/
/

How to Enable or Disable the SMB Client Encryption Requirement in Windows 11

by Raine Grey, Technical Writer
How to Enable or Disable the SMB Client Encryption Requirement in Windows 11 blog banner image

SMB (Server Message Block) is a core protocol used by Windows systems to share files, printers, and serial ports over a network. Essentially, it’s a client-server protocol where you (the client) request access to files or other resources on a server, and the server responds by providing the requested access.

As you can imagine, this may be a security vulnerability, especially in managed IT environments. The SMB Encrypt Required setting in Windows 11 enforces encryption for all outbound SMB client connections. This feature allows IT admins to guarantee that sensitive data is protected from snooping and interception, particularly on untrusted or public networks.

📌 Recommended deployment strategies:

Click to Choose a Method

💻 Best for Individual Users

💻💻💻 Best for Enterprises

Method 1: Using PowerShell
Method 2: Using Group Policy
Method 3: Using Registry Editor
Method 4: .reg file example

Methods on How to configure SMB encryption

Method 1: Using PowerShell (recommended)

📌 Use Cases: Ideal for scripted deployments, manual configurations, or remote administration

📌 Prerequisites: 

  • You must have admin privileges.
  • This requires SMB v.3.0+ versions on both client and server.
  • PowerShell execution policy must allow running commands/scripts.
  • Restart is not typically required, but it is a good practice after a change.
  • We recommend signing up for this free crash course, PowerShell for IT Ninjas.

Steps: 

  1. Open an elevated PowerShell.
  2. Execute the following commands:

To enable required SMB client encryption:

Set-SmbClientConfiguration -RequireSecuritySignature $true -RequireEncryption $true

To disable required SMB client encryption:

Set-SmbClientConfiguration -RequireEncryption $false

To verify your current configuration:

Get-SmbClientConfiguration

Look for the RequireEncryption field in the output to confirm whether encryption is currently required.

Method 2: Using Group Policy (enterprise deployment)

📌 Use Cases: Best for enterprise-scale deployments across multiple domain-joined systems.

📌 Prerequisites: 

  • Domain-joined machine.
  • Admin access to Group Policy Editor.
  • Systems must support Group Policy enforcement.
  • SMB v.3.0+ required.

Steps:

  1. Press Win + R, type gpedit.msc, and click Enter.
  2. Go to: Computer Configuration > Administrative Templates > Network > Lanman Workstation
  3. (Optional) Double-click Enable insecure guest logons and set it to Disabled to harden SMB security.
  4. Then, locate Encrypt all SMB client connections and double-click it.
    • Set it to Enabled to enforce encryption for all client connections.
    • Set it to Disabled or Not Configured to allow unencrypted connections.
  5. Click Ok and apply the changes.
  6. Open an elevated Command Prompt and run gpudate /force for the policy to take effect immediately. Alternatively, you can restart your computer.

Method 3: Using Registry Editor

📌 Use Cases: Suitable for manual overrides, offline environments, or environments without Group Policy access.

📌 Prerequisites: 

  • You must have admin privileges.
  • It’s preferable if you have Registry Editing experience.
  • SMB version 3.0+
  • We recommend backing up your registry before proceeding. Incorrect configurations can lead to system instability.

Steps: 

  1. Press Win + R, type regedit, and click Enter.
  2. Navigate to the following key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters
  3. Create or modify the RequireEncryption DWORD (32-bit) value:
    • Set the value to 1 to require encryption.
    • Set the value to 0 to disable the requirement (default).
  4. To apply the changes, restart your computer.

Method 4: .reg file example

📌 Use Cases: Ideal for simple deployments where scripting is not required but automation is still beneficial.

📌 Prerequisites: 

  • Requires admin privileges.
  • The user must have permission to merge .reg files.
  • Manula restart or sign-out/in is needed to apply changes.
  • We recommend backing up your registry before proceeding. Incorrect configurations can lead to system instability.

Steps:

Enable encryption

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters]

“RequireEncryption”=dword:00000001

Disable encryption

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters]

“RequireEncryption”=dword:00000000

Additional consideration when modifying the SMB encryption required setting

  • Compatibility: Enabling the RequireEncryption setting means that any SMB server without encryption support will be rejected. This may affect legacy systems.
  • Performance: Encryption introduces some overhead, particularly in high-throughput environments. Test the impact in performance-critical scenarios before large-scale deployments.
  • SMB signing: While SMB signing verifies data integrity, encryption also protects against eavesdropping. Enabling encryption effectively overrides the need for signing.
  • SMB v1: This legacy protocol does not support encryption and is deprecated. It should be disabled in all modern environments for security reasons. (See How to Enable or Disable SMB1 File Sharing Protocol in Windows for more information. )

⚠️ Things to look out for

RisksPotential ConsequencesReversals
Enabling encryption on clients where the server doesn’t support itConnection failures; inability to access SMB sharesDisable RequireEncryption via PowerShell, Group Policy, or Registry
Using Group Policy in mixed OS environmentsThe policy may not apply correctly or could even break connections with unsupported clients.Revert GPO setting to Not Configured or Disabled and run gpudate /force in an elevated Command Prompt.
Modifying the Registry incorrectlyCould lead to system instability or break file sharingBack up the registry before proceeding.

If this happens afterwards, try restoring the backup or resetting the DWORD to 0.

Enforcing encryption on legacy networksMay break compatibility with older NAS or Windows systems.Consider staged rollouts or exceptions where needed.

Improve data security with SMB encryption

Enforcing SMB client encryption is an effective way to secure network file sharing in Windows 11 environments. Whether you’re managing a single endpoint or deploying policies across an enterprise, requiring encryption strengthens data security and helps enforce compliance.

Related topics:

Quick-Start Guide

In Windows 11, you can enable or disable SMB client encryption using Group Policy or Registry settings. Here’s how you can do it:

1. Via Group Policy:
– Open Group Policy Editor
– Navigate to: Computer Configuration > Administrative Templates > Network > Lanman Workstation
– Find and configure the “Enable insecure guest logons” and “Enable SMB encryption” policies

2. Via Registry (which could be done through a NinjaOne script):
REG ADD “HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters” /v “RequireSmb2Encryption” /t REG_DWORD /d 1 (to enable)
REG ADD “HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters” /v “RequireSmb2Encryption” /t REG_DWORD /d 0 (to disable)

For the most precise configuration, we recommend consulting your specific security requirements and testing in a controlled environment.

FAQs

You can enable SMB encryption through PowerShell, Group Policy Editor, or the Registry Editor.

  • The easiest method is to use PowerShell with the command Set-SmbClientConfiguration -RequireEncryption $true.
  • For enterprise-wide enforcement, use Group Policy at Computer Configuration > Administrative Templates > Network > Lanman Workstation.
  • Registry edits can also be applied manually or via .reg files for individual systems.

If your organization uses file and printer sharing, network-attached storage (NAS), or other services that rely on SMB, then yes, SMB should be enabled. However, it’s essential to use SMB v.3 or higher and enforce encryption and signing policies to ensure secure communication. It is highly recommended that you disable SMB v.1 due to its lack of security features and encryption.

Client-server encryption refers to the practice of encrypting data that is transmitted between a client (such as your computer) and a server (such as a file server). In the context of SMB, this means that all files and commands exchanged during a session are encrypted to prevent unauthorized access or interception. Requiring client-side encryption ensures that sensitive data remains protected across potentially untrusted networks.

You might also like

Ready to simplify the hardest parts of IT?