Disable SMBv1 to protect against ransomware attacks

ransomware

With the recent issues with ransomware and the Wannacry attack, you really should now have SMBv1 disabled on your machines.

If you are still working on this or maybe not even started yet, then here we will slow you a few examples of what to do to protect yourselves from future SMBv1 vulnerability attacks.



Manual Commands

If you need to disable SMBv1 on just a few machines, then you may want to use a simple command line to start the services for SMBv1. To do this, run the following commands from an elevated command prompt:

So you should see something like this once complete:

Registry Edit

You can also make a registry change on a machine to disable the SMBv1 Protocol. To go this, go to the following registry location:

Then you need to add a DWORD with the following settings:

Name: SMB1

Value: 0

So it should look like this:

Reboot your machine for the changes to take affect.

Powershell

You can also run a Powershell command to uninstall the SMBv1 feature. To do this, open up a Powershell command box and enter the following command:

This will then start the uninstall process:

Once complete it will then ask you if you want to reboot your machine or not:

You can use all of the above methods to remove the SMBv1 vulnerbility on larger volumes of machines by using systems like Group Policy or Configuration Manager

COMMENTS

If you have any questions or feedback on this guide, please feel free to leave us a message below.



Leave us a message...