Disable insecure "SMBv1" protocol
- Windows onlyThis script improves your privacy on Windows
- Single actionThis page belongs to a script, containing basic changes to achieve a task.
- Impact: Minimum
System Functionality / Data Loss Risk: Low
This action improves privacy with minimal impact when you run the recommended script.
- Batch (batchfile)These changes use Windows system commands to update your settings.
- Administrator rights requiredThis script requires privilege access to do the system changes
- Fully reversible
You can fully restore this action (revert back to the original behavior) using this website.
The restore/revert methods provided here can help you fix issues.
Overview
This script improves network security by disabling the outdated SMBv1 protocol.
SMBv1, or Server Message Block version 1, is an outdated network protocol developed for file and printer sharing across networks 1 2. This protocol is well-known for its vulnerabilities to cyber attacks 1 2 3 4 5. Microsoft deprecated SMBv1 in 2014 6 7. Since 2007, newer and more secure versions of this protocol have replaced SMBv1 in modern versions of Windows 6. It is still enabled by default in older Windows versions 1. Microsoft advises disabling this protocol to strengthen security 1 8. SMB1 is not necessary for most users, as Microsoft ensures vendor support for at least SMB 2.0 2.
The primary reasons for disabling SMBv1 include:
- It uses the outdated MD5 hash algorithm, vulnerable to security attacks 3.
- It fails to meet modern security standards set by FIPS 3, CISA (US-CERT) 5, CIS (Department of Defense) 3, and Microsoft Security Baseline 8.
- It lacks the efficiency and performance improvements present in newer versions of the protocol 2.
- It is vulnerable to various cyber threats 1 2 3 4 5, , including ransomware and malware 1 2.
Disabling SMBv1 may lead to compatibility issues with older network devices and software 1 3 6 9. This may affect file sharing and print services on systems like Windows Server 2003 3 and some older Network Attached Storage (NAS) devices 3. These systems are insecure and are no longer supported.
This script makes the following changes to your system:
- Removal of SMBv1 components:
SMB1Protocol
2 3 4 10 (also known asFS-SMB1
2 11)SMB1Protocol-Client
10SMB1Protocol-Server
10.- Disabling the
mrxsmb10
(SMB 1.x MiniRedirector 12) driver, linked with SMBv1 1 4 13, and adjusting related settings to keep older systems stable 1 4 13. - Disabling server side processing of SMBv1 protocol using
HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters!SMBv1
registry key 1 14 15.
These changes require a system reboot to take effect 1 4 9.
This may cause compatibility issues with older devices or software.
Overview of default feature statuses
SMB1Protocol
:
Feature name | SMB1Protocol |
Display name | SMB 1.0/CIFS File Sharing Support |
Description | Support for the SMB 1.0/CIFS file sharing protocol, and the Computer Browser protocol. |
Default (Windows 11 ≥ 23H2) | 🔴 Disabled |
Default (Windows 10 ≥ 22H2) | 🔴 Disabled |
SMB1Protocol-Client
:
Feature name | SMB1Protocol-Client |
Display name | SMB 1.0/CIFS Client |
Description | Support for the SMB 1.0/CIFS client for accessing legacy servers. |
Default (Windows 11 ≥ 23H2) | 🔴 Disabled |
Default (Windows 10 ≥ 22H2) | 🔴 Disabled |
SMB1Protocol-Server
:
Feature name | SMB1Protocol-Server |
Display name | SMB 1.0/CIFS Server |
Description | Support for the SMB 1.0/CIFS file server for sharing data with legacy clients and browsing the network neighborhood. |
Default (Windows 11 ≥ 23H2) | 🔴 Disabled |
Default (Windows 10 ≥ 22H2) | 🔴 Disabled |
Overview of default service statuses
SMB 1.x MiniRedirector (mrxsmb10
):
OS Version | Status | Start type |
---|---|---|
Windows 11 (≥ 23H2) | 🟡 Missing | N/A |
Windows 10 (≥ 22H2) | 🟡 Missing | N/A |
Sources
- Disabling SMBv1 through Group Policy. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/archive/blogs/secguide/disabling-smbv1-through-group-policy
Archived: https://web.archive.org/web/20240413122756/https://learn.microsoft.com/en-us/archive/blogs/secguide/disabling-smbv1-through-group-policy - Stop using SMB1 - Microsoft Community Hub. techcommunity.microsoft.com. (2024).
