other DFSR servers get repurposed or discarded. You can replicate from a single server to many servers with SR, but only with many &lt;EM&gt;volumes&lt;/EM&gt; on the source, each replicating to a &lt;EM&gt;different&lt;/EM&gt; destination.&lt;/LI&gt;
&lt;LI&gt;You will also need to ensure there is SR log space set aside. Storage Replica doesn’t use a database like DFSR, it uses several types of &lt;A href="https://learn.microsoft.com/windows-server/storage/storage-replica/server-to-server-storage-replication#prerequisites" target="_blank" rel="noopener"&gt;logs&lt;/A&gt; in a separate partition. Both the source and destination server will need at least one volume and by default, it must be at least 9GB (&lt;A href="https://learn.microsoft.com/windows-server/storage/storage-replica/server-to-server-storage-replication#provision-os" target="_blank" rel="noopener"&gt;this is adjustable&lt;/A&gt;). You can use the Windows Server disk management tools like DISKMGMT.MSC, the &lt;A href="https://learn.microsoft.com/powershell/module/storage/?view=windowsserver2022-ps" target="_blank" rel="noopener"&gt;PowerShell Storage Module&lt;/A&gt; to create this new volume by shrinking an existing one or you can add additional storage.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Finally, because SR perfectly mirrors the source volume to the destination server, ensure that the new SR destination has the same amount of disk space and exactly the same-sized volumes.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;You can use the &lt;A href="https://learn.microsoft.com/powershell/module/storagereplica/test-srtopology?view=windowsserver2022-ps" target="_blank" rel="noopener"&gt;Test-SRTopology&lt;/A&gt; tool to ensure you have met all of these requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H2&gt;4. Remove DFSR, adjust DFSN, add SMB&lt;/H2&gt;
&lt;P&gt;Having selected your first set of servers to migrate and having backed up all your DFSR and DFSN settings, you can now:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Remove all of the DFSR settings using DFSMGMT.MSC or &lt;A href="https://learn.microsoft.com/powershell/module/dfsr/remove-dfsreplicationgroup?view=windowsserver2022-ps" target="_blank" rel="noopener"&gt;Remove-DfsReplicationGroup&lt;/A&gt; from your first group of servers&lt;/LI&gt;
&lt;LI&gt;Disable any DFSN folder targets that point to servers that will not be the source for Storage Replica.&lt;/LI&gt;
&lt;LI&gt;If you plan to replicate to new servers, you will also need to create and configure your shared folders and shares on the destination volume (without any data) using &lt;A href="https://www.microsoft.com/windows-server/windows-admin-center" target="_blank" rel="noopener"&gt;Windows Admin Center&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/powershell/module/smbshare/new-smbshare?view=windowsserver2022-ps" target="_blank" rel="noopener"&gt;New-SmbShare&lt;/A&gt;, or NET SHARE, using the inventory you gathered in step 1. Once SR starts running, that volume will dismount and you will not be able to create the SMB shares anymore. They will reappear if you ever disable replication, mount the replicated volume with &lt;A href="https://learn.microsoft.com/powershell/module/storagereplica/mount-srdestination?view=windowsserver2022-ps" target="_blank" rel="noopener"&gt;Mount-SRDestination,&lt;/A&gt; or switch replication direction – the SMB server service won’t forget them when the drive dismounts temporarily.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;5. Deploy Storage Replica&lt;/H2&gt;
&lt;P&gt;Now that the infrastructure is ready, you can deploy Storage Replica.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Use &lt;A href="https://www.microsoft.com/windows-server/windows-admin-center" target="_blank" rel="noopener"&gt;Windows Admin Center&lt;/A&gt; for a graphical management experience or familiarize yourself with the &lt;A href="https://learn.microsoft.com/powershell/module/storagereplica/?view=windowsserver2022-ps" target="_blank" rel="noopener"&gt;Storage Replica Powershell&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Follow the steps in &lt;A href="https://learn.microsoft.com/en-us/windows-server/storage/storage-replica/server-to-server-storage-replication" target="_blank" rel="noopener"&gt;Server-to-server storage replication&lt;/A&gt; to configure your first replica partnership either as synchronous or asynchronous.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H2&gt;6. Evaluate health&lt;/H2&gt;
&lt;P&gt;Now that you’re using your first new Storage Replica set and updated DFSN and file server settings, validate that it’s working to your requirements:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Ensure user and application IO performance is acceptable by copying files, opening files remotely, etc.&lt;/LI&gt;
&lt;LI&gt;Temporarily mount the destination volume with &lt;A href="https://learn.microsoft.com/powershell/module/storagereplica/mount-srdestination?view=windowsserver2022-ps" target="_blank" rel="noopener"&gt;Mount-SRDestination&lt;/A&gt; and ensure access to an SMB share works.&lt;/LI&gt;
&lt;LI&gt;Schedule a change control window and perform a disaster recovery test, switching replication direction to the secondary site and then back again to the primary site.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;7. Repeat migration for all remaining servers&lt;/H2&gt;
&lt;P&gt;Having confirmed that your first migration to Storage Replica meets your requirements, migrate the remainder of your servers. Store all your inventory and configuration backups for at least 60 days to ensure you can roll back servers if necessary.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;8. Write down your DR plan&lt;/H2&gt;
&lt;P&gt;Write down your configuration and how to fail it over in the event of a disaster.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Ensure you keep up with the inventory of these protected servers so that your team can execute your plan across the fleet.&lt;/LI&gt;
&lt;LI&gt;Write it so that anyone can follow it! When a disaster strikes, you may not be there, and your plan should be understandable and complete enough that your most junior new hire can execute it without supervision.&lt;/LI&gt;
&lt;LI&gt;You should test your runbook document at least once a year - using that most junior person.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;Final notes&lt;/H2&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/azure/storage/file-sync/" target="_blank" rel="noopener"&gt;Azure File Sync&lt;/A&gt; is also a replacement for DFSR, especially since they are both file-based replication features, with the flexibility and file server-oriented workload that it provides. You can even use SR and AFS on the same server with the same replicated folders and volumes, where you want some data to tier to the cloud and some to directly replicate to other on-prem servers. Read more at &lt;A href="https://learn.microsoft.com/azure/storage/file-sync/file-sync-deployment-guide?tabs=azure-portal%2Cproactive-portal" target="_blank" rel="noopener"&gt;Deploy Azure File Sync&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to give a huge shoutout to &lt;A href="https://mvp.microsoft.com/mvp/profile/8b81ae81-ed9f-ea11-a811-000d3a8dfe0d" target="_blank" rel="noopener"&gt;Gabriel Luiz, MVP&lt;/A&gt;, who encouraged the creation of this blog post and always does what’s right for his customers and the Windows Server IT community. Obrigado, Gabriel!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 19:06:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/dr-2-0-migrating-from-dfsr-to-storage-replica/ba-p/3972406</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2023-11-07T19:06:12Z</dc:date>
    </item>
    <item>
      <title>SMB client encryption mandate now supported in Windows Insider</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037</link>
      <description>&lt;P&gt;Heya folks,&amp;nbsp;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener"&gt;Ned&lt;/A&gt;&amp;nbsp;here again. Beginning in&amp;nbsp;&lt;A href="https://aka.ms/wip25982" target="_blank" rel="noopener"&gt;Windows 11 Insider Preview Build 25982 &lt;/A&gt;&amp;nbsp;(Canary Channel) and &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-25997/m-p/3983949" target="_blank" rel="noopener"&gt;Windows Server Preview Build 25997&lt;/A&gt;, SMB now supports requiring encryption of all outbound SMB client connections. With this new option, administrators can mandate that all destination servers support SMB 3.x and encryption, and if missing those capabilities, the client won’t connect. This enforces the highest level of network security as well as bringing management parity to SMB signing, which allows both client and server requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update April 3, 2024:&lt;/STRONG&gt; official documentation now available at &lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/configure-smb-client-require-encryption?tabs=group-policy" target="_blank" rel="noopener"&gt;Configure the SMB client to require encryption in Windows (preview) | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;SMB encryption&lt;/H3&gt;
