活动:一次性充值满500元,云服务器、虚拟主机产品8折特惠! 全国免费咨询热线:℡ 400-9918-136
帮助和公告

感谢您的关注,我们一直致力于为您提供放心、满意的服务。

优惠活动香港云服务器,免备案在线开通,预装宝塔(bt)面板,独享15M带宽,赠送DDOS防护,免费技术支持,代理低至6折,仅需48元/月!
返回首页

Windows 2008 r2 关闭勒索病毒传播利用端口445/138/139/137

信息来源:亿速互联修改时间:2019/12/18 15:18:28

windows 2008 r2系统 运行中输入以下命令:(逐行输入后回车确定)

为了保险起见,相关端口的tcp/udp协议全部封掉。

--------------------------------------------------------------------------------------------

netsh advfirewall set allprofiles state on (启用系统防火墙)

netsh advfirewall firewall add rule name=”deny tcp 445” dir=in protocol=tcp localport=445 action=block (关闭445端口)

netsh advfirewall firewall add rule name=”deny tcp 139” dir=in protocol=tcp localport=139 action=block (关闭139 tcp端口)

netsh advfirewall firewall add rule name=”deny udp 139” dir=in protocol=udp localport=139 action=block (关闭139 udp端口)

netsh advfirewall firewall add rule name=”deny tcp 138” dir=in protocol=tcp localport=138 action=block (关闭138 tcp端口)

netsh advfirewall firewall add rule name=”deny dup 138” dir=in protocol=udp localport=138 action=block (关闭138 udp端口)

netsh advfirewall firewall add rule name=”deny tcp 135” dir=in protocol=tcp localport=135 action=block (关闭135 tcp端口)

netsh advfirewall firewall add rule name=”deny udp 135” dir=in protocol=udp localport=135 action=block (关闭135 udp端口)

netsh advfirewall firewall add rule name=”deny tcp 137” dir=in protocol=tcp localport=137 action=block (关闭137 tcp端口)

netsh advfirewall firewall add rule name=”deny udp 137” dir=in protocol=udp localport=137 action=block (关闭137 udp端口)

以下是近期更新的内容