Original: https://techcommunity.microsoft.com/t5/storage-at-microsoft/stop-using-smb1/ba-p/425858
Archived: https://web.archive.org/web/20240413124106/https://techcommunity.microsoft.com/t5/storage-at-microsoft/stop-using-smb1/ba-p/425858 - The Server Message Block (SMB) v1 protocol must be disabled on the system.. www.stigviewer.com. (2024).
Original: https://www.stigviewer.com/stig/microsoft_windows_10/2023-09-29/finding/V-220729
Archived: https://web.archive.org/web/20240413124245/https://www.stigviewer.com/stig/microsoft_windows_10/2023-09-29/finding/V-220729 - Server. How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-US/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3
Archived: https://web.archive.org/web/20240413122807/https://learn.microsoft.com/en-US/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3?tabs=server - SMB Security Best Practices. CISA. www.cisa.gov. (2024).
Original: https://www.cisa.gov/news-events/alerts/2017/01/16/smb-security-best-practices
Archived: https://web.archive.org/web/20240413124050/https://www.cisa.gov/news-events/alerts/2017/01/16/smb-security-best-practices - SMBv1 is not installed by default in Windows 10 version 1709, Windows Server version 1709 and later versions. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/windows-server/storage/file-server/troubleshoot/smbv1-not-installed-by-default-in-windows
Archived: https://web.archive.org/web/20240413122812/https://learn.microsoft.com/en-us/windows-server/storage/file-server/troubleshoot/smbv1-not-installed-by-default-in-windows - The Deprecation of SMB1 – You should be planning to get rid of this old SMB dialect. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/archive/blogs/josebda/the-deprecation-of-smb1-you-should-be-planning-to-get-rid-of-this-old-smb-dialect
Archived: https://web.archive.org/web/20240413124101/https://learn.microsoft.com/en-us/archive/blogs/josebda/the-deprecation-of-smb1-you-should-be-planning-to-get-rid-of-this-old-smb-dialect - Client. How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-US/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3
Archived: https://web.archive.org/web/20240413125713/https://learn.microsoft.com/en-US/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3?tabs=client - Remove-SmbComponent (SmbShare). Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/powershell/module/smbshare/remove-smbcomponent
Archived: https://web.archive.org/web/20240413124113/https://learn.microsoft.com/en-us/powershell/module/smbshare/remove-smbcomponent?view=windowsserver2025-ps&wt.mc_id=ps-gethelp - The Server Message Block (SMB) v1 protocol must be uninstalled.. www.stigviewer.com. (2024).
Original: https://www.stigviewer.com/stig/windows_server_2016/2020-06-16/finding/V-73299
Archived: https://web.archive.org/web/20240413124320/https://www.stigviewer.com/stig/windows_server_2016/2020-06-16/finding/V-73299 - SMB 1.x MiniRedirector (mrxsmb10) Service Defaults in Windows 10. revertservice.com. (2024).
Original: https://revertservice.com/10/mrxsmb10
Archived: https://web.archive.org/web/20240413124418/https://revertservice.com/10/mrxsmb10/ - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.. www.stigviewer.com. (2024).
Original: https://www.stigviewer.com/stig/windows_server_20122012_r2_domain_controller/2019-01-16/finding/V-73523
Archived: https://web.archive.org/web/20240413124409/https://www.stigviewer.com/stig/windows_server_20122012_r2_domain_controller/2019-01-16/finding/V-73523 - Configure SMB v1 server. admx.help. (2024).
Original: https://admx.help
Archived: https://web.archive.org/web/20240413124606/https://admx.help/?Category=security-compliance-toolkit&Policy=Microsoft.Policies.SecGuide::Pol_SecGuide_0001_SMBv1_Server - Server service configuration and tuning - Microsoft Support. support.microsoft.com. (2024).