&lt;P&gt;&lt;A href="https://aka.ms/SmbEncrypt" target="_blank" rel="noopener"&gt;SMB Encryption&lt;/A&gt; supplies SMB data end-to-end protection from interception attacks and snooping. It first shipped in SMB 3.0 on Windows 8 and Windows Server 2012. Windows 10 and Windows Server 2019 added AES-GCM support for better hardware-accelerated encryption, then Windows 11 and Windows Server 2022 introduced AES-256-GCM cryptographic suites. Today you can configure SMB encryption on a per share basis, for the entire file server, when mapping drives, or when using UNC Hardening.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;SMB client encryption mandate&lt;/H3&gt;
&lt;P&gt;You can now &lt;EM&gt;also&lt;/EM&gt; configure the SMB client to always require encryption, no matter what the server, share, UNC hardening, or a mapped drive requires. This means an administrator can globally force a Windows machine to use SMB encryption – and therefore SMB 3.x – on all connections and refuse to connect if the SMB server does not support either.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Configuring SMB encryption mandate&lt;/H3&gt;
&lt;P&gt;You can configure this new option with both Group Policy and PowerShell.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Group Policy&lt;/H4&gt;
&lt;P&gt;To configure SMB client for required encryption to all SMB servers (i.e., for outbound connections), enable the group policy under:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman &lt;/EM&gt;&lt;EM&gt;Workstation&lt;/EM&gt;&lt;EM&gt; \&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;&lt;EM&gt;Require encryption&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Setting the policy to disabled or not configured removes the encryption requirement.&lt;/P&gt;
&lt;P&gt;Important: use care when deploying SMB encryption through group policy to a heterogenous fleet. Any legacy SMB servers such as Windows Server 2008 R2 won’t support SMB 3.0. Older third-party SMB servers might support SMB 3.0 but not encryption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;PowerShell&lt;/H4&gt;
&lt;P&gt;To configure the SMB client for required encryption to all SMB servers (i.e., for outbound connections), set the following PowerShell parameter:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Set-SmbClientConfiguration -RequireEncryption $true&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To see the effective setting on a machine:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Get-SmbClientConfiguration | FL RequireEncryption&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Final notes&lt;/H3&gt;
&lt;P&gt;SMB encryption has performance overhead and compatibility overhead, and you should balance that against SMB signing - which has better performance and tamper protection but no snooping protection – or against no use of encryption or signing at all, which has best performance but no security besides the connection authorization and pre-auth integrity protection. SMB encryption supersedes SMB signing and supplies the same level of tamper protection, meaning that if your SMC client requires signing, SMB encryption turns it off; there is no point requiring both because encryption wins.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_self"&gt;SMB Firewall changes in Windows insider&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions &lt;/A&gt;(November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;(October 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(October 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener noreferrer"&gt;SMB NTLM blocking&lt;/A&gt;&amp;nbsp;(September 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management&lt;/A&gt;&amp;nbsp;(September 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider&lt;/A&gt;&amp;nbsp;(June 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on securing SMB on Windows in-market, check out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self" rel="noopener noreferrer"&gt;SMB security enhancements | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic" target="_self" rel="noopener noreferrer"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy" target="_self" rel="noopener noreferrer"&gt;Protect SMB traffic from interception | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:52:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-07-02T17:52:29Z</dc:date>
    </item>
    <item>
      <title>New CISA Stop Ransomware Guide</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/new-cisa-stop-ransomware-guide/ba-p/3960485</link>
      <description>&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener nofollow noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again.&amp;nbsp;The&amp;nbsp;&lt;/SPAN&gt;U.S.&amp;nbsp;Cybersecurity and Infrastructure Security Agency (CISA) just released their updated&amp;nbsp;&lt;A href="https://www.cisa.gov/resources-tools/resources/stopransomware-guide" target="_self"&gt;#StopRansomware Guide&lt;/A&gt;&amp;nbsp;with a number of new contributions from Microsoft, including&amp;nbsp;&lt;STRONG&gt;a substantial section on hardening SMB and remote file services.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px" data-unlink="true"&gt;&lt;A href="https://www.cisa.gov/sites/default/files/2023-10/StopRansomware-Guide-508C-v3_0.pdf" target="_self"&gt;&lt;img /&gt;&lt;img /&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;See page 8 and 9 for the new SMB and remote file services recommendations. If you've been following my blogs and articles for the past few years, they should be familiar.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;The guide is substantial but very readable and full of practical advice for IT shops of all sizes.&amp;nbsp;In their own words:&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;EM&gt;"These ransomware and data extortion prevention and response best practices and recommendations&amp;nbsp;are based on operational insight from CISA, MS-ISAC, the National Security Agency (NSA), and the&amp;nbsp;Federal Bureau of Investigation (FBI).&amp;nbsp;This guide was developed through the U.S.&amp;nbsp;Joint Ransomware Task Force (JRTF).&amp;nbsp;The JRTF, co-chaired by CISA and FBI, is an&amp;nbsp;interagency, collaborative effort to combat the&amp;nbsp;growing threat of ransomware attacks. &lt;/EM&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;BR /&gt;&lt;EM&gt;The audience for this guide includes information technology (IT) professionals as well as others within an&amp;nbsp;organization involved in developing cyber incident response policies and procedures or coordinating&amp;nbsp;cyber incident response."&lt;/EM&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;It was a genuine pleasure to work with the dedicated civil servants who created this guide. It also highlighted that we need to consolidate, expand, &amp;amp; modernize our SMB and file services documentation at &lt;A href="https://learn.microsoft.com/" target="_self"&gt;learn.microsoft.com&lt;/A&gt;. I've started a substantial project with my technical writing team and will have more news on this in a few months.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 17:23:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/new-cisa-stop-ransomware-guide/ba-p/3960485</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2023-10-20T17:23:19Z</dc:date>
    </item>
    <item>
      <title>SMB over QUIC client access control now supported in Windows Insider</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938</link>
      <description>&lt;P&gt;Heya folks,&amp;nbsp;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_blank" rel="noopener"&gt;Ned&lt;/A&gt;&amp;nbsp;here again. Beginning in &lt;A href="https://aka.ms/wip25977" target="_self"&gt;Windows 11 Insider Preview Build 25977&lt;/A&gt; (Canary Channel) and&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-25997/m-p/3983949" target="_blank" rel="noopener"&gt;Windows Server Preview Build 25997&lt;/A&gt;, SMB over QUIC now supports access control for clients. Today I’ll explain how this works, what the advantages are, and how to set it up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;SMB over QUIC&lt;/H3&gt;
&lt;P&gt;&lt;A href="https://aka.ms/smboverquic" target="_blank" rel="noopener"&gt;SMB over QUIC&lt;/A&gt; introduced an alternative to TCP and RDMA, supplying secure connectivity to edge file servers over untrusted networks like the Internet. QUIC has significant advantages, the largest being mandatory certificate-based encryption instead of relying on passwords.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SMB over QUIC offers an "SMB VPN" for telecommuters, mobile device users, and high security organizations. The server certificate creates a TLS 1.3-encrypted tunnel over the internet-friendly UDP port 443* instead of the legacy TCP port 445. No SMB traffic - including authentication and authorization - is exposed to the underlying network. SMB behaves normally within the QUIC tunnel, meaning the user experience doesn't change and capabilities like &lt;A href="https://learn.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn610980(v=ws.11)" target="_blank" rel="noopener"&gt;multichannel&lt;/A&gt; and &lt;A href="https://aka.ms/smbcompression" target="_blank" rel="noopener"&gt;compression&lt;/A&gt; work. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A file server administrator must opt in to enabling SMB over QUIC, it isn't on by default and a client can't force a file server to enable SMB over QUIC. It’s available in Windows 11 and Windows Server 2022 as an SMB client and in Windows Server 2022 Azure Edition* as an SMB server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;* Update Nov 15, 2023.&lt;/STRONG&gt; We just announced that SMB over QUIC is now part of Windows Server Datacenter and Standard editions for the next release of Windows Server and that you can now control the QUIC network port. You can try it out in Insiders Preview. For more info, review&amp;nbsp;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Faka.ms%2FSMBoverQUICServer&amp;amp;data=05%7C01%7CStacey.Clements%40microsoft.com%7C45880ad8a64a43049ca508dbe47b111f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638354989449705847%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;amp;sdata=ShOTPwqUBJuwq%2BN0q6tOcOpFHMobBSx0exGjGRhtulI%3D&amp;amp;reserved=0" target="_blank" rel="nofollow noopener noreferrer"&gt;https://aka.ms/SMBoverQUICServer&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;SMB over QUIC Client Access Control&lt;/H3&gt;
