Assumptions have been made and statements were issued.
"Malicious users can use the Server Message Block (SMB) protocol for malicious purposes. Firewall best practices and firewall configurations can enhance network security by helping to prevent potentially malicious traffic from crossing the enterprise perimeter"
After hours and hours of doing logical analysis of these amazing sentences, I have found that they all reduce to "TRUE". My paper will be in the next issues of "Letters in Microsoftian Logic and Content-Freedom".