Original: https://support.microsoft.com/en-us/topic/908332b7-49de-a86c-dba3-401b9fe8116f
Archived: https://web.archive.org/web/20240418073214/https://support.microsoft.com/en-us/topic/908332b7-49de-a86c-dba3-401b9fe8116f - learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/archive/blogs/secguide/security-baseline-for-windows-10-creators-update-v1703-draft
Archived: https://web.archive.org/web/20240413122800/https://learn.microsoft.com/en-us/archive/blogs/secguide/security-baseline-for-windows-10-creators-update-v1703-draft
Apply Now
Choose one of three ways to apply:
Download script
Download and run the script directly- No app needed
- Offline usage
- Easy-to-apply
- Free
- Open-source
Help
How to apply or restore "Disable insecure "SMBv1" protocol" using script
- ≈ 2 min to complete
- Tools: Web Browser
- Difficulty: Simple
- ≈ 5 instructions
- 1
Download
Download the script file by clicking on thebutton above.
Use button above to restore changes. - 2
Keep the file
If warned by your browser, keep the file. - 3
Open
Open the downloaded file. - 4
Exit
Once it's done, press any key to exit the window. - 5
Restart
Restart your computer for all changes to take effect.
Apply with privacy.sexy
Guided, automated application with safety checks- Recommended for most users
- Includes safety checks
- Free
- Open-source
- Popular
- Offline/Online usage
Help
How to apply or restore "Disable insecure "SMBv1" protocol" using privacy.sexy
- ≈ 3 min to complete
- Tools: privacy.sexy
- Difficulty: Simple
- ≈ 4 instructions
- 2
Choose script
- Search for the script name: Disable insecure "SMBv1" protocol
- Check the script by clicking on the checkbox.
- 3
Run
Click on ▶️ Run button at the bottom of the page.This button only appears on desktop version (recommended). On browser, use 💾 Save button.
- Apply
- Revert
:: Disable the "SMB1Protocol" feature
PowerShell -ExecutionPolicy Unrestricted -Command "$featureName = 'SMB1Protocol'; $feature = Get-WindowsOptionalFeature -FeatureName "^""$featureName"^"" -Online -ErrorAction Stop; if (-Not $feature) { Write-Output "^""Skipping: The feature `"^""$featureName`"^"" is not found. No action required."^""; Exit 0; }; if ($feature.State -eq [Microsoft.Dism.Commands.FeatureState]::Disabled) { Write-Output "^""Skipping: The feature `"^""$featureName`"^"" is already disabled. No action required."^""; Exit 0; }; try { Write-Host "^""Disabling feature: `"^""$featureName`"^""."^""; Disable-WindowsOptionalFeature -FeatureName "^""$featureName"^"" -Online -NoRestart -LogLevel ([Microsoft.Dism.Commands.LogLevel]::Errors) -WarningAction SilentlyContinue -ErrorAction Stop | Out-Null; } catch { Write-Error "^""Failed to disable the feature `"^""$featureName`"^"": $($_.Exception.Message)"^""; Exit 1; }; Write-Output "^""Successfully disabled the feature `"^""$featureName`"^""."^""; Exit 0"
:: Disable the "SMB1Protocol-Client" feature
PowerShell -ExecutionPolicy Unrestricted -Command "$featureName = 'SMB1Protocol-Client'; $feature = Get-WindowsOptionalFeature -FeatureName "^""$featureName"^"" -Online -ErrorAction Stop; if (-Not $feature) { Write-Output "^""Skipping: The feature `"^""$featureName`"^"" is not found. No action required."^""; Exit 0; }; if ($feature.State -eq [Microsoft.Dism.Commands.FeatureState]::Disabled) { Write-Output "^""Skipping: The feature `"^""$featureName`"^"" is already disabled. No action required."^""; Exit 0; }; try { Write-Host "^""Disabling feature: `"^""$featureName`"^""."^""; Disable-WindowsOptionalFeature -FeatureName "^""$featureName"^"" -Online -NoRestart -LogLevel ([Microsoft.Dism.Commands.LogLevel]::Errors) -WarningAction SilentlyContinue -ErrorAction Stop | Out-Null; } catch { Write-Error "^""Failed to disable the feature `"^""$featureName`"^"": $($_.Exception.Message)"^""; Exit 1; }; Write-Output "^""Successfully disabled the feature `"^""$featureName`"^""."^""; Exit 0"
