More Info:

Ensure that no network security groups allow unrestricted inbound access on TCP port 139 and UDP ports 137 and 138 (NetBIOS).

Risk Level

High

Address

Security

Compliance Standards

HIPAA, NIST, HITRUST, GDPR, SOC2, NISTCSF, PCIDSS, FedRAMP

Triage and Remediation

Remediation

Here are the step-by-step instructions to remediate the Unrestricted Netbios Access misconfiguration in Azure:

  1. Log in to the Azure portal.
  2. Go to the “Virtual networks” page.
  3. Select the virtual network that you want to remediate.
  4. Click on the “Subnets” option in the left-hand menu.
  5. Select the subnet that you want to remediate.
  6. Click on the “Network security group” option in the left-hand menu.
  7. Click on the “Edit” button to edit the network security group associated with the subnet.
  8. Click on the “Inbound security rules” option in the left-hand menu.
  9. Find the rule that allows unrestricted NetBIOS access.
  10. Click on the rule to select it.
  11. Click on the “Delete” button to delete the rule.
  12. Click on the “Save” button to save the changes.

By following these steps, you have successfully remediated the Unrestricted Netbios Access misconfiguration in Azure.