&lt;P&gt;SMB over QUIC client access control (CAC) improves the existing &lt;A href="https://aka.ms/smboverquic" target="_blank" rel="noopener"&gt;SMB over QUIC&lt;/A&gt; feature. Previously, servers trusted all clients if they were issued the same certificate root chain as the server’s SMB over QUIC server certificate. With this new option, administrators can restrict which &lt;EM&gt;clients&lt;/EM&gt; can access SMB over QUIC servers – an allowlist for devices trusted to connect to the file server. This gives organizations more protection but does not change the Windows authentication used to make the SMB connection nor does it alter the end user experience.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This feature works by a client trusting the SMB over QUIC server via a valid shared root authority key. An admin also gives the client a certificate from the same issuer, and that certificate’s hash (or issuer) is added to a trust list maintained by the server. When the client connects, it sends the certificate info to the server for comparison against the allow list, granting or denying access to QUIC. Then SMB authentication occurs inside the QUIC TLS tunnel, and the user connects to their share. An admin can also explicitly deny access or just revoke certificates. CAC is optional and – for now – not on by default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update November 8, 2023:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Starting with Build 25992, the SMB over QUIC client access control feature now supports using certificates with subject alternative names and not just a single subject. This means the client access control feature now supports using a Microsoft AD Certificate Authority and multiple endpoint names, just like the currently released version of SMB over QUIC. You can now evaluate the feature using the recommended options and not require self-signed test certificates.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Configuring SMB over QUIC client access control&lt;/H3&gt;
&lt;P&gt;The steps to configure SMB over QUIC CAC are nearly identical for the server-side. The steps for clients are quite different. This is the typical trade-off between security and ease of management.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Prerequisites&lt;/H4&gt;
&lt;P&gt;To evaluate CAC, you’ll need:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;One &lt;A href="https://aka.ms/WindowsServerInsiders" target="_blank" rel="noopener"&gt;Windows Server vNext Azure Edition Preview Build 25977&lt;/A&gt; or later VM. You’re allowed to run &lt;A href="https://aka.ms/WS2022AzureEdition" target="_blank" rel="noopener"&gt;Windows Server Azure Edition&lt;/A&gt; outside of Azure IaaS and Azure Stack HCI for evaluation and testing purposes.&lt;/LI&gt;
&lt;LI&gt;One &lt;A href="https://aka.ms/wip25977" target="_self"&gt;Windows 11 Insider Preview Build 25977&lt;/A&gt; (Canary Channel) or later client.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Configure SMB over QUIC CAC&lt;/H4&gt;
&lt;P&gt;To configure SMB over QUIC CAC, we’re going to use a self-signed certificate and PowerShell.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;These steps are strictly for Insider Preview evaluation purposes&lt;/STRONG&gt;; the released CAC feature will fully support a Certificate Authority and Windows Admin Center, and you should never use a self-signed certificate with SMB over QUIC in a production environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open an administrator-elevated PowerShell console on the SMB over QUIC server.&lt;/LI&gt;
&lt;LI&gt;Create server self-signed certificate (where “Server DNS name” is the fully-qualified name of the SMB over QUIC server):&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;$serverCert = New-SelfSignedCertificate -DnsName &lt;STRONG&gt;&lt;EM&gt;Server DNS name&lt;/EM&gt;&lt;/STRONG&gt; -CertStoreLocation "Cert:\LocalMachine\My" -NotAfter (Get-Date).AddMonths(6) -KeyAlgorithm "RSA" -KeyLength "2048"&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Configure the server certificate mapping requiring client authentication:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;New-SmbServerCertificateMapping -Name &lt;STRONG&gt;&lt;EM&gt;Server DNS name &lt;/EM&gt;&lt;/STRONG&gt;-Thumbprint $serverCert.Thumbprint -Store My -Requireclientauthentication $true&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;Export the certificate:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Export-Certificate -Cert $serverCert -FilePath &lt;STRONG&gt;&lt;EM&gt;path&lt;/EM&gt;&lt;/STRONG&gt;\serverCert.cer&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;Copy the servercert.cer file to the client machine and on the client, open an administrator-elevated PowerShell console&lt;/LI&gt;
&lt;LI&gt;Install the certificate into the trusted root store on the client:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Import-Certificate -FilePath &lt;STRONG&gt;&lt;EM&gt;path&lt;/EM&gt;&lt;/STRONG&gt;\serverCert.cer -CertStoreLocation Cert:\LocalMachine\root&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;OL start="7"&gt;
&lt;LI&gt;Create the client’s certificate for use with the server allow list:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;$clientCert = New-SelfSignedCertificate -DnsName &lt;STRONG&gt;&lt;EM&gt;Server DNS name&lt;/EM&gt; &lt;/STRONG&gt;-CertStoreLocation "Cert:\LocalMachine\My" -NotAfter (Get-Date).AddMonths(6) -KeyAlgorithm "RSA" -KeyLength "2048"&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="8"&gt;
&lt;LI&gt;Configure the client certificate mapping on the client machine:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;New-SmbClientCertificateMapping -Namespace &lt;STRONG&gt;&lt;EM&gt;Server DNS name&lt;/EM&gt;&lt;/STRONG&gt; -Thumbprint $clientCert.Thumbprint -Store My&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="9"&gt;
&lt;LI&gt;Obtain client certificate SHA256 hash by running certutil to examine the Cert Hash(sha256) field:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Export-Certificate -Cert $clientCert -FilePath &lt;STRONG&gt;&lt;EM&gt;path&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;\&lt;/EM&gt;clientCert.cer&lt;/PRE&gt;
&lt;PRE&gt;&lt;BR /&gt;certutil.exe &lt;STRONG&gt;&lt;EM&gt;path\&lt;/EM&gt;&lt;/STRONG&gt;clientCert.cer | findstr /i /c:"Cert Hash(sha256)"&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;10. Return to the server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;11. Install the client certificate into the trusted root store on the server:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Import-Certificate -FilePath &lt;STRONG&gt;&lt;EM&gt;path&lt;/EM&gt;&lt;/STRONG&gt;\ClientCert.cer -CertStoreLocation Cert:\LocalMachine\root&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;12. Grant access to the client by its SHA256 entry:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Grant-SmbClientAccessToServer -Name &lt;STRONG&gt;&lt;EM&gt;Server DNS name &lt;/EM&gt;&lt;/STRONG&gt;-IdentifierType SHA256 -Identifier &lt;STRONG&gt;&lt;EM&gt;Cert Hash(sha256)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;Note: you can also grant access by Issuer, meaning instead of adding a certificate SHA256 hash from every single client, you can instead add the Issuer DN by using -IdentifierType ISSUER. While not as granular or secure, this is useful for large client fleets when using a trusted certificate authority and not self-signed evaluation certs. &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;12. You have now configured SMB over QUIC CAC. Connect to the server using either:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;NET USE &lt;EM&gt;&lt;STRONG&gt;\\server DNS name\share&lt;/STRONG&gt;&lt;/EM&gt; /TRANSPORT:QUIC&lt;/PRE&gt;
&lt;PRE&gt;New-SmbMapping -RemotePath &lt;EM&gt;&lt;STRONG&gt;\\server DNS name\share&lt;/STRONG&gt;&lt;/EM&gt; -TransportType QUIC&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Final Notes&lt;/H3&gt;
