How to disable SMBv1 to protect your Windows PC from malicious attacks

Your PC may be vulnerable to attacks — use this guide to disable the Server Message Block (SMB) version 1 (v1) protocol on Windows 10.

Recent ransomware attacks, including WannaCry and Petya, both wreaked havoc on hundreds of thousands of PCs around the globe, taking advantage of a flaw found in the old SMBv1, which still comes enabled by default on Windows 10.
SMB is a network file sharing protocol that Windows 10 uses to allow apps to read and write to files, as well as to perform services requests for another device on the network. There are three versions of SMB, but version 1 is the only one affected; versions 2 and 3 are not vulnerable.
If your computer is not running applications that require the use of this protocol, it's recommended to disable SMBv1 completely to prevent future malicious attacks that could use this vulnerability.
In this Windows 10 guide, we walk you through the steps to disable the SMBv1 protocol to make your device less vulnerable to attacks.

How to disable SMBv1 protocol on Windows 10

To disable the vulnerable protocol on Windows 10, follow these steps:
Note: Before proceeding, make sure to save all your work and close any running applications.
  1. Open Start.
  2. Type Turn Windows features on or offand click the result.
  3. Clear the SMB 1.0/CIFS File Sharing Support option.
  4. Click OK.
  5. Click Restart now.
Once you've completed the steps and your machine reboots, SMBv1 will no longer present a threat to your system.
Microsoft is expected to remove this protocol with the Windows 10 Fall Creators Update, but in the meantime, you can use these steps to prevent your device from getting compromised.

Source: Windowscentral

No comments:

Post a Comment

Intel Tiger Lake CPUs to come with Anti-Malware Protection

Intel’s Tiger Lake CPUs will come with Control-flow Enforcement Technology (CET), aimed at battling common control-flow hijacking attacks. I...