Quantcast
Channel: TechNet Blogs
Viewing all articles
Browse latest Browse all 36188

Step by Step: Safely disabling SMB v1 from your production environment.

$
0
0

Introduction:

In this blog I will not cover why we have to remove SMB v1 from production network, this have been already covered, probably one of the best articles covering this is https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/

I will cover how you can audit the usage of SMB v1 in your network, so you can disable it safely without breaking anything on your production. To do, we will proceed with the three steps listed below:

· Enable Auditing on SMB Servers.

· Configure Event Forwarding.

· Retrieve Events on an Excel sheet and analyzing SMBv1 traffic.

Enable Auditing on SMB Servers:

First Question, on which servers we need to enable auditing?

the answer is simple, all SMB servers. Domain controllers are a good example, client computers and member servers use SMB to access SYSVOL and NETLOGON shares to apply group policy, so domain controllers are servers to audit. File and print servers also need to be audited.

In my scenario I have three concerned servers: DC01 and DC02 are domain controllers, MEM01 is a file server. All of them are running Windows Server 2012 R2.

To enable SMB v1 auditing on Windows Server 2012 R2 run the PowerShell command:

Set-SmbServerConfiguration -AuditSmb1Access $true

clip_image002

After enabling the audit, an event will be logged each time a client computer access server using SMB v1.

I can see the events by navigating Application and Services Logs à Microsoft à Windows à SMB Server à Audit

image

image

As you can see on the screenshot above, the event indicates SMB1 access and give you the client IP address.

Note: The command Set-SmbServerConfiguration -AuditSmb1Access $true will not work on a non-updated Windows Server 2012 R2, please install the latest monthly rollup to be sure everything will work just fine, till writing of these lines the latest monthly rollup is October 2018. https://support.microsoft.com/en-us/help/4462926/windows-8-update-kb4462926.

Configure Event Forwarding

Imagine you have a huge environment, let’s say more than 50 domain controllers or maybe more than 100, how you will analyze SMBv1 events on all these servers, here where windows event forwarding will be very useful to centralize logs for better analyzing. Below the steps to centralize SMBv1 events on the server MEM01.

1. Add the network service account as member of the group Event Log Readers on all audited servers.

On Domain Controllers use Active Directory Users and Computers.

image

On Member servers use Computer Management console as shown on screenshots below.

image

image

image

2. Give the Event Log Readers group permissions to access SMB Server audit Logs.

By default, Event Log Readers members have permissions to access Security and System logs…etc. But they don’t have permissions to access SMB Server Log.

Open command prompt as administrator and run the following command on audited servers.

wevtutil set-log Microsoft-Windows-SMBServer/Audit /ca:O:BAG:SYD:(A;;0x5;;;BA)(A;;0x1;;;S-1-5-32-573)

image

3. Create a subscription on the Windows Event forwarding Server. (MEM01)

Open Event Viewer

Click on Subscription and then Click Yes.

image

Right click on Subscription and select Create Subscription…

image

Enter a friendly name.

Select Source computer initiated.

Click on Select Computer Groups.

image

Click on Add Domain Computers…

image

Include the group Domain Controllers and MEM01.

Click OK.

image

Click on Select Events…

image

Choose the SMBServer Audit log.

image

Type 3000 to forward only Events with Event ID 3000.

Click OK.

image

Click on Advanced…

image

Select Minimize Latency.

image

Click OK twice.

Subscription SMBv1 is created.

image

4. Configure the group policy

Create a GPO and configure the policy setting: Configure target Subscription Manager

image

Enable the policy and click on Show…

image

Enter the URI of the event forwarder server. In my example MEM01.

image

My GPO is named: Event Forwarding.

The GPO is linked to domain controllers OU and BROMServers OU.

image

you might need to restart the servers before beginning viewing events on the Event forwarding server (MEM01).

image

Retrieve Events on an Excel sheet and analyzing SMBv1 traffic.

Use the PowerShell script below to export the events on a nice Excel Sheet. Run the PowerShell code below on the event forwarder server (MEM01).

clip_image002

Add-Content -Value "clientName,server,TimeCreated" -Path c:SMBv1.csv

$Events = Get-WinEvent -LogName ForwardedEvents

# Parse out the event message data           

ForEach ($Event in $Events) {           

# Convert the event to XML           

$eventXML = [xml]$Event.ToXml()

$clientName = $eventXML.Event.EventData.Data.'#text'

$server = $Event.MachineName

$TimeCreated = $Event.TimeCreated    

Add-Content -Value "$clientName,$server,$TimeCreated" -Path c:SMBv1.csv

}

Run the script.

image

You will find the SMBv1.csv on the C: drive

image

Screenshot of the csv file opened on Excel.

image

With Excel you can see the devices and computers using SMBv1. After treatment of all the devices you can disable SMBv1 safely .

Conclusion

The most important thing when disabling SMB v1 from production is auditing, following steps on this article you will have all the devices talking SMBv1 with your SMB Servers, you need to understand why these clients are talking SMBv1 and how to remediate, after treatment of these devices you can safely disable SMBv1 using the steps on the article below.

https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and


Viewing all articles
Browse latest Browse all 36188

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>