&lt;P&gt;SMB over QUIC isn’t just for mobile users and edge servers in Internet DMZs, it’s a practical defensive layer to prevent leakage of NTLM credentials and makes attacking internal files servers harder without first subverting a trusted client. TCP had its time, QUIC is the future of user and application transport.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We also just announced that a replacement for KDC Proxy -&amp;nbsp; IAKerb - is coming to Windows Insider Previews along with a local KDC. These combined options mean the beginning of the end for NTLM, which will make SMB over QUIC Kerberos usage much easier. Read about it at&amp;nbsp;&lt;A href="https://aka.ms/ntlm" target="_self"&gt;The evolution of Windows authentication.&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_self"&gt;SMB Firewall changes in Windows insider&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions &lt;/A&gt;(November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;(October 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(October 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener noreferrer"&gt;SMB NTLM blocking&lt;/A&gt;&amp;nbsp;(September 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management&lt;/A&gt;&amp;nbsp;(September 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider&lt;/A&gt;&amp;nbsp;(June 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on securing SMB on Windows in-market, check out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self" rel="noopener noreferrer"&gt;SMB security enhancements | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic" target="_self" rel="noopener noreferrer"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy" target="_self" rel="noopener noreferrer"&gt;Protect SMB traffic from interception | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:53:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-07-02T17:53:09Z</dc:date>
    </item>
    <item>
      <title>SMB dialect management now supported in Windows Insider</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_self" rel="nofollow noopener noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again.&amp;nbsp;&lt;/SPAN&gt;Beginning in &lt;A href="https://aka.ms/wip25951" target="_self"&gt;Windows 11 Insider Preview Build 25951 (Canary)&lt;/A&gt;&amp;nbsp;and &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-25951/m-p/3926636" target="_self"&gt;Windows Server Insider Preview Build 25951&lt;/A&gt;, the SMB server now supports controlling which SMB 2 and 3 dialects it will negotiate. This changes legacy behavior, where Windows SMB server always negotiated the highest matched server dialect from SMB 2.0.2 to 3.1.1 clients. Beginning in Windows 10, support was added for &lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy#use-smb-311" target="_blank" rel="noopener"&gt;controlling SMB client dialects&lt;/A&gt;, but not server dialects.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With this new option, an administrator can remove specific SMB protocols from usage in the organization, blocking older, less secure, and less capable Windows devices and third parties from connecting. For example, they can specify only the use of &lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self"&gt;SMB 3.1.1, the most secure dialect&lt;/A&gt; of the protocol.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId-588678381"&gt;Configuring SMB dialect min and max&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;You can configure this option with Group Policy and PowerShell. Both SMB client and server now include complete management support (previously the client support was only &lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy#use-smb-311" target="_blank" rel="noopener"&gt;manual registry editing&lt;/A&gt;).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN&gt;Group Policy (SMB Server)&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;To configure SMB dialect minimum and maximum for the SMB server (i.e. for inbound connection), enable the group policy under:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Server \&amp;nbsp;&lt;STRONG&gt;Mandate the minimum version of SMB&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Server \&amp;nbsp;&lt;STRONG&gt;Mandate the Maximum version of SMB&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;img /&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Select the minimum and maximum version of the dialects using a dropdown menu when the policy is enabled.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;img /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN&gt;Group Policy (SMB client)&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;To configure SMB dialect minimum and maximum for the SMB client (i.e. for outbound connection), enable the group policy under:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Workstation\&amp;nbsp;&lt;STRONG&gt;Mandate the minimum version of SMB&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Workstation \&amp;nbsp;&lt;STRONG&gt;Mandate the Maximum version of SMB&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Select the minimum and maximum version of the dialects using a dropdown menu when the policy is enabled.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN&gt;PowerShell (SMB server)&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;To configure SMB dialect minimum and maximum for the SMB server service (i.e. for inbound connections) with PowerShell, set with the following syntax:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;Set-SmbServerConfiguration -Smb2DialectMax &lt;EM&gt;{SMB202 | SMB210 |&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;SMB300 | SMB302 | SMB311 | None}&lt;/EM&gt; -Smb2DialectMin &lt;EM&gt;{None | SMB202 | SMB210 | SMB300 | SMB302 | SMB311}&lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN&gt;PowerShell (SMB client)&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;To configure SMB dialect minimum and maximum for the SMB client service (i.e. for outbound connections) with PowerShell, set with the following syntax:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;Set-SmbClientConfiguration -Smb2DialectMax &lt;EM&gt;{SMB202 | SMB210 |&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;SMB300 | SMB302 | SMB311 | None}&lt;/EM&gt; -Smb2DialectMin &lt;EM&gt;{None | SMB202 | SMB210 | SMB300 | SMB302 | SMB311}&lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId-1501457398"&gt;Final notes&lt;/H2&gt;
&lt;P&gt;To see this new behavior in action, use a network capture tool like Wireshark and examine the client and server responses for the SMB2 Negotiate Protocol. For instance, here the client requests only SMB 3.1.1 because it's been configured with a minimum and maximum dialect of 3.1.1:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Final Notes&lt;/H2&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_self"&gt;SMB Firewall changes in Windows insider&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions &lt;/A&gt;(November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;(October 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(October 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener noreferrer"&gt;SMB NTLM blocking&lt;/A&gt;&amp;nbsp;(September 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management&lt;/A&gt;&amp;nbsp;(September 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider&lt;/A&gt;&amp;nbsp;(June 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on securing SMB on Windows in-market, check out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self" rel="noopener noreferrer"&gt;SMB security enhancements | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic" target="_self" rel="noopener noreferrer"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy" target="_self" rel="noopener noreferrer"&gt;Protect SMB traffic from interception | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:54:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-07-02T17:54:12Z</dc:date>
    </item>
    <item>
      <title>SMB NTLM blocking now supported in Windows Insider</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-ntlm-blocking-now-supported-in-windows-insider/ba-p/3916206</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_self" rel="nofollow noopener noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again.&amp;nbsp;&lt;/SPAN&gt;Beginning in &lt;A href="https://aka.ms/wip25951" target="_self"&gt;Windows 11 Insider Preview Build 25951 (Canary)&lt;/A&gt; and &lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-25951/m-p/3926636" target="_blank" rel="noopener"&gt;Windows Server Preview Build 25951&lt;/A&gt;, the SMB client now supports blocking NTLM for remote outbound connections. This changes legacy behavior, where Windows &lt;A href="https://learn.microsoft.com/openspecs/windows_protocols/ms-spng/b16309d8-4a93-4fa6-9ee2-7d84b2451c84" target="_blank" rel="noopener"&gt;SPNEGO&lt;/A&gt; would negotiate Kerberos, NTLM, and other mechanisms with the destination server to decide on a supported security package. NTLM in this case refers to all versions of the LAN Manager security package: &lt;A href="https://learn.microsoft.com/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level" target="_blank" rel="noopener"&gt;LM, NTLM, and NTLMv2&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With this new option, an administrator can intentionally block Windows from offering NTLM via SMB. An attacker who tricks a user or application into sending NTLM challenge responses to a malicious server will no longer receive any NTLM data and cannot brute force, crack, or pass hashes. This adds a new level of protection for enterprises without a requirement to &lt;A href="https://learn.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/jj865674(v=ws.10)" target="_blank" rel="noopener"&gt;entirely disable NTLM&lt;/A&gt; usage in the OS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: This setting has no effect on loopback SMB NTLM usage, i.e. mapping a drive locally on a device with a local account.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update April 3, 2024:&lt;/STRONG&gt; official documentation now available at&amp;nbsp;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-ntlm-blocking?tabs=group-policy" target="_self"&gt;Block NTLM connections on SMB (preview) | Microsoft Learn.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update Oct 11, 2023:&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN&gt;We also just announced that a new local KDC is coming to Windows Insider Previews along with a replacement for KDC Proxy called IAKerb. These combined options mean the beginning of the end for NTLM. Read about it at&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://aka.ms/ntlm" target="_self" rel="noreferrer"&gt;The evolution of Windows authentication.&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Update November 8, 2023:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Starting with Build 25992, the new SMB NTLM blocking feature now supports specifying exception lists for NTLM usage. This allows an administrator to configure a general block on NTLM usage while still allowing clients to use NTLM for specific servers that do not support Kerberos, either because they are not Active Directory domain joined or are a third party without Kerberos support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Configuring SMB NTLM Blocking&lt;/H2&gt;
