WN19-00-000380 - Windows Server 2019 must not have the Server Message Block (SMB) v1 protocol installed - SMB v1 protocol installed.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks and is not FIPS compliant.

Solution

Uninstall the SMBv1 protocol.

Open 'Windows PowerShell' with elevated privileges (run as administrator).

Enter 'Uninstall-WindowsFeature -Name FS-SMB1 -Restart'.
(Omit the Restart parameter if an immediate restart of the system cannot be done.)

Alternately:

Start 'Server Manager'.

Select the server with the feature.

Scroll down to 'ROLES AND FEATURES' in the right pane.

Select 'Remove Roles and Features' from the drop-down 'TASKS' list.

Select the appropriate server on the 'Server Selection' page and click 'Next'.

Deselect 'SMB 1.0/CIFS File Sharing Support' on the 'Features' page.

Click 'Next' and 'Remove' as prompted.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Server_2019_V2R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000381, Rule-ID|SV-205682r819711_rule, STIG-ID|WN19-00-000380, STIG-Legacy|SV-103477, STIG-Legacy|V-93391, Vuln-ID|V-205682

Plugin: Windows

Control ID: 9be75828ac2a870b47ae75f42514540ef79faa7f9308ab2de0ca03b5bbc3790f