FYI...

Microsoft SMBv1 Vulnerability
- https://www.us-cert.gov/ncas/current...-Vulnerability
March 16, 2017 - "Microsoft has released a security update to address a vulnerability in implementations of Server Message Block 1.0 (SMBv1). Exploitation of this vulnerability could allow a remote attacker to take control of an affected system. US-CERT encourages users and administrators to review Microsoft Security Bulletin MS17-010* and apply the update. For more information, see the Information Assurance Advisory** and US-CERT's SMB Security Best Practices guidance***."
* https://technet.microsoft.com/library/security/MS17-010
March 14, 2017
** https://www.iad.gov/iad/library/ia-a...-block-1-0.cfm
16 March 2017
*** https://www.us-cert.gov/ncas/current...Best-Practices
Last revised: March 16, 2017
___

- https://www.us-cert.gov/ncas/current...Best-Practices
Last revised: March 16, 2017 - "In response to public reporting of a potential Server Message Block (SMB) vulnerability, US-CERT is providing known best practices related to SMB. This service is universally available for Windows systems, and legacy versions of SMB protocols could allow a remote attacker to obtain sensitive information from affected systems. US-CERT recommends that users and administrators consider:
disabling SMBv1 and
blocking all versions of SMB at the network boundary by blocking TCP port 445 with related protocols on UDP ports 137-138 and TCP port 139, for all boundary devices.
US-CERT cautions users and administrators that disabling or blocking SMB may create problems by obstructing access to shared files, data, or devices. The benefits of mitigation should be weighed against potential disruptions to users. For more information on SMB, please review Microsoft Security Advisories 2696547* and 204279**."
* https://support.microsoft.com/en-us/kb/2696547
Feb 28, 2017 - Rev: 23
** https://support.microsoft.com/en-us/kb/204279
Jan 7, 2008 - Rev: 1