&lt;P&gt;You can configure this option with Group Policy and PowerShell. You can also block NTLM SMB connections on demand with NET USE and PowerShell.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Group Policy&lt;/H3&gt;
&lt;P&gt;To configure SMB NTLM blocking for the entire Windows machine, enable the group policy under:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Workstation \ &lt;STRONG&gt;Block NTLM (LM, NTLM, NTLMv2)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To configure SMB NTLM blocking with exceptions for certain remote devices, enable the group policy under:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Computer Configuration \ Administrative Templates \ Network \ Lanman Workstation \ &lt;STRONG&gt;Block NTLM Server Exception List&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can then add IP addresses, fully qualified DNS, and NetBIOS names of remote machines where you want SMB to allow NTLM authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;img /&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;H3&gt;PowerShell (global)&lt;/H3&gt;
&lt;P&gt;To configure SMB NTLM blocking for the entire Windows machine with PowerShell, set with the following syntax:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Set-SMbClientConfiguration -BlockNTLM $true &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;NET USE&lt;/H3&gt;
&lt;P&gt;To specify SMB NTLM blocking when mapping a drive with NET USE, use the following syntax:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;NET USE &lt;EM&gt;\\server\share&lt;/EM&gt; /BLOCKNTLM&lt;/PRE&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;New-SmbMapping&lt;/H3&gt;
&lt;P&gt;To specify SMB NTLM blocking when mapping a drive with PowerShell, use the following syntax:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;New-SmbMapping -RemotePath &lt;EM&gt;\\server\share&lt;/EM&gt; -BlockNTLM $true&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Troubleshooting SMB NTLM Blocking&lt;/H2&gt;
&lt;P&gt;Connecting to Active Directory domain-joined computers with SMB while using a domain user account should always result in Kerberos authentication. Blocking NTLM should have no consequences to connectivity in this case. If you are expecting Kerberos to work when blocking NTLM and you are unable to connect, this section will help troubleshoot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;When NTLM is expected&lt;/H3&gt;
&lt;P&gt;You should expect NTLM usage under the following circumstances:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The client connects using an IP address.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The Kerberos CIFS Service Principal Name is missing in AD for the SMB server.&lt;/LI&gt;
&lt;LI&gt;The credential used for the SMB server is a local user account.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;The possible errors shown when NTLM blocking is preventing connection are:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;67&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;0x43&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;ERROR_BAD_NET_NAME&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;The network name cannot be found&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Troubleshooting&lt;/H3&gt;
&lt;P&gt;If you expect to connect but NTLM blocking is preventing you, use the following steps:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Verify that NTLM blocking is the culprit by temporarily disabling it on the client. The nature of NTLM blocking's current errors in Windows Insider means that it is easy to confuse NTLM blocking with unrelated networking problems like DNS name resolution.&lt;/LI&gt;
&lt;LI&gt;If connecting with IP address, switch to using a fully-qualified domain name. To use IP addresses with Kerberos, review&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows-server/security/kerberos/configuring-kerberos-over-ip" target="_blank" rel="noopener"&gt;Configuring Kerberos for IP Address&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Verify the destination SMB server has its HOST SPN records registered by using SETSPN -L &lt;EM&gt;SMBSERVERNAME. &lt;/EM&gt;For example:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;setspn -L FS2&lt;BR /&gt;Registered ServicePrincipalNames for CN=FS2,CN=Computers,DC=corp,DC=contoso,DC=com:&lt;BR /&gt;WSMAN/fs2&lt;BR /&gt;WSMAN/fs2.corp.contoso.com&lt;BR /&gt;TERMSRV/FS2.corp.contoso.com&lt;BR /&gt;RestrictedKrbHost/FS2.corp.contoso.com&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;HOST/FS2.corp.contoso.com&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;TERMSRV/FS2&lt;BR /&gt;RestrictedKrbHost/FS2&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#000080"&gt;HOST/FS2&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If still unable to connect, use a network capture tool like &lt;A href="https://www.wireshark.org/" target="_self"&gt;Wireshark&lt;/A&gt; to examine the client and server messages for DNS, SMB2, and Kerberos.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Final notes&lt;/H2&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_self"&gt;SMB Firewall changes in Windows insider&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions &lt;/A&gt;(November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;(October 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(October 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener noreferrer"&gt;SMB NTLM blocking&lt;/A&gt;&amp;nbsp;(September 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management&lt;/A&gt;&amp;nbsp;(September 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider&lt;/A&gt;&amp;nbsp;(June 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on securing SMB on Windows in-market, check out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self" rel="noopener noreferrer"&gt;SMB security enhancements | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic" target="_self" rel="noopener noreferrer"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy" target="_self" rel="noopener noreferrer"&gt;Protect SMB traffic from interception | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:53:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-ntlm-blocking-now-supported-in-windows-insider/ba-p/3916206</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-07-02T17:53:45Z</dc:date>
    </item>
    <item>
      <title>SMB Signing and Guest Authentication</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-and-guest-authentication/ba-p/3846679</link>
      <description>&lt;P&gt;Heya folks, Ned here again. We recently made&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_self"&gt;SMB signing the default in Windows Insider and Windows Server Insider builds&lt;/A&gt;. In doing so, we were quickly reminded of a consequence from an old unsafe SMB behavior that some folks still use: guest authentication. Today I'll explain all this and give you the steps to both fix and workaround the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're in a hurry, skip down to the fixes and workarounds section below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId-562796847"&gt;Signing and guest authentication&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;SMB signing ensures every message contains a signature generated using session key and cipher suite. The client puts a&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/archive/blogs/openspecification/smb-2-and-smb-3-security-in-windows-10-the-anatomy-of-signing-and-cryptographic-keys" target="_self" rel="noopener noreferrer"&gt;hash of the entire message&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;into the signature field of the SMB header.&amp;nbsp;If anyone changes the message itself later on the wire, the hash won't match, and SMB knows that someone tampered with the data. It also confirms to sender and receiver that they are who they say they are, breaking relay attacks.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To sign a message, the key is derived from a secret both the user client and server share - the user's password. Without that password, the client and server can't sign the SMB traffic because they have no way to validate the sender. And what &lt;EM&gt;doesn't&lt;/EM&gt; a guest logon have? A password. That makes guest authentication and SMB signing mutually exclusive. When we see that the client requires SMB signing, we don't allow even an attempt at guest authentication, we just fail the connection.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId--1244657616"&gt;Insecure guest authentication fallback&lt;/H2&gt;
