Edit

Share via


Network share configuration assessment

Note

The Vulnerability Management section in the Microsoft Defender portal is now located under Exposure management. With this change, you can now consume and manage security exposure data and vulnerability data in a unified location, to enhance your existing Vulnerability Management features. Learn more.

These changes are relevant for Preview customers (Microsoft Defender XDR + Microsoft Defender for Identity preview option).

Note

To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.

The ability to share files and folders over a network allows users to provide access to resources like files, documents, and media to other people on the network. As network shares can be easily accessed by network users, some common weaknesses exist that can cause network shares to be vulnerable.

When vulnerable network share configurations are identified, they're mapped to actionable security recommendations in the Security recommendations page. The following recommendations can help protect against vulnerabilities in network shares that could be exploited by attackers:

  • Disallow offline access to shares
  • Remove shares from the root folder
  • Remove share write permission set to 'Everyone'
  • Set folder enumeration for shares

Tip

Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to sign up for a free trial.

Find information about exposed network shares

To see security recommendations addressing network share configurations:

  1. In the Microsoft Defender portal, do one of the following:

    • If you're a Microsoft Defender XDR + Microsoft Defender for Identity preview customer, select Exposure management > Recommendations.
    • If you're an existing customer, select Endpoints > Vulnerability management > Recommendations.
  2. Select Filters and choose Related component > OS > Shares.

    Options for filtering on network shares

  3. Select Apply.

If there are network shares with vulnerabilities to address, they'll appear in the list of recommendations.

Network shares configuration recommendations

Select a recommendation to see a flyout pane with information on the vulnerable network share configuration:

Network shares configuration recommendation details

Explore the Exposed devices and Exposed shares tabs for details of the exposed entities in your organization.

Request remediation for the network share configuration

You can view and submit a remediation request from the remediation options tab:

Network shares configuration remediation options

View configuration remediation activities

In the Remediation page, filter by the remediation type, "configuration change" to see the activity item related to this change.