:: Disable the "SMB1Protocol-Server" feature
PowerShell -ExecutionPolicy Unrestricted -Command "$featureName = 'SMB1Protocol-Server'; $feature = Get-WindowsOptionalFeature -FeatureName "^""$featureName"^"" -Online -ErrorAction Stop; if (-Not $feature) { Write-Output "^""Skipping: The feature `"^""$featureName`"^"" is not found. No action required."^""; Exit 0; }; if ($feature.State -eq [Microsoft.Dism.Commands.FeatureState]::Disabled) { Write-Output "^""Skipping: The feature `"^""$featureName`"^"" is already disabled. No action required."^""; Exit 0; }; try { Write-Host "^""Disabling feature: `"^""$featureName`"^""."^""; Disable-WindowsOptionalFeature -FeatureName "^""$featureName"^"" -Online -NoRestart -LogLevel ([Microsoft.Dism.Commands.LogLevel]::Errors) -WarningAction SilentlyContinue -ErrorAction Stop | Out-Null; } catch { Write-Error "^""Failed to disable the feature `"^""$featureName`"^"": $($_.Exception.Message)"^""; Exit 1; }; Write-Output "^""Successfully disabled the feature `"^""$featureName`"^""."^""; Exit 0"
:: Disable service(s): `mrxsmb10`
PowerShell -ExecutionPolicy Unrestricted -Command "$serviceName = 'mrxsmb10'; Write-Host "^""Disabling service: `"^""$serviceName`"^""."^""; <# -- 1. Skip if service does not exist #>; $service = Get-Service -Name $serviceName -ErrorAction SilentlyContinue; if(!$service) { Write-Host "^""Service `"^""$serviceName`"^"" could not be not found, no need to disable it."^""; Exit 0; }; <# -- 2. Stop if running #>; if ($service.Status -eq [System.ServiceProcess.ServiceControllerStatus]::Running) { Write-Host "^""`"^""$serviceName`"^"" is running, stopping it."^""; try { Stop-Service -Name "^""$serviceName"^"" -Force -ErrorAction Stop; Write-Host "^""Stopped `"^""$serviceName`"^"" successfully."^""; } catch { Write-Warning "^""Could not stop `"^""$serviceName`"^"", it will be stopped after reboot: $_"^""; }; } else { Write-Host "^""`"^""$serviceName`"^"" is not running, no need to stop."^""; }; <# -- 3. Skip if already disabled #>; $startupType = $service.StartType <# Does not work before .NET 4.6.1 #>; if (!$startupType) { $startupType = (Get-WmiObject -Query "^""Select StartMode From Win32_Service Where Name='$serviceName'"^"" -ErrorAction Ignore).StartMode; if(!$startupType) { $startupType = (Get-WmiObject -Class Win32_Service -Property StartMode -Filter "^""Name='$serviceName'"^"" -ErrorAction Ignore).StartMode; }; }; if ($startupType -eq 'Disabled') { Write-Host "^""$serviceName is already disabled, no further action is needed"^""; Exit 0; }; <# -- 4. Disable service #>; try { Set-Service -Name "^""$serviceName"^"" -StartupType Disabled -Confirm:$false -ErrorAction Stop; Write-Host "^""Disabled `"^""$serviceName`"^"" successfully."^""; } catch { Write-Error "^""Could not disable `"^""$serviceName`"^"": $_"^""; }"
sc.exe config lanmanworkstation depend= bowser/mrxsmb20/nsi
:: Set the registry value: "HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters!SMBv1"
PowerShell -ExecutionPolicy Unrestricted -Command "$registryPath = 'HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters'; $data = '0'; reg add 'HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters' /v 'SMBv1' /t 'REG_DWORD' /d "^""$data"^"" /f"