&lt;P data-unlink="true"&gt;Microsoft stopped enabling the built-in Guest account years ago - Windows 2000! - and stopped allowing guest logons by default (keep in mind that the built-in Guest user and guest-type access are two different things). Later, we started actively denying the built-in Guest account the ability to connect to Windows clients remotely using any protocol. Starting in Windows 10 and SMB2+, we the SMB team stopped &lt;A href="https://learn.microsoft.com/troubleshoot/windows-server/networking/guest-access-in-smb2-is-disabled-by-default" target="_self"&gt;SMB2+ guest access in general as well as a particular behavior called insecure guest fallback&lt;/A&gt;. Besides blocking anyone from intentionally using guest with SMB2+, we also prevent an old SMB1 behavior where if you sent along a non-existent user, the SMB2+ server could then ask you to logon as a guest&amp;nbsp;&lt;EM&gt;silently.&amp;nbsp;&lt;/EM&gt;Again, Windows SMB2+ servers would not do this, but you can see how a malicious attacker would love for you to connect to their evil file server and start executing evil file code without even needing a password.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId-1242855217"&gt;Fixes and workarounds&lt;/H2&gt;
&lt;P&gt;Now, remember at the top where I said we recently made&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_self"&gt;SMB signing the default in Windows Insider Enterprise client builds&lt;/A&gt;? When you try to connect to third-party devices that use guest for "ease of use", you'll get one of these errors:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You can't access this shared folder because your organization's security policies block unauthenticated guest access. These policies help protect your PC from unsafe or malicious devices on the network.&lt;/LI&gt;
&lt;LI&gt;Error code: 0x80070035&lt;BR /&gt;The network path was not found.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even if you follow our steps in&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/guest-access-in-smb2-is-disabled-by-default" target="_blank" rel="noopener"&gt;Guest access in SMB2 and SMB3 is disabled&lt;/A&gt;&amp;nbsp;to enable guest in SMB again, they won't work. Because we disable guest access when you require SMB signing and you will receive error&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;"System error 3227320323 has occurred."&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But there are options:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Fix&lt;/H3&gt;
&lt;P&gt;The Microsoft recommended fix is to stop accessing your third-party devices using guest credentials. Anyone -&amp;nbsp;&lt;EM&gt;anyone -&amp;nbsp;&lt;/EM&gt;who can see that device can access all your data without any password or audit trail. Device makers configure guest access so they won't have to deal with their customers forgetting their passwords or require a more complex setup process. These are unsafe places to store your personal or professional life. Many of these devices&amp;nbsp;&lt;EM&gt;do&amp;nbsp;&lt;/EM&gt;have the ability to configure a username and password - consult your vendor docs. Others might have the ability with a software upgrade. And others might just be unsafe - for those, you should replace them with a trustworthy product and move all your data off the old device, ensure you wipe its drives clean, then recycle it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Workaround&lt;/H3&gt;
&lt;P&gt;If you cannot disable the use of guest for your third party, you must disable the requirement of SMB signing. Obviously, this means that now not only are you using guest access, but you're also preventing your client from guaranteeing signing to a trusted device. That's why this is just a workaround, and we don't recommend it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can disable the SMB signing requirement three ways:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Graphical (local group policy on one device)&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Open the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Local Group Policy Editor&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(&lt;EM&gt;gpedit.msc&lt;/EM&gt;) on your Windows device.&lt;/LI&gt;
&lt;LI&gt;In the console tree, select&amp;nbsp;&lt;STRONG&gt;Computer Configuration&amp;nbsp;&amp;gt;&amp;nbsp;Windows Settings&amp;nbsp;&amp;gt;&amp;nbsp;Security Settings&amp;gt;&amp;nbsp;Local Policies &amp;gt; Security Options&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Double-click &lt;STRONG&gt;Microsoft network client: Digitally sign communications (always)&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select&amp;nbsp;&lt;STRONG&gt;Disabled&amp;nbsp;&lt;/STRONG&gt;&amp;gt;&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Command-line (PowerShell on one device)&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Open an administrator-elevated PowerShell console.&lt;/LI&gt;
&lt;LI&gt;Run&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE&gt;Set-SmbClientConfiguration -RequireSecuritySignature $false&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Domain-based group policy (on IT-managed fleets)&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Locate the security policy applying this setting to your Windows devices (you can use GPRESULT /H on a client to generate a resultant set of policy report to show which group policy is requiring SMB signing.&lt;/LI&gt;
&lt;LI&gt;In GPMC.MSC, change the&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Computer Configuration&amp;nbsp;&amp;gt; Policies &amp;gt;&amp;nbsp;Windows Settings&amp;nbsp;&amp;gt;&amp;nbsp;Security Settings&amp;gt;&amp;nbsp;Local Policies &amp;gt; Security Options.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Set&amp;nbsp;&lt;STRONG&gt;Microsoft network client: Digitally sign communications (always) &lt;/STRONG&gt;to &lt;STRONG&gt;Disabled&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Apply the updated policy to Windows devices needing guest access over SMB.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Final thoughts&lt;/H2&gt;
&lt;P&gt;Now, we can make this easier to understand and are doing so in a future Insiders release. We'll have a better error message and better description in the group policy, and I'll also update our various MS Learn documentation on signing and guest access. But I mostly hope everyone will stop using third party devices with guest access - they are dangerous.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reminder: with SMB1, all bets are off. None of what I mentioned above will stop guest access or myriad other unsafe behaviors. If your SMB server device still requires SMB1, you should assume &lt;EM&gt;anyone&lt;/EM&gt; can access its data; &lt;EM&gt;even with a strong password, even without guest, even with SMB signing enabled&lt;/EM&gt;. If you're unsure if your device requires SMB1, review its documentation and the &lt;A href="https://aka.ms/StillNeedsSMB1" target="_self"&gt;Still Needs SMB1 product clearinghouse&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Don't invite them in!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned Pyle&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 22:14:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-and-guest-authentication/ba-p/3846679</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-04-09T22:14:45Z</dc:date>
    </item>
    <item>
      <title>SMB signing required by default in Windows Insider</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704</link>
      <description>&lt;P&gt;Heya folks, &lt;A href="https://www.linkedin.com/in/nedpyle/" target="_self"&gt;Ned&lt;/A&gt; here again. Beginning in &lt;A href="https://blogs.windows.com/windows-insider/2023/06/02/announcing-windows-11-insider-preview-build-25381/" target="_self"&gt;Windows 11 Insider Preview Build 25381 (Canary, zn_release) Enterprise editions,&lt;/A&gt;&amp;nbsp;&lt;A href="https://blogs.windows.com/windows-insider/2023/07/12/announcing-windows-11-insider-preview-build-25905/" target="_self"&gt;Windows 11 Insider Preview Build 25905 (Canary) Pro and Education editions&lt;/A&gt;, and&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-25931/m-p/3901143" target="_blank" rel="noopener"&gt;Windows Server Preview Build 25931&lt;/A&gt;&amp;nbsp;signing is now required by default for all SMB outbound connections. Signing is&amp;nbsp;&lt;EM&gt;not yet&amp;nbsp;&lt;/EM&gt;required by default on Windows 11 Insider Home editions.&amp;nbsp;Furthermore, signing is required for all inbound SMB connections on all Windows 11 Insider editions. Signing is &lt;EM&gt;not&lt;/EM&gt;&amp;nbsp;&lt;EM&gt;yet&lt;/EM&gt; required by default on Windows Server Insider Preview inbound connections (you can of course require it, like the last 25 years of Windows Server).