Since the EternalBlue disclosure, there been WannaCry, Petya and now Defcon released yet another way to exploit SMBv1 (SMBLoris), information here.

I wanted to “map” every PC on my job network which represents many computers. Since my Powershell scripting isn’t the best around I figured it was a good exercise. Here’s a little script that scan every computer from your active directory and disable SMBv1 making sure that SMBv2 is enable

Find my script Here

Also note that this method is far from being the best, managing your Active Directory with GPO is far more effective.