:: Suggest restarting computer for changes to take effect
PowerShell -ExecutionPolicy Unrestricted -Command "$message = 'For the changes to fully take effect, please restart your computer.'; $warn = $false; if ($warn) { Write-Warning "^""$message"^""; } else { Write-Host "^""Note: "^"" -ForegroundColor Blue -NoNewLine; Write-Output "^""$message"^""; }"
":: Revert the 'SMB1Protocol' feature to its default settings\nPowerShell -ExecutionPolicy Unrestricted -Command \"$featureName = 'SMB1Protocol'; $ignoreMissingOnRevert =  $false; $disabledByDefault = $true <# $false #>; $feature = Get-WindowsOptionalFeature -FeatureName \"^\"\"$featureName\"^\"\" -Online -ErrorAction Stop; if (-Not $feature) { if ($ignoreMissingOnRevert) { Write-Output \"^\"\"Skipping: The feature `\"^\"\"$featureName`\"^\"\" is not found. No action required.\"^\"\"; Exit 0; }; Write-Error \"^\"\"Failed to revert changes to the feature `\"^\"\"$featureName`\"^\"\". The feature is not found.\"^\"\"; Exit 1; }; if ($feature.State -eq [Microsoft.Dism.Commands.FeatureState]::Enabled) { Write-Output \"^\"\"Skipping: The feature `\"^\"\"$featureName`\"^\"\" is already enabled. No action required.\"^\"\"; Exit 0; }; if ($disabledByDefault) { Write-Output \"^\"\"Skipping: The feature `\"^\"\"$featureName`\"^\"\" is already disabled and this is the default configuration.\"^\"\"; Exit 0; }; try { Write-Host \"^\"\"Enabling feature: `\"^\"\"$featureName`\"^\"\".\"^\"\"; Enable-WindowsOptionalFeature -FeatureName \"^\"\"$featureName\"^\"\" -Online -NoRestart -LogLevel ([Microsoft.Dism.Commands.LogLevel]::Errors) -WarningAction SilentlyContinue -ErrorAction Stop | Out-Null; } catch { Write-Error \"^\"\"Failed to enable feature `\"^\"\"$featureName`\"^\"\": $($_.Exception.Message)\"^\"\"; Exit 1; }; Write-Output \"^\"\"Successfully enabled the feature `\"^\"\"$featureName`\"^\"\".\"^\"\"; Exit 0\"\n:: Revert the 'SMB1Protocol-Client' feature to its default settings\nPowerShell -ExecutionPolicy Unrestricted -Command \"$featureName = 'SMB1Protocol-Client'; $ignoreMissingOnRevert =  $false; $disabledByDefault = $true <# $false #>; $feature = Get-WindowsOptionalFeature -FeatureName \"^\"\"$featureName\"^\"\" -Online -ErrorAction Stop; if (-Not $feature) { if ($ignoreMissingOnRevert) { Write-Output \"^\"\"Skipping: The feature `\"^\"\"$featureName`\"^\"\" is not found. No action required.\"^\"\"; Exit 0; }; Write-Error \"^\"\"Failed to revert changes to the feature `\"^\"\"$featureName`\"^\"\". The feature is not found.\"^\"\"; Exit 1; }; if ($feature.State -eq [Microsoft.Dism.Commands.FeatureState]::Enabled) { Write-Output \"^\"\"Skipping: The feature `\"^\"\"$featureName`\"^\"\" is already enabled. No action required.\"^\"\"; Exit 0; }; if ($disabledByDefault) { Write-Output \"^\"\"Skipping: The feature `\"^\"\"$featureName`\"^\"\" is already disabled and this is the default configuration.\"^\"\"; Exit 0; }; try { Write-Host \"^\"\"Enabling feature: `\"^\"\"$featureName`\"^\"\".\"^\"\"; Enable-WindowsOptionalFeature -FeatureName \"^\"\"$featureName\"^\"\" -Online -NoRestart -LogLevel ([Microsoft.Dism.Commands.LogLevel]::Errors) -WarningAction SilentlyContinue -ErrorAction Stop | Out-Null; } catch { Write-Error \"^\"\"Failed to enable feature `\"^\"\"$featureName`\"^\"\": $($_.Exception.Message)\"^\"\"; Exit 1; }; Write-Output \"^\"\"Successfully enabled the feature `\"^\"\"$featureName`\"^\"\".