After upgrading the Windows 10 build to 1803 or higher (1809, 1903, 1909), some users noticed that they could no longer connect to shared network folders on neighboring computers or NAS devices.
Windows File Explorer cannot even display a list of shared folders on network computers (both running Windows 10 and Windows 7). When trying to open any network folder, an error appears:
Network Error
Windows cannot access \\sharedNAS
Check the spelling of the name. Otherwise, there might be a problem with your network. To try identify and resolve network problems, click Diagnose.
Error code: 0x80070035.
The network path was not found.
At the same time, you can easily open and connect network shared folders from other computers (running older versions of Windows 10, 8.1, or 7), smartphones and other devices.
Let’s try to figure out how to fix the error with the code “0x80070035. Network path not found
” in Windows 10.
SMBv1 is not Installed by Default in Windows 10
First of all, you need to understand whether the problem is related to the fact that in Windows 10 1709 and newer the unsafe legacy SMB v1.0 protocol is disabled by default (this protocol is used to access network shared files and folders in local network). If you try to connect to a network device that only supports access over SMBv1 protocol (for example, an old version of NAS storage, a computer running Windows XP/Windows Server 2003) from the latest Windows 10 builds, you won’t be able to connect to shared network folders on such a device. And when accessing the resource by the UNC path (\\NASname
), you can receive the error “0x80070035”.
To check if the SMBv1 protocol is enabled in Windows 10, use the following command:
Dism /online /Get-Features /format:table | find "SMB1Protocol"
As you can see, in this case the SMB1Protocol-Client feature is disabled.
SMB1Protocol | Disabled SMB1Protocol-Client | Disabled SMB1Protocol-Server | Disabled
You can enable the legacy SMB client to access network devices using SMBv1 protocol via the Control Panel (Control Panel -> Programs and Features -> Turn Windows features on or off -> SMB 1.0 / CIFS File Sharing Support -> SMB 1.0 / CIFS Client). In addition, you can access the features installation dialog by running the optionalfeatures.exe
command.
Or you can enable the SMB 1 client with the DISM command:
Dism /online /Enable-Feature /FeatureName:"SMB1Protocol-Client"
After installing the SMBv1 client, you need to restart the computer and check if access to the network folder has appeared.
On Windows 10 1709 and newer the SMBv1 client is automatically removed if it has not been used for more than 15 days.
Enable Insecure Guest Logons
If you use anonymous access to connect NAS or other computers, you need to enable the insecure guest logon policy. In Windows 1803/1709 it blocks access to shared network folders over the SMB 2.0 protocol under an anonymous (guest) account. To do this, in the Windows 10 Local Policy Editor (gpedit.msc), enable the Enable insecure guest logons policy in the GPO section: Computer Configuration -> Administrative templates -> Network -> Lanman Workstation.
Or you can enable SMB network access under guest account via the registry using the command:
reg add HKLM\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters /v AllowInsecureGuestAuth /t reg_dword /d 00000001 /f
Disable SMB1 and SMB2 Protocols in Windows
If only SMB v3 devices are used on your network (Windows 8.1 / Windows Server 2012 R2 and newer, see the table of SMB versions in Windows), you can fix the 0x80070035 error by disabling legacy SMB1 and SMB2 protocols. The fact is that your computer may try to use the SMB 2.0 protocol to access network folders that allow only SMB 3.0 connections (possibly with traffic encryption).
First disable the SMB v1.0 protocol through the Control Panel or using the commands in the PowerShell console:
sc.exe config lanmanworkstation depend= bowser/mrxsmb10/nsi
sc.exe config mrxsmb10 start= disabled
Dism /online /Disable-Feature /FeatureName:"SMB1Protocol"
Then disable the SMB 2.0 protocol:
reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters" /v "SMB2" /t REG_DWORD /d "0" /f
sc.exe config lanmanworkstation depend= bowser/mrxsmb10/nsi
sc.exe config mrxsmb20 start= disabled
PowerShell -ExecutionPolicy Unrestricted
Set-SmbServerConfiguration –EnableSMB2Protocol $true
You can verify that the SMB 1 and SMB 2 protocols are disabled by running the following PowerShell command:
Get-SmbServerConfiguration | select "*enablesmb*"|fl
EnableSMB1Protocol : False EnableSMB2Protocol : False
Check the Network Discovery Configuration on Windows 10
If your computers are joined to a workgroup, I strongly advise you to follow the recommendations from the article Network computers not showing in Windows 10.
In the Network and Sharing Center section of the Control Panel on both computers, verify that the Private network profile is used as the current profile (Private (Current profile)). Make sure that the following options are enabled:
- Turn on network discovery + Turn on automatic setup of network connected devices;
- Turn on file and printer sharing.
