Information
This setting configures the start type for the Server Message Block version 1 (SMBv1) client driver service (MRxSmb10), which is recommended to be disabled.
The recommended state for this setting is: Enabled: Disable driver (recommended).
Note: Do not, under any circumstances, configure this overall setting as Disabled, as doing so will delete the underlying registry entry altogether, which will cause serious problems.
Rationale:
Since September 2016, Microsoft has strongly encouraged that SMBv1 be disabled and no longer used on modern networks, as it is a 30 year old design that is much more vulnerable to attacks then much newer designs such as SMBv2 and SMBv3.
More information on this can be found at the following links:
Stop using SMB1 | Storage at Microsoft
Disable SMB v1 in Managed Environments with Group Policy - 'Stay Safe' Cyber Security Blog
Disabling SMBv1 through Group Policy - Microsoft Security Guidance blog
Impact:
Some legacy OSes (e.g. Windows XP, Server 2003 or older), applications and appliances may no longer be able to communicate with the system once SMBv1 is disabled. We recommend careful testing be performed to determine the impact prior to configuring this as a widespread control, and where possible, remediate any incompatibilities found with the vendor of the incompatible system. Microsoft is also maintaining a thorough (although not comprehensive) list of known SMBv1 incompatibilities at this link: SMB1 Product Clearinghouse | Storage at Microsoft
Solution
To establish the recommended configuration via GP, set the following UI path to Enabled: Disable driver (recommended):
Computer Configuration\Policies\Administrative Templates\MS Security Guide\Configure SMB v1 client driver
Note: This Group Policy path does not exist by default. An additional Group Policy template (SecGuide.admx/adml) is required - it is available from Microsoft at this link.
Default Value:
Windows Server 2008 (non-R2), 2008 R2, and 2012 (non-R2): Enabled: Manual start.
Windows Server 2012 R2 and Server 2016 (up to R1607): Enabled: Automatic start.
Windows Server 2016 R1709 and newer: Enabled: Disable driver.
Additional Information:
Microsoft Windows Server 2019 Security Technical Implementation Guide:
Version 2, Release 1, Benchmark Date: November 13, 2020
Vul ID: V-205684
Rule ID: SV-205684r569188_rule
STIG ID: WN19-00-000400
Severity: CAT II