Microsoft has posted a listing of products that still require SMBv1 on their Storage Blog in an effort to help Admins identify potential issues/workarounds as they go about disabling SMBv1 in their environments. Microsoft will continue to update the page as more vendor products are identified.
As a reminder, local Admins should disable SMBv1 at their sites as soon as possible by adding computers to the “IGSGBWTST Computers Disable SMB 1″ security group in ADUC and linking the “DI – BWTST Disable SMB 1.0″ GPO locally for testing. On 6/28/2017, local links will be removed and this GPO will be applied to the top of the domain. Please refer to the email with subject “[ACTION] Remediating SMB 1.0 ,3DES Cipher, and Powershell 2.0 on Windows Systems” sent to IT All on 04/21/2017 for more details.