Disable SMBv1 to protect against ransomware attacks

ransomware

With the recent issues with ransomware and the Wannacry attack, you really should now have SMBv1 disabled on your machines.

If you are still working on this or maybe not even started yet, then here we will slow you a few examples of what to do to protect yourselves from future SMBv1 vulnerability attacks.

Manual Commands

If you need to disable SMBv1 on just a few machines, then you may want to use a simple command line to start the services for SMBv1. To do this, run the following commands from an elevated command prompt:

sc.exe config lanmanworkstation depend= bowser/mrxsmb20/nsi
sc.exe config mrxsmb10 start= disabled

So you should see something like this once complete:

Disable SMBv1 to protect against ransomware attacks 1

Registry Edit

You can also make a registry change on a machine to disable the SMBv1 Protocol. To go this, go to the following registry location:

HKLMSYSTEMCurrentControlSetServicesLanmanServerParameters

Then you need to add a DWORD with the following settings:

Name: SMB1

Value: 0

So it should look like this:

Disable SMBv1 to protect against ransomware attacks 2

Reboot your machine for the changes to take affect.

Powershell

You can also run a Powershell command to uninstall the SMBv1 feature. To do this, open up a Powershell command box and enter the following command:

Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol

This will then start the uninstall process:

Disable SMBv1 to protect against ransomware attacks 3

Once complete it will then ask you if you want to reboot your machine or not:

Disable SMBv1 to protect against ransomware attacks 4

You can use all of the above methods to remove the SMBv1 vulnerbility on larger volumes of machines by using systems like Group Policy or Configuration Manager

COMMENTS

If you have any questions or feedback on this guide, please feel free to leave us a message below.

About A.J. Armstrong

Founder of TechyGeeksHome and Head Editor for over eight years! IT expert in multiple areas for over 21 years. Sharing experience and knowledge whenever possible! Making IT Happen.

View all posts by A.J. Armstrong

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.