/
/

How to Enable or Disable the SMB Client Encryption Requirement in Windows 11

by Raine Grey, Technical Writer
How to Enable or Disable the SMB Client Encryption Requirement in Windows 11 blog banner image

Instant Summary

This NinjaOne blog post offers a comprehensive basic CMD commands list and deep dive into Windows commands with over 70 essential cmd commands for both beginners and advanced users. It explains practical command prompt commands for file management, directory navigation, network troubleshooting, disk operations, and automation with real examples to improve productivity. Whether you’re learning foundational cmd commands or mastering advanced Windows CLI tools, this guide helps you use the Command Prompt more effectively.

Key points

  • Know the Requirements: Only available on Windows 11 version 24H2+ and Windows Server 2025 or later; requires SMB 3.0 or higher on both client and server.
  • Use PowerShell: Run “Set-SmbClientConfiguration -RequireEncryption $true” in an elevated PowerShell session. To disable it, replace “$true” with “$false.”
  • Use Group Policy: Navigate to “Computer Configuration” > “Administrative Templates” > “Network” > “Lanman Workstation” and set the “Require Encryption” policy to “Enabled” or “Disable.”
  • Use the Registry: Set the “RequireEncryption” DWORD value to “1” (enable) or “0” (disable) under “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters.”
  • Watch for Compatibility Issues: Test in a staged rollout before enforcing organization-wide; have a rollback plan ready using PowerShell or Registry Editor.

SMB, short for Server Message Block, is a core protocol used by Windows systems to share files, printers, and serial ports over a network. Essentially, it’s a client–server protocol where you (the client) request access to files or other resources on a server, and the server responds by providing the requested access.

As you can imagine, this may be a security vulnerability, especially in managed IT environments. The SMB client encryption requirement setting in Windows 11 (version 24H2 or later) enforces encryption for all outbound SMB client connections. This feature allows IT admins to guarantee that sensitive data is protected from snooping and interception, particularly on untrusted or public networks.

📌 Recommended deployment strategies:

Click to Choose a Method

💻 Best for Individual Users

💻💻💻 Best for Enterprises

Method 1: Using PowerShell
Method 2: Using Group Policy
Method 3: Using Registry Editor
Method 4: .reg file example

How to configure the SMB client encryption requirement in Windows 11

Method 1: Using PowerShell (recommended)

📌 Use Cases: Ideal for scripted deployments, manual configurations, or remote administration

📌 Prerequisites: 

  • You must have admin privileges.
  • This requires SMB v.3.0+ versions on both the client and the server.
  • PowerShell execution policy must allow running commands/scripts.
  • Restart isn’t typically required, but it’s a good practice after a change.
  • We recommend signing up for this free crash course: PowerShell for IT Ninjas.

Steps: 

  1. Open an elevated PowerShell.
  2. Execute any of the following commands.

To enable required SMB client encryption:

Set-SmbClientConfiguration -RequireEncryption $true

To disable required SMB client encryption:

Set-SmbClientConfiguration -RequireEncryption $false

To verify your current configuration:

Get-SmbClientConfiguration

Look for the RequireEncryption field in the output to confirm whether encryption is currently required. Alternatively, you can run either of the following commands directly:

Get-SmbClientConfiguration | Format-List -Property RequireEncryption

Method 2: Using Group Policy (enterprise deployment)

📌 Use Cases: Best for enterprise-scale deployments across multiple domain-joined systems.

📌 Prerequisites: 

  • You’ll need a domain-joined machine.
  • Admin access to Group Policy Editor is required.
  • Systems must support Group Policy enforcement.
  • SMB v.3.0+ is also required.

Steps:

  1. Press Win + R, type gpedit.msc, and click Enter.
  2. Go to Computer Configuration > Administrative Templates > Network > Lanman Workstation.
  3. Locate Encrypt all SMB client connections or Require Encryption (depending on your Windows 11 build) and double-click it.
    • Set it to Enabled to enforce encryption for all client connections.
    • Set it to Disabled or Not Configured to allow unencrypted connections.
  4. Click OK and apply the changes.
  5. Open an elevated Command Prompt and run gpupdate /force for the policy to take effect immediately. Alternatively, you can restart your computer.

Method 3: Using Registry Editor

📌 Use Cases: Suitable for manual overrides, offline environments, or environments without Group Policy access.

📌 Prerequisites: 

  • You must have admin privileges.
  • It’s preferable if you have registry editing experience.
  • SMB version 3.0+ is needed.
  • We recommend backing up your registry before proceeding. Incorrect configurations can lead to system instability.

Steps: 

  1. Press Win + R, type regedit, and click Enter.
  2. Navigate to the following key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters
  3. Create or modify the RequireEncryption DWORD (32-bit) value:
    • Set the value to 1 to require encryption.
    • Set the value to 0 to disable the requirement (default).
  4. To apply the changes, restart your computer.

Method 4: .reg file example

📌 Use Cases: Ideal for simple deployments where scripting is not required but automation is still beneficial.