In the All Networks section, enable the following options:
- Turn off password Protect Sharing;
- Turn on sharing.
On both computers, reset the DNS cache:
ipconfig /flushdns
And reboot both computers.
What else is worth checking out:
- In the properties of the shared network folder (both on the NTFS file system permissions and the shared folder level), verify that the Everyone group has the permissions to read the contents of the folder;
- Check if the network storage (computer with a shared folder) is accessible by an IP address. To do this, enter
\\192.168.1.100
in the File Explorer and press Enter (replace with the IP address of your network storage or remote computer); - If you simultaneously have two active network interfaces on your device (Wi-Fi and Ethernet), try to temporarily disable one of them and check access to your local network resources;
- Verify that the following services are running on your computer (open the
services.msc
console). Try to start these services and change startup type to the Automatic Delayed Start:- Function Discovery Provider Host – fdPHost
- Function Discovery Resource Publication – FDResPub
- SSDP Discovery – SSDPSRV
- UPnP Device Host – upnphost
- DNS Client (dnscache)
- Try to temporarily disable your antivirus and/or firewall application and check if the problem persists while accessing the network resources;
- Try to change the computer name in the System properties;
- Try to disable the IPv6 protocol in the properties of your network adapter in the Control Panel;
- Try to reset the TCP/IP network stack on the computer with commands:
netsh winsock reset
netsh int ip reset - Run the PowerShell console and check the availability of the SMB port on the remote computer using the Test-NetConnection cmdlet (network access may be blocked by a firewall):
Test-NetConnection 10.16.1.70 -port 445
(if the firewall is not restricting SMB traffic, the status should appear TcpTestSucceeded : True).
Access NAS and Samba Storage from Windows 10 with Saved Credentials
If the problem occurs only when you accessing the NAS (or Samba server on Linux), you can try to save the NAS connecting password to the Windows Credential Manager (Control Panel\All Control Panel Items\Credential Manager\Add a generic credential).
Then in Network and Sharing Center in the Advanced sharing settings enable the option Use user accounts and passwords to connect to other computers.
I hope my article will be useful, and you will restore access to your shared folders on your LAN.
43 comments
I got the error “0x80070035 The handle is invalid” when accessing shared network folders on Windows 7 SP1 and Windows Server 2008 R2 after installing the January security update KB4480970 (January 8, 2019).
The problem was resolved after removing this update. We are waiting for the fix from Microsoft.
DK — You Nailed It.
2 days of chasing this.
Layout:
Pc1 – maps Y:\qbfiles
Pc2 – maps Y:\qbfiles
Pc3 – QuickBooks File Server with loop back Y:\qbfiles
Pc1 & Pc2 fails with 0x80070035 or 0x80004005, handle is invalid, path was not found
Put old laptop in used, not updated since 11/2018, all ready has map drive and it fails.
Deduction…….Pc2 the “QB file server” is the problem.
Uninstalled KB44809070 from Pc3 and Pc2 then connected
Uninstalled KB from Pc1 only to find out it is the “server” not the connecting “clients”, reinstall KB on Pc1 an it is working.
Crickets to M$ for this crap.
Got the same issue here. Uninstalled the windows update KB44809070 (which was installed 10th January 2019) from the server. Didn’t work. What I did I uninstalled all the updates that happened on 10th January and 17th January.
All the other laptops and machines are Windows 7. All work fine connecting to the server (which runs windows server 2008).
The 2 machines that we have that run Windows 10 OS encountered the issue.
The new update KB4480955 for Windows 7 fixes the problem.
Windows 10 Enterprise, Version 1803, OS Build 17134.556
Windows 10 Error code: 0x80070035 “The network path was not found”
After few hours checking all internet suggestions and nothing worked, I found the solution myself:
On your computer\NAS open the “Control Panel” -> “Credentials Manager” -> “Windows Credentials” and create new Windows credential for the computer where your share is. Use the credentials of a user on that computer who has the admins permissions on the share…
VOILA, it works!
Hey, Nash. Adding the login id and password in Credential Manager worked for me, many thanks!. I’ve tried all the other suggestions, but none worked. It must be something to do with how Windows is authenticating to to the share. It’d be nice to have a proper fix at some stage.
You are very welcome Mark. Yeah, sometimes there are relay weird ways of resolving MS/Windows issues, but happy we all share our findings to help each other…
You are a geinus! I year later and still the same annoyance. Thanks a lot
Glad it helped you. Thanks.
