Solved

Enable File and Printer Sharing on all servers - is it a vulnerability?

Posted on 2016-12-01
6
81 Views
Last Modified: 2016-12-02
I was wondering if Enabling File and Printer Sharing on all servers is vulnerability?


The purpose of this is so that we can copy files btw servers. Do we need to enable it? What if we run Powershell script to copy files. Do we still need to turn File Printer sharing on?
0
Comment
Question by:creative555
6 Comments
 
LVL 92

Expert Comment

by:John Hurst
ID: 41909522
If you are properly secured, File and Print Sharing is not a security risk and there is no harm in using it.
0
 
LVL 17

Assisted Solution

by:Malmensa
Malmensa earned 250 total points
ID: 41909529
Well, yes, file and print services can be a vulnerability. Having said that, usual practice is to leave them enabled. I have seen site were a few servers have had these services blocked, SQL servers and machines in a DMZ.
0
 
LVL 92

Accepted Solution

by:
John Hurst earned 250 total points
ID: 41909532
F&P sharing is enabled on most all business computers and it is not causing issues. No more of a vulnerability than any other opening (port or connection, internet itself).
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 

Author Closing Comment

by:creative555
ID: 41909533
thank you!!
0
 
LVL 92

Expert Comment

by:John Hurst
ID: 41909534
You are very welcome and I was happy to help.
1
 
LVL 53

Expert Comment

by:McKnife
ID: 41910791
It is very astounding what recommendations are given here.
Of course we don't open up ports on servers if

A we don't have to since there are other ways
and
B we are worried about security

So my recommendation is not to enable file and printer sharing but use a file server for file exchange between servers instead.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now