General/Technical Documentation
Intended Audience: Helpdesk and ITCs
Purpose
This article provides a tiered troubleshooting framework for Helpdesk technicians and IT Coordinators to verify, force, and diagnose SMB signing compliance following the NIST CSF security enforcement.
General Information
Helpdesk - Basic Troubleshooting
Personnel: Helpdesk Technicians
Goal: Verify the workstation policy and refresh it if missing.
Step 1: Check Policy Status
- Open PowerShell as Administrator and copy/paste this exact command:
Get-SmbClientConfiguration | Select-Object RequireSecuritySignature
- If it says True: The workstation is configured correctly. STOP. Do not proceed to Step 2. If the user still has issues, gather the Computer Name and route the ticket to the Departmental ITC.
- If it says False: The workstation is missing the security update. Proceed to Step 2.
Step 2: Force Policy Refresh
- In the same window, copy and paste:

- Restart the computer. A reboot is required for SMB changes to take effect.
- Rerun Step 1 (
Get-SmbClientConfiguration | Select-Object RequireSecuritySignature) to verify if the value changed to True.
- If the issue persists after the reboot, gather the Computer Name and route the ticket to the Departmental ITC.
ITC - Advanced Diagnostics
Personnel: Departmental IT Coordinators (ITCs)
Goal: To be used when a workstation is confirmed "True" in Tier 1 but still cannot connect to a specific server or device.
A. Verify Departmental Server Settings
Servers must have both the Client and Server SMB signing requirements enabled. Run these on the Server using PowerShell as Administrator:
PowerShell
# Verify Server-side enforcement
Get-SmbServerConfiguration | Select-Object RequireSecuritySignature
# Verify Client-side enforcement (for outbound server traffic)
Get-SmbClientConfiguration | Select-Object RequireSecuritySignature
B. Check the Live Connection & SMB Version
Run this on the Workstation using PowerShell as Administrator while the user attempts to access the share:
PowerShell
Get-SmbConnection | Select-Object ServerName, Signed, Dialect
How to Interpret the "Dialect" (SMB Version):
C. Manual Force Commands (Outliers Only)
If a machine is not taking the GPO, the ITC can force it manually. Note: Both of the following commands must be run as Administrator in PowerShell.
Force Client-Side (Workstations):
PowerShell
Set-SmbClientConfiguration -EnableSecuritySignature $true -RequireSecuritySignature $true -Force
Force Server-Side (Departmental Servers):
PowerShell
Set-SmbServerConfiguration -EnableSecuritySignature $true -RequireSecuritySignature $true -Force
Escalation Requirements
If the ITC cannot resolve the issue using the Tier 2 diagnostics, escalate to CIS or IT Security with the following:
-
Computer Name and IP Address.
-
Physical Location (Building/Room).
-
Primary Contact/Owner for the equipment.
-
PowerShell Results from the Get-SmbConnection command (must be run as Administrator).
Technical Reference(s)
Some contextual information about the links so as not to waste users time clicking something they don't need.