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This changes legacy behavior, where Windows 10 and 11 required SMB signing by default only when connecting to&amp;nbsp;shares named &lt;A href="https://techcommunity.microsoft.com/t5/itops-talk-blog/how-to-defend-users-from-interception-attacks-via-smb-client/ba-p/1494995" target="_blank" rel="noopener"&gt;SYSVOL and NETLOGON&lt;/A&gt;&amp;nbsp;and where Active Directory&amp;nbsp;&lt;A href="https://learn.microsoft.com/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always" target="_blank" rel="noopener"&gt;domain controllers&lt;/A&gt;&amp;nbsp;required SMB signing when any client connected to them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important: if you have found a third-party vendor SMB product that does not support signing or does not enable SMB signing by default, please email&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;A href="mailto:wontsignsmb@microsoft.com," target="_blank" rel="noopener nofollow noreferrer"&gt;wontsignsmb@microsoft.com&lt;/A&gt;&amp;nbsp;with&amp;nbsp;&lt;SPAN&gt;direct quote or documentation from the vendor of that product, including their website, knowledgebase, support forums, or other vendor channels&lt;/SPAN&gt;. I am building a clearinghouse to help our customers get ahead of this before we ship the feature.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You'll recall the Windows 10 and Windows Server 2019 campaigns against SMB1 and guest auth fallback. Before that, we introduced functionality like encryption and pre-authentication integrity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security is a never-ending quest.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;SMB signing&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;SMB signing ensures every message contains a signature generated using session key and cipher suite. The client puts a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/archive/blogs/openspecification/smb-2-and-smb-3-security-in-windows-10-the-anatomy-of-signing-and-cryptographic-keys" target="_self" rel="noopener noreferrer"&gt;hash of the entire message&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;into the signature field of the SMB header.&amp;nbsp;If anyone changes the message itself later on the wire, the hash won't match and SMB knows that someone tampered with the data. It also confirms to sender and receiver that they are who they say they are, breaking relay attacks. Ideally, you are using Kerberos instead of NTLMv2 so that your session key starts strong; don't connect to shares with IP addresses and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/using-computer-name-aliases-in-place-of-dns-cname-records/ba-p/259064" target="_self"&gt;don't use CNAME records.&lt;/A&gt; Signing is a key defensive tactic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Signing algorithms have evolved over time; SMB 2.02 signing was improved with HMAC SHA-256, replacing the old MD5 method from the late 1990s and SMB1. SMB 3.0 added AES-CMAC. In Windows Server 2022 and Windows 11, we added&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.microsoft.com/windows-server/storage/file-server/smb-security#new-signing-algorithm" target="_self" rel="noopener noreferrer"&gt;AES-128-GMAC signing acceleration&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Controlling the new signing behavior&lt;/H2&gt;
&lt;P&gt;All versions of Windows and Windows Server support SMB signing (back to Windows NT!). But a third-party might disable or not support it. If you attempt to connect to a remote share on a third-party SMB server that does not allow SMB signing, you should receive one of the following error messages:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;0xc000a000&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;-1073700864&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;STATUS_INVALID_SIGNATURE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;The cryptographic signature is invalid.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To resolve this issue, configure your third-party SMB server to support SMB signing. This is Microsoft's official recommended guidance. Do not disable SMB signing in Windows or use SMB1 to work around this behavior (SMB1 supports signing but does not enforce it).&amp;nbsp;An SMB device that does not support signing allows interception and relay attacks from malicious parties. I can't speculate what errors a third-party SMB client will throw if it doesn't support signing and then connects to your Windows 11 client, but I'll update this post if someone reports one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SMB signing will at least slightly reduce the performance of SMB copy operations. No, I cannot tell you how much; it depends entirely on the speed and number of your cores, as well as their utilization from all the other processes vying for their time. You'll need to evaluate against your workloads and decide if those with extremely high performance and latency requirements override the lack of security brought by unsigned traffic. This is no different than the past 30 years of SMB signing, it's just a change in defaults.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To see the current SMB signing settings, run the following PowerShell commands:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Get-SmbServerConfiguration | FL requiresecuritysignature&lt;/PRE&gt;
&lt;PRE&gt;Get-SmbClientConfiguration | FL requiresecuritysignature&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To disable the SMB signing requirement in client (&lt;EM&gt;outbound&lt;/EM&gt; to other devices) connections, run the following PowerShell command as an elevated administrator:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Set-SmbClientConfiguration -RequireSecuritySignature $false&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To disable the SMB signing requirement in server (&lt;EM&gt;inbound&lt;/EM&gt; to your Windows 11 Canary Insider Enterprise, Pro, or Education edition device), run the following PowerShell command as an elevated administrator:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Set-SmbServerConfiguration -RequireSecuritySignature $false&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With this new behavior, you can no longer examine the registry&amp;nbsp;&lt;A href="https://learn.microsoft.com/troubleshoot/windows-server/networking/overview-server-message-block-signing#policy-locations-for-smb-signing" target="_self"&gt;RequireSecuritySignature&lt;/A&gt;&amp;nbsp;settings to know if Windows is requiring signing, because if they don't exist, Windows will still require signing. Any auditing tools that look at the registry could give false information. Use &lt;A href="https://learn.microsoft.com/powershell/module/smbshare/get-smbserverconfiguration?view=windowsserver2022-ps" target="_self"&gt;Get-SmbServerConfiguration&lt;/A&gt;&amp;nbsp;and &lt;A href="https://learn.microsoft.com/powershell/module/smbshare/get-smbclientconfiguration?view=windowsserver2022-ps" target="_self"&gt;Get-SmbClientConfiguration&lt;/A&gt; or the CIM classes&amp;nbsp;&lt;A href="https://learn.microsoft.com/previous-versions/windows/desktop/smb/msft-smbclientconfiguration" target="_self"&gt;MSFT_SmbClientConfiguration&lt;/A&gt; and&amp;nbsp;&lt;A href="https://learn.microsoft.com/previous-versions/windows/desktop/smb/msft-smbserverconfiguration" target="_self"&gt;MSFT_SmbServerConfiguration&lt;/A&gt;&amp;nbsp;and ensure any scripts or auditing tools use them (this has been the right approach for all SMB settings for a decade).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You don't need to reboot but existing SMB connections will still use signing until you close them or restart the device. If you disable the new default requirement for SMB signing with PowerShell or using &lt;A href="https://learn.microsoft.com/troubleshoot/windows-server/networking/overview-server-message-block-signing" target="_self"&gt;Group Policy&lt;/A&gt;, it won't come back on automatically, it will just return to the legacy behaviors of Windows 11.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt;&amp;nbsp;signing (and encryption) also disable guest access. If you need to use guest for some third-party device, you must disable the requirement for signing. Read more on this at&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-and-guest-authentication/ba-p/3846679" target="_blank" rel="noopener"&gt;SMB Signing and Guest Authentication - Microsoft Community Hub.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Final thoughts&lt;/H2&gt;
