• 确博日记
  • 工作时间:09:30 pm-06:24 pm

Windows 2008 r2 关闭勒索病毒传播利用端口445/138/139/137

windows 2008 r2系统 运行中输入以下命令:(逐行输入后回车确定)

为了保险起见,相关端口的tcp/udp协议全部封掉。

--------------------------------------------------------------------------------------------

netsh advfirewall set allprofiles state on (启用系统防火墙)

netsh advfirewall firewall add rule name=”deny tcp 445” dir=in protocol=tcp localport=445 action=block (关闭445端口)

netsh advfirewall firewall add rule name=”deny tcp 139” dir=in protocol=tcp localport=139 action=block (关闭139 tcp端口)

netsh advfirewall firewall add rule name=”deny udp 139” dir=in protocol=udp localport=139 action=block (关闭139 udp端口)

netsh advfirewall firewall add rule name=”deny tcp 138” dir=in protocol=tcp localport=138 action=block (关闭138 tcp端口)

netsh advfirewall firewall add rule name=”deny dup 138” dir=in protocol=udp localport=138 action=block (关闭138 udp端口)

netsh advfirewall firewall add rule name=”deny tcp 135” dir=in protocol=tcp localport=135 action=block (关闭135 tcp端口)

netsh advfirewall firewall add rule name=”deny udp 135” dir=in protocol=udp localport=135 action=block (关闭135 udp端口)

netsh advfirewall firewall add rule name=”deny tcp 137” dir=in protocol=tcp localport=137 action=block (关闭137 tcp端口)

netsh advfirewall firewall add rule name=”deny udp 137” dir=in protocol=udp localport=137 action=block (关闭137 udp端口)

  • 在线列表
    1589813