Ensure there is no unrestricted inbound access to TCP port 3020 (SMB / CIFS)

Security & Compliance

TCP port 3020 is commonly used for SMB (Server Message Block) / CIFS (Common Internet File System) traffic, which is used for file and printer sharing in Windows-based networks. Unrestricted inbound access to this port could potentially allow an attacker to gain unauthorized access to sensitive files and data stored on the network.


To ensure there is no unrestricted inbound access to TCP port 3020, you should take the following remediation steps:

  1. Review your firewall rules and access control lists to identify any rules that allow unrestricted inbound access to port 3020.
  2. Modify those rules to restrict access to only the necessary IP addresses, subnets, or VPN connections.
  3. If the server is publicly accessible, consider implementing additional security measures such as two-factor authentication, SSL/TLS encryption, or a web application firewall.
  4. Regularly review and update your firewall rules and access control lists to ensure they continue to meet your security needs and address any new threats or vulnerabilities.
  5. Monitor your network traffic and logs for any suspicious activity related to port 3020, and investigate any anomalies promptly.
Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.