📌 Prerequisites: 

  • This method requires admin privileges.
  • The user must have permission to merge .reg files.
  • Manula restart or sign-out/in is needed to apply changes.
  • We recommend backing up your registry before proceeding. Incorrect configurations can lead to system instability.

Steps:

To enable encryption:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters]

“RequireEncryption”=dword:00000001

To disable encryption:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters]

“RequireEncryption”=dword:00000000

Additional considerations when modifying the SMB encryption requirement setting

  • Compatibility: Enabling the RequireEncryption setting means that any SMB server without encryption support will be rejected. This may affect legacy systems.
  • Performance: Encryption introduces some overhead, particularly in high-throughput environments. Test the impact in performance-critical scenarios before large-scale deployments.
  • SMB signing: While SMB signing verifies data integrity, encryption also protects against eavesdropping. Enabling encryption effectively overrides the need for signing. That said, it’s important to note that Windows 11 (version 24H2) Enterprise, Pro, and Education now require both outbound and inbound SMB signing by default.
  • SMB v1: This legacy protocol doesn’t support encryption and is deprecated. It should be disabled in all modern environments for security reasons. (See How to Enable or Disable SMB1 File Sharing Protocol in Windows for more information.)

⚠️ Things to look out for

RisksPotential ConsequencesReversals
Enabling encryption on clients where the server doesn’t support itConnection failures; inability to access SMB sharesDisable RequireEncryption via PowerShell, Group Policy, or  Windows Registry.
Using Group Policy in mixed OS environmentsThe policy may not apply correctly or could even break connections with unsupported clients.Revert GPO setting to Not Configured or Disabled and run gpupdate /force in an elevated Command Prompt.
Modifying the registry incorrectlyCould lead to system instability or break file sharingBack up the registry before proceeding.

If this happens afterward, try restoring the backup or resetting the DWORD to 0.

Enforcing encryption on legacy networksMay break compatibility with older NAS or Windows systemsConsider staged rollouts or exceptions where needed.

Improve data security with SMB client encryption

Enforcing SMB client encryption is an effective way to secure network file sharing in Windows 11 environments. Whether you’re managing a single endpoint or deploying policies across an enterprise, requiring encryption strengthens data security and helps enforce compliance.

Related topics:

Quick-Start Guide

In Windows 11, you can enable or disable SMB client encryption using Group Policy or Registry settings. Here’s how you can do it:

1. Via Group Policy:
– Open Group Policy Editor
– Navigate to: Computer Configuration > Administrative Templates > Network > Lanman Workstation
– Find and configure the “Enable insecure guest logons” and “Enable SMB encryption” policies

2. Via Registry (which could be done through a NinjaOne script):
REG ADD “HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters” /v “RequireSmb2Encryption” /t REG_DWORD /d 1 (to enable)
REG ADD “HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters” /v “RequireSmb2Encryption” /t REG_DWORD /d 0 (to disable)

For the most precise configuration, we recommend consulting your specific security requirements and testing in a controlled environment.

FAQs

If your organization uses file and printer sharing, network-attached storage (NAS), or other services that rely on SMB, then yes, SMB should be enabled.

However, it’s essential to use SMB v.3 or higher and enforce encryption and signing policies to ensure secure communication. It’s highly recommended that you disable SMB v.1 due to its lack of security features and encryption.

Yes. Encryption introduces performance overhead, particularly in high-throughput environments. However, the impact is generally minimal on modern hardware with AES instruction support as most current CPUs can accelerate AES-based encryption.

For performance-critical workloads, test the impact before enabling it organization-wide and consider whether SMB signing alone (which has lower overhead) meets your security requirements.

This is the most common compatibility issue. If your NAS device or file server doesn’t support SMB 3.0 or encryption, the connection will be refused entirely.

To restore access, disable the requirement by running “Set-SmbClientConfiguration -RequireEncryption $false” in an elevated PowerShell session or reset the “RequireEncryption” DWORD to “0” in the Registry Editor. Then check whether a firmware update for your NAS adds SMB 3.0 support before re-enabling encryption.

No. They protect data at different stages. SMB encryption protects data in transit between a client and a server, preventing interception on the network. BitLocker protects data at rest by encrypting the contents of a drive.

For complete data protection, both should be used together rather than treated as alternatives.

Yes. Rather than enforcing encryption globally, Windows 11 allows you to require encryption on a per-mapped-drive basis or through UNC path hardening. This is useful when you need encryption for sensitive shares but still need to connect to legacy servers that don’t support SMB 3.0. The global “RequireEncryption” setting described in this post overrides all per-share or per-drive settings.

SMB over QUIC is a modern transport option available in Windows Server 2025 and Windows 11 24H2 that replaces TCP with the QUIC protocol, using TLS 1.3 to encrypt all traffic end to end without requiring a VPN.

For remote or mobile users accessing file shares over the internet, SMB over QUIC can be a more practical alternative to requiring traditional SMB encryption as it’s designed specifically for untrusted networks like the internet while also passing through edge firewalls more cleanly.

You might also like

Ready to simplify the hardest parts of IT?