• Welcome to the all-new Windows Central Forums! - We're still moving some things around, so you may see a few quirks here and there, but we're working on getting things fully completed as soon as possible. For now, take a look around, and if you run into any major issues, please let us know in this thread!

How to disable SMBv1 to protect your Windows PC from malicious attacks


Staff member
Dec 17, 2013

Your PC may be vulnerable to attacks — use this guide to disable the Server Message Block (SMB) version 1 (v1) protocol on Windows 10.
Recent ransomware attacks, including WannaCry and Petya, both wreaked havoc on hundreds of thousands of PCs around the globe, taking advantage of a flaw found in the old SMBv1, which still comes enabled by default on Windows 10.
SMB is a network file sharing protocol that Windows 10 uses to allow apps to read and write to files, as well as to perform services requests for another device on the network. There are three versions of SMB, but version 1 is the only one affected; versions 2 and 3 are not vulnerable.
If your computer is not running applications that require the use of this protocol, it's recommended to disable SMBv1 completely to prevent future malicious attacks that could use this vulnerability.

Full story from the WindowsCentral blog...