\"^\"\"; Exit 0\"\n:: Revert the 'SMB1Protocol-Server' feature to its default settings\nPowerShell -ExecutionPolicy Unrestricted -Command \"$featureName = 'SMB1Protocol-Server'; $ignoreMissingOnRevert =  $false; $disabledByDefault = $true <# $false #>; $feature = Get-WindowsOptionalFeature -FeatureName \"^\"\"$featureName\"^\"\" -Online -ErrorAction Stop; if (-Not $feature) { if ($ignoreMissingOnRevert) { Write-Output \"^\"\"Skipping: The feature `\"^\"\"$featureName`\"^\"\" is not found. No action required.\"^\"\"; Exit 0; }; Write-Error \"^\"\"Failed to revert changes to the feature `\"^\"\"$featureName`\"^\"\". The feature is not found.\"^\"\"; Exit 1; }; if ($feature.State -eq [Microsoft.Dism.Commands.FeatureState]::Enabled) { Write-Output \"^\"\"Skipping: The feature `\"^\"\"$featureName`\"^\"\" is already enabled. No action required.\"^\"\"; Exit 0; }; if ($disabledByDefault) { Write-Output \"^\"\"Skipping: The feature `\"^\"\"$featureName`\"^\"\" is already disabled and this is the default configuration.\"^\"\"; Exit 0; }; try { Write-Host \"^\"\"Enabling feature: `\"^\"\"$featureName`\"^\"\".\"^\"\"; Enable-WindowsOptionalFeature -FeatureName \"^\"\"$featureName\"^\"\" -Online -NoRestart -LogLevel ([Microsoft.Dism.Commands.LogLevel]::Errors) -WarningAction SilentlyContinue -ErrorAction Stop | Out-Null; } catch { Write-Error \"^\"\"Failed to enable feature `\"^\"\"$featureName`\"^\"\": $($_.Exception.Message)\"^\"\"; Exit 1; }; Write-Output \"^\"\"Successfully enabled the feature `\"^\"\"$featureName`\"^\"\".\"^\"\"; Exit 0\"\n:: Restore service(s) to default state: `mrxsmb10`\nPowerShell -ExecutionPolicy Unrestricted -Command \"$serviceName = 'mrxsmb10'; $defaultStartupMode = 'Automatic'; $ignoreMissingOnRevert = $true <# $false #>; Write-Host \"^\"\"Reverting service `\"^\"\"$serviceName`\"^\"\" start to `\"^\"\"$defaultStartupMode`\"^\"\".\"^\"\"; <# -- 1. Skip if service does not exist #>; $service = Get-Service -Name $serviceName -ErrorAction SilentlyContinue; if (!$service) { if ($ignoreMissingOnRevert) { Write-Output \"^\"\"Skipping: The service `\"^\"\"$serviceName`\"^\"\" is not found. No action required.\"^\"\"; Exit 0; }; Write-Warning \"^\"\"Failed to revert changes to the service `\"^\"\"$serviceName`\"^\"\". The service is not found.\"^\"\"; Exit 1; }; <# -- 2. Enable or skip if already enabled #>; $startupType = $service.StartType <# Does not work before .NET 4.6.1 #>; if (!$startupType) { $startupType = (Get-WmiObject -Query \"^\"\"Select StartMode From Win32_Service Where Name='$serviceName'\"^\"\" -ErrorAction Ignore).StartMode; if (!$startupType) { $startupType = (Get-WmiObject -Class Win32_Service -Property StartMode -Filter \"^\"\"Name='$serviceName'\"^\"\" -ErrorAction Ignore).StartMode; }; }; if ($startupType -eq \"^\"\"$defaultStartupMode\"^\"\") { Write-Host \"^\"\"`\"^\"\"$serviceName`\"^\"\" has already expected startup mode: `\"^\"\"$defaultStartupMode`\"^\"\". No action required.\"^\"\"; } else { try { Set-Service -Name \"^\"\"$serviceName\"^\"\" -StartupType \"^\"\"$defaultStartupMode\"^\"\" -Confirm:$false -ErrorAction Stop; Write-Host \"^\"\"Reverted `\"^\"\"$serviceName`\"^\"\" with `\"^\"\"$defaultStartupMode`\"^\"\" start, this may require restarting your computer.\"^\"\"; } catch { Write-Error \"^\"\"Failed to enable `\"^\"\"$serviceName`\"^\"\": $_\"^\"\"; Exit 1; }; }; <# -- 4. Start if not running (must be enabled first) #>; if ($defaultStartupMode -eq 'Automatic' -or $defaultStartupMode -eq 'Boot' -or $defaultStartupMode -eq 'System') { if ($service.Status -ne [System.ServiceProcess.ServiceControllerStatus]::Running) { Write-Host \"^\"\"`\"^\"\"$serviceName`\"^\"\" is not running, starting it.