Solved

Enable File and Printer Sharing on all servers - is it a vulnerability?

Posted on 2016-12-01
6
92 Views
Last Modified: 2016-12-02
I was wondering if Enabling File and Printer Sharing on all servers is vulnerability?


The purpose of this is so that we can copy files btw servers. Do we need to enable it? What if we run Powershell script to copy files. Do we still need to turn File Printer sharing on?
0
Comment
Question by:creative555
6 Comments
 
LVL 93

Expert Comment

by:John Hurst
ID: 41909522
If you are properly secured, File and Print Sharing is not a security risk and there is no harm in using it.
0
 
LVL 17

Assisted Solution

by:Malmensa
Malmensa earned 250 total points
ID: 41909529
Well, yes, file and print services can be a vulnerability. Having said that, usual practice is to leave them enabled. I have seen site were a few servers have had these services blocked, SQL servers and machines in a DMZ.
0
 
LVL 93

Accepted Solution

by:
John Hurst earned 250 total points
ID: 41909532
F&P sharing is enabled on most all business computers and it is not causing issues. No more of a vulnerability than any other opening (port or connection, internet itself).
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Closing Comment

by:creative555
ID: 41909533
thank you!!
0
 
LVL 93

Expert Comment

by:John Hurst
ID: 41909534
You are very welcome and I was happy to help.
1
 
LVL 54

Expert Comment

by:McKnife
ID: 41910791
It is very astounding what recommendations are given here.
Of course we don't open up ports on servers if

A we don't have to since there are other ways
and
B we are worried about security

So my recommendation is not to enable file and printer sharing but use a file server for file exchange between servers instead.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question