关于防火墙封禁445端口的批处理文件的问题
是这样子的,病毒爆发后省里周六晚上就通过微信给发了个所谓的“勒索病毒一键加固”文件,然后领导昨天就通过OA转发下去了,昨天今天不少人用了,副作用除了共享文件没法用,就是共享打印机也没法用了,打印机没法用对办公造成了挺大的影响。然后看了下批处理文件里面主要就是
:WIN7
net stop server /Y > nul
sc config lanmanserver start= disabled
netsh advfirewall set currentprofile state on > nul
netsh advfirewall firewall add rule name="DenyEquationTCP" dir=in action=block localport=445 remoteip=any protocol=tcp > nul
netsh advfirewall firewall add rule name="DenyEquationUDP" dir=in action=block localport=445 remoteip=any protocol=udp > nul
echo ---------------------------------------------------------------------------------
echo *Windows 7系统加固命令执行完毕!
echo .
pause
goto NSFOCUSXA
这样的封禁445端口之类的操作,请问下如果想弄个批处理进行反向操作,开启445端口、开启SERVER服务这些,语句应该怎么改改?
netsh advfirewall firewall delete rule name="DenyEquationTCP" dir=in action=block localport=445 remoteip=any protocol=tcp > nul
试试 如何测试445端口打开了没有? sc config lanmanserver start= auto
netsh advfirewall firewall delete rule name="DenyEquationTCP"
netsh advfirewall firewall delete rule name="DenyEquationUDP"
前面着急没仔细看就上论坛问了,刚刚看了下都是很简单的操作…… add 改 delete 就可以真是简单粗暴。。
页:
[1]