SMB: Denial of service detection should be enabled
Updated: November 17, 2010
Applies To: Windows Server 2008 R2
This topic is intended to address a specific issue identified by a Best Practices Analyzer scan. You should apply the information in this topic only to computers that have had the File Services Best Practices Analyzer run against them and are experiencing the issue addressed by this topic. For more information about best practices and scans, see Best Practices Analyzer.
Operating System |
Windows Server 2008 R2 |
Product/Feature |
File Services |
Severity |
Warning |
Category |
Security |
Issue
Denial of service detection for the Server service is disabled.
Impact
The server will not be able to detect patterns of Server Message Block (SMB)-based communications that indicate that a malicious user is attempting a denial of service attack.
Resolution
If appropriate for your environment, use Registry Editor to enable denial of service detection.
Membership in the local Administrators group, or equivalent, is the minimum required to complete this procedure.
To enable denial of service detection
Click Start, click Run, type regedit, and click OK.
Locate and then click to select the following registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters.
If the DisableDos parameter does not exist proceed to the next step.
On the Edit menu, point to New, and then click DWORD Value.
Type DisableDos, and then press ENTER.
Right-click DisableDos and click Modify.
In the Value data box type 00000000 and click OK.