{
	"id": "21dec7e3-4c61-49b7-acb8-a0eb886401a4",
	"created_at": "2026-04-06T02:12:10.592947Z",
	"updated_at": "2026-04-10T13:11:24.392009Z",
	"deleted_at": null,
	"sha1_hash": "ba2aed62ccd09945382e96b1d073b81cd46d633f",
	"title": "SMB Security Best Practices | CISA",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 29817,
	"plain_text": "SMB Security Best Practices | CISA\r\nPublished: 2017-03-16 · Archived: 2026-04-06 01:58:13 UTC\r\nIn response to public reporting of a potential Server Message Block (SMB) vulnerability, US-CERT is providing\r\nknown best practices related to SMB. This service is universally available for Windows systems, and legacy\r\nversions of SMB protocols could allow a remote attacker to obtain sensitive information from affected systems.\r\nUS-CERT recommends that users and administrators consider:\r\ndisabling SMBv1 and\r\nblocking all versions of SMB at the network boundary by blocking TCP port 445 with related protocols on\r\nUDP ports 137-138 and TCP port 139, for all boundary devices.\r\nUS-CERT cautions users and administrators that disabling or blocking SMB may create problems by obstructing\r\naccess to shared files, data, or devices. The benefits of mitigation should be weighed against potential disruptions\r\nto users. For more information on SMB, please review Microsoft Security Advisories 2696547 and 204279 .\r\nSource: https://www.us-cert.gov/ncas/current-activity/2017/01/16/SMB-Security-Best-Practices\r\nhttps://www.us-cert.gov/ncas/current-activity/2017/01/16/SMB-Security-Best-Practices\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.us-cert.gov/ncas/current-activity/2017/01/16/SMB-Security-Best-Practices"
	],
	"report_names": [
		"SMB-Security-Best-Practices"
	],
	"threat_actors": [],
	"ts_created_at": 1775441530,
	"ts_updated_at": 1775826684,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ba2aed62ccd09945382e96b1d073b81cd46d633f.pdf",
		"text": "https://archive.orkl.eu/ba2aed62ccd09945382e96b1d073b81cd46d633f.txt",
		"img": "https://archive.orkl.eu/ba2aed62ccd09945382e96b1d073b81cd46d633f.jpg"
	}
}