Disables NetBIOS over TCP/IP on all network interfaces to reduce attack surface and prevent name resolution attacks
This Automox Worklet™ disables NetBIOS over TCP/IP for all IPv4 network interfaces on Windows endpoints. NetBIOS is a legacy networking protocol that provides name resolution and session services, but it introduces security vulnerabilities in modern environments. The Worklet configures the NetbiosOptions registry value to completely disable NetBIOS functionality.
The Worklet modifies the registry at HKLM:\SYSTEM\CurrentControlSet\Services\NetBT\Parameters\Interfaces\ to set NetbiosOptions to 2 (disabled) for each network adapter. This differs from value 0 (use DHCP setting) or value 1 (enabled), which leave NetBIOS active and vulnerable to attacks.
The configuration applies to all network adapters simultaneously, including Ethernet, Wi-Fi, and virtual adapters. This comprehensive approach prevents gaps where some interfaces might remain vulnerable while others are protected.
NetBIOS Name Service (NBT-NS) is vulnerable to the same poisoning attacks as LLMNR. Attackers use tools like Responder to intercept NBT-NS broadcasts and capture NTLM authentication hashes. Disabling NetBIOS eliminates this attack vector and forces name resolution through DNS, which provides better security and auditing capabilities.
Modern Windows networks rarely require NetBIOS for legitimate operations. Active Directory environments use DNS for name resolution, and SMB file sharing works without NetBIOS when properly configured. Disabling NetBIOS also reduces broadcast traffic on the network and improves overall network efficiency.
CIS Benchmarks recommend disabling NetBIOS as a security hardening measure. The protocol lacks authentication mechanisms, making it trivially exploitable. Organizations pursuing compliance with security frameworks should disable both LLMNR and NetBIOS to fully protect against local name resolution attacks.
Evaluation phase: The Worklet iterates through all subkeys under HKLM:\SYSTEM\CurrentControlSet\Services\NetBT\Parameters\Interfaces\ and checks the NetbiosOptions value for each network adapter. If any adapter has a value other than 2 (disabled), or if the value is missing, the endpoint requires remediation.
Remediation phase: The Worklet opens each network interface subkey with write permissions and sets the NetbiosOptions DWORD value to 2. This operation repeats for every network adapter on the endpoint, applying the setting regardless of adapter type. The change takes effect immediately without requiring a reboot.
Windows 7 or later, Windows Server 2008 R2 or later
Administrative privileges to modify HKLM registry
No legacy applications that depend on NetBIOS name resolution
Functioning DNS infrastructure for name resolution services
After remediation, the endpoint stops listening on UDP port 137 (NetBIOS Name Service) and UDP port 138 (NetBIOS Datagram Service). You can verify the change by checking the service status or configuration settings. Name resolution requests route exclusively through DNS. File sharing and other network services continue to function using DNS names or IP addresses.
You can verify the configuration by running nbtstat -n which should show no registered NetBIOS names. You can also check each adapter's properties in Network Connections, where NetBIOS over TCP/IP should show as Disabled. Consider disabling LLMNR alongside NetBIOS for complete protection against local name resolution poisoning attacks.
Run this Worklet on a pilot Windows endpoint and review evaluation output for disable netbios over tcp/ip.
Confirm Automox activity logs show successful completion and exit code 0.
Verify endpoint state using checks aligned to evaluation script logic, such as Test-Registry, Write-Verbose, Write-Error.
Validate remediation effects from script operations such as Test-Registry, Write-Verbose, Write-Error, then rerun evaluation for compliance.


By submitting this form you agree to our Master Services Agreement and Privacy Policy.
Already have an account? Log in
Consider Worklets your easy button
A Worklet is an automation script, written in Bash or PowerShell, designed for seamless execution on endpoints – at scale – within the Automox platform. Worklet automation scripts perform configuration, remediation, and the installation or removal of applications and settings across Windows, macOS, and Linux.

AUTOMOX + WORKLETS™
Uncover new possibilities with simple, powerful automation.
By submitting this form you agree to our Master Services Agreement and Privacy Policy