Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


closing ports 135 (msrpc) & 139 (netbios-ssn)

Posted on 2004-10-02
Medium Priority
Last Modified: 2013-12-04
According to nmap, the following ports are open on my computer:

135/tcp  open     msrpc
139/tcp  open     netbios-ssn

My understanding is the msrpc is the server that formerly was vulnerable to the msblast worm, so I'd like to disable it. I probalby don't need it open, right? How can this be done?

Also, is there a reason not to disable the netbios-ssn process? If so, how can I stop the process from running?

Question by:bobwood2000
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2

Expert Comment

ID: 12210155
You can prevent these ports from being exploited by simply running a firewall such as Zone Alarm (http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp).  They will block any TCP port 135/139 traffic.  

Author Comment

ID: 12210681
I don't want to use a firewall.

Expert Comment

ID: 12213417
Try disabling the file & Printer sharing
Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.


Author Comment

ID: 12214979
I disabled file & printer sharing, but the ports remain open.

Accepted Solution

dev8 earned 1000 total points
ID: 12217378

Author Comment

ID: 12218064
Thank you.

Featured Post

Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

597 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question