Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

How to keep NetBIOS functionality but disable its broadcast messages

Posted on 2009-04-08
4
329 Views
Last Modified: 2013-11-25
One piece of software that I use requires that NetBIOS be enabled as part of its product licensing validation. Since enabling this setting I am seeing broadcast messages in my firewall logs on the NetBIOS port. Is there a way to disable the broadcast messages produced by NetBIOS without losing any functionality that I may need on the local computer?
0
Comment
Question by:kmsterling
4 Comments
 
LVL 57

Accepted Solution

by:
giltjr earned 50 total points
ID: 24106192
No, not really.  The NETBIOS broadcast is basic function of NETBIOS.  Even with WINS enabled, broadcast is still requires.   Broadcast is how NETBIOS lets the rest of the world know that it is there and how it finds out who is where if WINS and or DNS fail.

The closest you could try and do is install a personal firewall and block the broadcasts.  However, my guess is that you could break the software product that requires NETBIOS.  It could be that it is counting on the broadcasts for something.
0
 
LVL 4

Expert Comment

by:dj_relentless
ID: 24113565
But you can set the node type to peer 2 peer only to limit broadcast. It will require a wins server though.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question