Symptom
- The system gets enabled, but does not require SMB signing, The SMB signing allows the recipient of SMB packets to confirm their authenticity and helps prevent man in the middle attacks against SMB.
- SMB 2.x signing can be configured in one of two ways: not required (least secure) and required (most secure)
Read more...
Environment
SAP BusinessObjects Business Intelligence Platform/BI (4.x)
OS: Windows
Product
SAP BusinessObjects Business Intelligence platform 4.3
Keywords
SMB, Vulnerability, Configuration, 4.2, 4.2, BI, BO, SMB 2.X, Packets , KBA , BI-BIP-SEC , Security Vulnerabilities in SAP BusinessObjects , BI-BIP-DEP , Webapp Deployment, Networking, Vulnerabilities, Webservices , Known Error
About this page
This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.