Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted access on TCP port 445 in order to protect against attackers that use brute force methods to gain access to Azure virtual machines associated with these NSGs. Common Internet File System (CIFS) port 445 is used by client/server applications to provide shared access to files, printers, and communications between network nodes directly over TCP (without NetBIOS) in Microsoft Windows Server 2003 and later. CIFS is based on the enhanced version of Server Message Block (SMB) protocol for internet/intranet file sharing, developed by Microsoft.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Allowing unrestricted access to your Azure virtual machines (VMs) via network security groups (NSGs) can increase opportunities for malicious activities such as ransomware attacks, Man-in-the-Middle (MITM) and Denial of Service (DoS) attacks.
Audit
To determine if your Azure network security groups allow unrestricted access on TCP ports 445, perform the following actions:
Remediation / Resolution
To update your Azure NSG rule(s) configuration in order to restrict CIFS access to trusted entities only, such as admin IP addresses or IP ranges, perform the following actions:
References
- Azure Official Documentation
- Azure network security overview
- Network security groups
- Create, change, or delete a network security group
- Azure best practices for network security
- Azure PowerShell Documentation
- az mysql server
- az network nsg list
- az network nsg rule list
- az network nsg rule update