Much has been written about WannaCry, and the security community has learned countless valuable lessons from the unprecedented ransomware attack. One thing that is seldom mentioned, however, is how to protect your infrastructure against future Server Message Block (SMB) exploits.

Removing the Insecure SMB Protocol

Microsoft has three different versions of this protocol. The first version has the least security and should be disabled or removed immediately. You can do this by using the group policy management console and adding a registry rule to disable or delete the protocol entirely using the remove programs/features dialog. You should apply this rule to all PCs across your network by running gpupdate/force from a command prompt.

Finally, review the target machines to ensure the registry settings are being applied correctly. Microsoft cautioned that this may prevent older Linux or XP machines from being able to access certain network resources such as shared directories. You should also reboot all your PCs once the policy is applied.

The second version of SMB was introduced with Vista and Windows Server 2008, and the third came along with Windows 8 and Windows Server 2012. These two later SMB versions should not be disabled permanently, since they are used for a variety of network-based activities such as supporting file sharing, encryption, large MTU packets and messages.

If you are running at least Windows 8 or Windows Server 2012, you can use the Set-SMBServerConfiguration in a PowerShell command session. This allows you to enable or disable the SMBv1, SMBv2 and SMBv3 protocols on the server component with a few keywords. However, the process is a bit more involved if you are using older Windows versions, and you might need to edit specific registry keys.

Additional Network Security Measures

In addition to making these changes, now is also a good time to review your network isolation policies, such as virtual private networks (VPNs) and virtual local area networks (VLANs). Make sure you group your PCs according to least network privileges, segregate by functional areas and review access policies for your various user groups.

SMB protocols are the backbone of many applications that keep our enterprises running. You must know which versions you are supporting, as well as which servers and devices are using the outdated protocols, to keep your networks secure and operating under the best possible conditions.

More from Network

X-Force Identifies Vulnerability in IoT Platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges

4 min read - View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this series, we ascertain that the technological evolution of New Space ventures expanded the threats that targeted the space system components. These threats could be countered by various cybersecurity measures. However, the New Space has brought about a significant shift in the industry. This wave of innovation is reshaping the future…

4 min read

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

4 min read - Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in New Space

7 min read - View Part 1 in this series, Introduction to New Space. The growth of the New Space economy, the innovation in technologies and the emergence of various private firms have contributed to the development of the space industry. Despite this growth, there has also been an expansion of the cyberattack surface of space systems. Attacks are becoming more and more sophisticated and affecting several components of the space system’s architecture. Threat Actors' Methodology Every space system architecture is composed of three…

7 min read