I am sure that some people have been dealing with this recent security issue regarding disabling SMBv1.
Further details here:
Apparently this is now fixed by installing a Windows patch detailed in this Technet article (published March 14 2017):
However, I have noticed that even after installing this patch, a vulnerability scan on a test server is still reporting this vulnerability. If I perform the manual reg key fix (detailed here: https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1,-smbv2,-and-smbv3-in-windows-vista,-windows-server-2008,-windows-7,-windows-server-2008-r2,-windows-8,-and-windows-server-2012
) the vulnerability scan reports that the vulnerability has been removed.
My question is, does the Windows security patch detailed in article MS17-010 truly fix the issue? Does my vulnerability scan just need to update to realise that this patch resolves the issue (I dont think that an update has been available since Microsoft released this patch)?