Microsoft published information regarding a vulnerability related to Netlogon and elevation of privilege, which is covered by CVE-2020-1472.
The patches highlighted are the standard monthly patches (monthly rollups, security-only bundles, cumulative updates, etc.), but according to the FAQ section of the CVE page, there are additional steps required to protect from the vulnerability.
The impact of this patch is that shares can not be accessed from their IP, only with hostname with some limitations.
Solution
Step 1: Check DNS record
From Windows go to DNS Manager and check the "Forward Lookup Zones" for your domain.If you have an entry with the hostname assigned to the IP it is fine, if its not assigned, you have to generate a new entry.
Step 2: Modify Local Group Policy
Invoke gpedit.msc
Go to Computer Management > Windows Settings > Security Settings > Local Policies > Security Options
Find "Domain Controller: Allow vulnerable Netlogon secure channel connections".
Right click and choose Properties.
From Properties, Edit Security and click Add
Modify Object Types by leaving selection only for Computers
To conclude, insert for you hostname, Check Names and press OK
This procedure should be applied for every Syneto machine where SMB shares are stored.
Also this procedure can be applied for versions 2012, 2016 and 2019 of Windows Server.