How can I safely disable old TLS/SSL cipher suites on my SMB file server?

0
7
Asked By TechieGuru88 On

I'm looking to disable older, vulnerable TLS/SSL cipher suites on my SMB file server. I've read that SMB 3 doesn't use Schannel since it has its own encryption stack, so disabling these older ciphers shouldn't affect access to file shares. Has anyone here had experience doing this?

4 Answers

Answered By CiphersMaster On

It's smart to remove any cipher suites that aren't used. You might want to analyze your traffic to identify the ciphers in use before making changes. My experience, however, is that if there's an old machine connecting that hasn't been updated, it could be relying on those outdated ciphers.

Answered By NetNinja42 On

You're right, SMB doesn't utilize Schannel. This means removing old ciphers is logical since they aren't even used. Just ensure that your network doesn’t have any older machines that might still be attempting to connect using outdated protocols.

CuriousTechie -

Could you link to any specific Microsoft documentation on this? I'm having trouble finding detailed info.

Answered By ServerWhisperer On

I recommend using IIS Crypto for managing your cipher suites. It's a handy tool that simplifies the process of enabling or disabling them. Just be sure to verify that none of your active sessions rely on the ciphers you're planning to turn off.

Answered By SafetyFirst99 On

I hear you on the need for caution. If your group policy is already enforcing SMB 3 and everyone is on it, that's a good start. Be careful, though! The server is handling different workloads, and any downtime should definitely be avoided. Just proceed methodically.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.