2016年7月12日 星期二

Disables NETBIOS communication outside of local subnet

Implement workarounds from https://support.microsoft.com/en-us/kb/3165191

After you install this security update, the following changes are applied:

•NETBIOS communication outside of the local subnet is hardened. Therefore, by default, some features that depend on NETBIOS (such as SMB over NETBIOS) will not work outside the local subnet. To change this new default behavior, create the following registry entry:

SUBKEY: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters
Value Name: AllowNBToInternet
Type: Dword
Value: 1
Default value of the flag: 0

• By default, WPAD resolution for auto proxy detection will not use NETBIOS. Therefore, if proxy detection depends on NETBIOS alone for WPAD resolution, it may fail. We recommend that you use the DHCP option or DNS for WPAD resolution instead of NETBIOS. To change this new default behavior, create the following registry entry.

Note This registry entry only applies for Windows 8.1 and earlier versions of Windows.
SUBKEY: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp
Value Name: AllowOnlyDNSQueryForWPAD
Type: DWORD
Value: 0
Default value of the flag: 1

•The default behavior of PAC file download is changed so that the client's domain credentials are not automatically sent in response to an NTLM or Negotiate Authentication challenge when WinHTTP requests the PAC file. This occurs regardless of the value of the fAutoLogonIfChallenged flag that is specified in WINHTTP_AUTOPROXY_OPTIONS. To change this new default behavior, create the following registry entry:

Note This registry entry only applies for Windows 8.1 and earlier versions of Windows. SUBKEY: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\WinHttp
Value Name: AutoProxyAutoLogonIfChallenged
Type: DWORD
Value: 1
Default value of the flag: 0

沒有留言:

張貼留言