&lt;P&gt;Expect this default change for signing to come to Home edition as well as to Windows Server in their Insider programs. Depending on how things go, it will then start to appear in major releases.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SMB encryption is far more secure than signing but environments still run legacy systems that don't support SMB 3.0 and later. If I could time travel to the 1990s, SMB signing would've always been on and we'd have introduced SMB encryption much sooner; sadly, I was both in high school and not in charge. We'll continue to push out more secure SMB defaults and many new SMB security options in the coming years; I know they can be painful for application compatibility and Windows has a legacy of ensuring ease of use, but security cannot be left to chance.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To get the latest Canary Windows insider ISO, visit&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewiso" target="_blank" rel="noopener"&gt;Download Windows Insider Preview ISO (microsoft.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_self"&gt;SMB Firewall changes in Windows insider&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions &lt;/A&gt;(November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;(October 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(October 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener noreferrer"&gt;SMB NTLM blocking&lt;/A&gt;&amp;nbsp;(September 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management&lt;/A&gt;&amp;nbsp;(September 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider&lt;/A&gt;&amp;nbsp;(June 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on securing SMB on Windows in-market, check out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self" rel="noopener noreferrer"&gt;SMB security enhancements | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic" target="_self" rel="noopener noreferrer"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy" target="_self" rel="noopener noreferrer"&gt;Protect SMB traffic from interception | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Until next time,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ned "I had Nevermind on cassette" Pyle&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:54:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-07-02T17:54:44Z</dc:date>
    </item>
    <item>
      <title>The beginning of the end of Remote Mailslots as part of Windows Insider</title>
      <link>https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots-as-part-of-windows/ba-p/3762048</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Heya folks,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/in/nedpyle/" target="_self" rel="nofollow noopener noreferrer"&gt;Ned&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;here again. With the release of &lt;A href="https://blogs.windows.com/windows-insider/2023/03/08/announcing-windows-11-insider-preview-build-25314/" target="_blank" rel="noopener"&gt;Windows 11 Insider Preview Build 25314&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/windows-server-insiders/announcing-windows-server-preview-build-25314/m-p/3762820" target="_blank" rel="noopener"&gt;Windows Server Preview Build 25314&lt;/A&gt;, we have started disabling the Remote Mailslot protocol by default. This is a precursor to deprecation and eventual removal from Windows. You aren't using this extremely legacy protocol unless you're &lt;EM&gt;also&lt;/EM&gt; using the deprecated and disabled-by-default SMB1 protocol, so 99.97% of you have nothing to worry about. For those who are, a bit more information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Remote Mailslots&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;The &lt;A href="https://learn.microsoft.com/en-us/windows/win32/ipc/about-mailslots" target="_self"&gt;Remote Mailslot protocol is a very old, simple, unreliable, insecure IPC method&lt;/A&gt;. A&amp;nbsp;&lt;/SPAN&gt;server creates a mailslot and a client writes messages to it using NetBIOS datagrams as a transport when operating over a network with Windows. The sender of the mailslot message formats the SMB_COM_TRANSACTION message and sends it as a NetBIOS datagram. The Proto-SMB1 Common Internet File System (CIFS) Browser Protocol uses "\MAILSLOT\LANMAN" and "\MAILSLOT\BROWSE", for instance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Mailslots are older than Windows NT, dating back to LAN Manager DOS days.&amp;nbsp;It goes without saying that this protocol is disgusting. If you've been an IT Pro for a few decades, you might recall people using the anonymous NET SEND command (MAILSLOT\Messngr) to broadcast important messages to all logged on users, or more likely, this kind of crap:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;What changed&amp;nbsp;&lt;/H2&gt;
&lt;P data-unlink="true"&gt;Starting with&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://blogs.windows.com/windows-insider/2023/03/08/announcing-windows-11-insider-preview-build-25314/" target="_self"&gt;Windows 11 Insider Preview Build 25314&lt;/A&gt;,&amp;nbsp;&lt;/SPAN&gt;remote mailslot is disabled by default. If you have manually re-enabled SMB1 (which has been disabled by default since Windows 10) and some application is still using a Remote Mailslot, they will see one of the following errors:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;3025 &lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;ERROR_REMOTE_MAILSLOTS_DEPRECATED&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;“The requested operation failed. Remote mailslots have been deprecated.”&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Contact your vendor about updating their software to join the 21st century, as it both requires SMB1 and Remote Mailslot. This protocol is not secure, was replaced decades ago by better technology, and should not be used under any circumstances.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you need to re-enable Remote&amp;nbsp;Mailslots temporarily while you yell at your vendor or developer, use the following PowerShell command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;PS C:\&amp;gt; Set-SmbClientConfiguration -EnableMailslots $true&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remote Mailslots will get officially deprecated in the next release of Windows and Windows Server, meaning that it can eventually be removed altogether. That will take time and there will be plenty of public warning, just like SMB1 had.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Final notes&lt;/H2&gt;
&lt;P&gt;This is part of a campaign to improve the security of Windows and Windows Server for the modern landscape. You've read my posts on SMB security changes over the past year:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBAlternativePorts" target="_self"&gt;SMB alternative ports&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SMBfirewall" target="_self"&gt;SMB Firewall changes in Windows insider&lt;/A&gt; (November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-now-available-in-windows-server-insider-datacenter/ba-p/3975242" target="_blank"&gt;SMB over QUIC now available in Windows Server Insider Datacenter and Standard editions &lt;/A&gt;(November 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-client-encryption-mandate-now-supported-in-windows-insider/ba-p/3964037" target="_blank" rel="noopener"&gt;SMB client encryption mandate now supported in Windows Insider&lt;/A&gt;&amp;nbsp;(October 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-over-quic-client-access-control-now-supported-in-windows/ba-p/3951938" target="_blank" rel="noopener"&gt;SMB over QUIC client access control now supported in Windows Insider&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(October 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://aka.ms/SmbNtlmBlock" target="_blank" rel="noopener noreferrer"&gt;SMB NTLM blocking&lt;/A&gt;&amp;nbsp;(September 2023, updated Nov 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-dialect-management-now-supported-in-windows-insider/ba-p/3916368" target="_blank" rel="noopener"&gt;SMB dialect management&lt;/A&gt;&amp;nbsp;(September 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-signing-required-by-default-in-windows-insider/ba-p/3831704" target="_blank" rel="noopener"&gt;SMB signing required by default in Windows Insider&lt;/A&gt;&amp;nbsp;(June 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots/ba-p/3762048" target="_blank" rel="noopener"&gt;The beginning of the end of Remote Mailslots&lt;/A&gt;&amp;nbsp;(March 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-insecure-guest-auth-now-off-by-default-in-windows-insider/ba-p/3715014" target="_blank" rel="noopener"&gt;SMB insecure guest auth now off by default in Windows Insider Pro editions&lt;/A&gt;&amp;nbsp;(January 2023)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb-authentication-rate-limiter-now-on-by-default-in-windows/ba-p/3634244" target="_blank" rel="noopener"&gt;SMB authentication rate limiter now on by default in Windows Insider&lt;/A&gt;&amp;nbsp;(September 2022)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/storage-at-microsoft/smb1-now-disabled-by-default-for-windows-11-home-insiders-builds/ba-p/3289473" target="_blank" rel="noopener"&gt;SMB1 now disabled by default for Windows 11 Home Insiders builds&lt;/A&gt;&amp;nbsp;(April 2022)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on securing SMB on Windows in-market, check out:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-security" target="_self" rel="noopener noreferrer"&gt;SMB security enhancements | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-secure-traffic" target="_self" rel="noopener noreferrer"&gt;Secure SMB Traffic in Windows Server | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/windows-server/storage/file-server/smb-interception-defense?tabs=group-policy" target="_self" rel="noopener noreferrer"&gt;Protect SMB traffic from interception | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Until next time,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- Ned Pyle&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:55:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/storage-at-microsoft/the-beginning-of-the-end-of-remote-mailslots-as-part-of-windows/ba-p/3762048</guid>
      <dc:creator>NedPyle</dc:creator>
      <dc:date>2024-07-02T17:55:21Z</dc:date>
    </item>
  </channel>
</rss>