\"^\"\"; try { Start-Service $serviceName -ErrorAction Stop; Write-Host \"^\"\"Started `\"^\"\"$serviceName`\"^\"\" successfully.\"^\"\"; } catch { Write-Warning \"^\"\"Failed to start `\"^\"\"$serviceName`\"^\"\", requires restart, it will be started after reboot.`r`n$_\"^\"\"; }; } else { Write-Host \"^\"\"`\"^\"\"$serviceName`\"^\"\" is already running, no need to start.\"^\"\"; }; }\"\nsc.exe config lanmanworkstation depend= bowser/mrxsmb20/nsi\n:: Delete the registry value \"HKLM\\SYSTEM\\CurrentControlSet\\Services\\LanmanServer\\Parameters!SMBv1\"\nPowerShell -ExecutionPolicy Unrestricted -Command \"reg delete 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\LanmanServer\\Parameters' /v 'SMBv1' /f 2>$null\"\n:: Suggest restarting computer for changes to take effect\nPowerShell -ExecutionPolicy Unrestricted -Command \"$message = 'For the changes to fully take effect, please restart your computer.'; $warn =  $false; if ($warn) { Write-Warning \"^\"\"$message\"^\"\"; } else { Write-Host \"^\"\"Note: \"^\"\" -ForegroundColor Blue -NoNewLine; Write-Output \"^\"\"$message\"^\"\"; }\""
Help
How to apply or restore "Disable insecure "SMBv1" protocol" using commands
- ≈ 2 min to complete
- Tools: Command Prompt
- Difficulty: Medium
- ≈ 3 instructions
- 1
Open Command Prompt
Open Command Prompt as Administrator. - 2
Copy code
Copy the code: - 3
Paste & run
Paste the commands into Command Prompt and press Enter to run.Some changes require a system restart to take effect
Similar Guides
Wider Goal
Guides below includes this guide to achieve a wider goal.See other more general settings that includes this one as one of its actions.
These plans combine multiple privacy settings, including this one, for stronger protection.
- Disable insecure protocols
- Disable insecure connections
- Improve network security
- Security improvements
This category focuses on enhancing user privacy by disabling legacy and insecure communication protocols. It targets protocols that expose users to security vulner...
This category includes scripts designed to enhance users' security and privacy by disabling outdated or vulnerable connections across the system. It safeguards dat...
This category is dedicated to improving network security. It aims to minimize vulnerabilities by offering various settings that improve the integrity and confident...
This category encompasses a range of scripts designed to improve the security of your system by enforcing security best practices. These scripts help protect your ...
Same Goal
Other guides in Disable insecure protocolsSee settings that are in the same category as this guide.
Using other actions in the same category may help you achieve your goal better.
About the Creators
These people have authored this documentation and written its scripts:
Reviewed By
This guide has undergone comprehensive auditing and peer review:Expert review by undergroundwires
- Verified technical accuracy and editorial standards
- Assessed system impact and user privacy risks
Public review by large community
- Privacy enthusiasts and professionals peer-reviewed
- Millions of end-users tested across different environments
History
We continually monitor our guides, their impact and all other privacy options. We update our guides when new information becomes available. On every update, we publicly store who made the change, what has been changed, why the change was made and when the change was made.