Article Details
Scrape Timestamp (UTC): 2023-10-25 18:37:39.111
Original Article Text
Click to Toggle View
Windows 11 to let admins mandate SMB encryption for outbound connections. Windows 11 will let admins mandate SMB client encryption for all outbound connections, starting with today's Windows 11 Insider Preview Build 25982 rolling out to Insiders in the Canary Channel. SMB encryption provides data end-to-end encryption and can be enabled on a per-share basis for the entire file server or when mapping drives using Windows Admin Center, Windows PowerShell, or UNC Hardening. This capability was first included with SMB 3.0 on Windows 8 and Windows Server 2012, and it introduced support for AES-256-GCM cryptographic suites with Windows 11 and Windows Server 2022. By requiring that all destination servers support SMB 3.x and encryption, Windows admins can ensure that the clients can only establish a connection if these conditions are met to defend against eavesdropping and interception attacks. "You can now also configure the SMB client to always require encryption, no matter what the server, share, UNC hardening, or a mapped drive requires," said Microsoft Principal Program Manager Ned Pyle. "This means an administrator can globally force a Windows machine to use SMB encryption – and therefore SMB 3.x – on all connections and refuse to connect if the SMB server does not support either." The new option can be configured using PowerShell or the 'Require encryption' group policy under Computer Configuration \ Administrative Templates \ Network \ Lanman Workstation. Starting with Windows 11 Insider Preview Build 25951, admins can configure Windows systems to automatically block sending NTLM data over SMB on remote outbound connections to fend off pass-the-hash, NTLM relay, or password-cracking attacks. When toggled on, it prevents the user's hashed password from being sent to remote servers, effectively thwarting these attacks. With the release of Windows 11 Insider Preview Build 25381 to the Canary Channel, Microsoft also began requiring SMB signing (aka security signatures) by default for all connections to defend against NTLM relay attacks. SMB signing, introduced in Windows 98 and 2000, has been updated in Windows 11 and Windows Server 2022 to enhance protection and performance by significantly increasing data encryption speeds. "SMB encryption has performance overhead and compatibility overhead, and you should balance that against SMB signing - which has better performance and tamper protection but no snooping protection – or against no use of encryption or signing at all, which has best performance but no security," Pyle said. "SMB encryption supersedes SMB signing and supplies the same level of tamper protection, meaning that if your SMC client requires signing, SMB encryption turns it off; there is no point requiring both because encryption wins." These improvements are part of a broader effort to bolster the security of Windows and Windows Server, as underscored by earlier announcements from last year. In April 2022, Microsoft marked a milestone by revealing the final phase of disabling the decades-old SMB1 file-sharing protocol for Windows 11 Home Insiders. Building on this progress, the company also strengthened defenses against brute-force attacks by introducing an SMB authentication rate limiter, which mitigates the impact of unsuccessful inbound NTLM authentication attempts.
Daily Brief Summary
Windows 11, from Insider Preview Build 25982, will allow administrators to mandate Server Message Block (SMB) encryption for all outbound connections.
The new feature enhances security by preventing users from establishing connections if the destination server does not support SMB 3.x encryption and SMB 3.x, thus protecting against interception and eavesdropping attacks.
The encryption setting can be configured through PowerShell or the 'Require encryption' group policy, and the feature has been expanded to not rely solely on server, share, or mapped drive requirements.
Additions in the Windows 11 Insider Preview Build 25951 allow admins to configure systems to automatically block sending NTLM data over remote outbound SMB connections, safeguarding against password-cracking, NTLM relay, and pass-the-hash attacks.
These updates to SMB encryption are part of Microsoft's broader efforts to bolster cybersecurity, including disabling of the SMB1 file-sharing protocol and the introduction of an SMB authentication rate limiter.