Nash
Wow Nash, you are a genius! Thanks so much! I spent like 2 hours trying to figure this out and followed various tips in a few websites about configuring the network options and NOTHING worked! Doesn’t look like it has anything to do with the Windows 10 version since I’m using the latest 2004 released this month, September 2020. I had problems with an older Win 10 from a few months ago and it that case it was solved with one of those tips. But this time, I just kept getting that ridiculous Error Code: 0x80070035 “The Network Path was not found” when trying to connect to some of the computers on the network. The funny thing was that some would connect fine but others would not!
So apparently the problem is that Windows 10 has no idea what is wrong and doesn’t ask for a username and password to connect to these computers which are password protected! When you add credentials, they are already in there so it connects. It’s pretty mind blowing that this far along, with Windows 10 being around so long, such a simple issue has not been solved yet! What a headache!
But so glad it’s working now, you saved my night and probably days of tearing my hair out lol!
You are very welcome.
Glad my solution helped another person.
Happy Windows 10 to everyone 😉
You the best.
Windows Credential Manager update is working for my MYBOOKLIVE. Thanks a lot.
You are very welcome Vladimir. I learned a long time ago, some very simple “fixes” work sometimes much better that the complicated registry/OS tweaks, many experts are prone recommending…
Your solution was the only real and easy solution….the others had too many steps and no one worked…
I’ve been having this issue for months, following this guide fixed it within minutes. Thank you a bunch.
I had also this error 0x80070035, my solution was this using the registry , check the keys in :
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0]
“Auth132″=”IISSUBA”
“NtlmMinClientSec”=dword:00000000
“NtlmMinServerSec”=dword:00000000
“RestrictReceivingNTLMTraffic”=dword:00000002
“RestrictSendingNTLMTraffic”=dword:00000002
Delete the last 2 entries :
“RestrictReceivingNTLMTraffic”=dword:00000002
“RestrictSendingNTLMTraffic”=dword:00000002
this fixed my problem ans now i can see the shares of my both PC’s
Error Code: 0x80070035
Really many thanks for this solution which has been solved my problem, thanks again very much
your welcome 🙂
*You’re (You’re is you are, your is possessive)
Bingo – that is a common grammarical error!
thanks. you resolved my problem. thanks again.
your welcome, this is caused by using privacy tweak software for Windows 10 like O&O.ShutUp10
thanks, thanks, 1000 thanks
Shoudn’t this be $false? Only after I changed thie to $false did SMB2 change to disabled.
Under ” Then disable the SMB 2.0 protocol:” is the below line.
Set-SmbServerConfiguration –EnableSMB2Protocol $true
With Test-NetConnection I got “TcpTestSuceeded: False”.
On the same computer, using a different internet connection (wifi from my 4g phone), I get “TcpTestSuceeded: True” and the shared drive works.
So it must be something with my home internet connection: I disabled all the Windows firewall, as well as the firewall on my internet box, and yet the TCP connection on port 445 still doesn’t work. Any idea what could be blocking here? It’s really weird since it works on my 4g wifi connection…
I just figured all this out. At least with the Synology NAS devices, you have to go into File Services settings and insure that you have minimum settings for SMB protocol set to SMB1 and maximum SMB protocol settings set to SMB3.
Viola! It’s fixed. I pulled my hair out for weeks trying to figure this out!
An to be clear, the settings on the NAS were set to default as minimum and maximum at SMB1. It would not negotiate with network traffic using anything but SMB1 which Microsoft no longer likes. Go figure.
SMB1 is not used on newer OS’s and is typically disabled on older ones due to its vulnerabilities that let Ransomware propagate between machines. If yours is a home office and you have good antivirus on the PC and email, web browser, it’s probably not such a huge concern.
We run a small business workgroup with the Synology NAS used at a file server, DHCP and a few other things. That being said, since the original post references a NAS share and that is exactly what my issue was regarding that specific error, I wanted to reply here with what worked for me for this specific original post. I am sure the error mentioned in the OP can manifest for a whole host of reasons (no pun intended) so if this revelation assists anyone else with this specific problem, then I was more than happy to share.
Before attempting esoteric “fixes” for your NAS not showing in File Explorer (FE) in Win 10 check to see if your anti-malware program is blocking the visibility of the NAS. I discovered by painstaking trial-and-error that on my old VAIO (after installing a clean from scratch build (2004 latest as at 17/10/2020) of WIN10Pro x64) my Synology NAS was picked up immediately by the OS in its base standard configuration and a list of its Shared folders cascaded nicely down the left column under “Network”. Then I installed the current version of “Malwarebytes” (4.2.1.89) which I have endorsed/used for many years and found that it immediately made my NAS disappear from FE Network along with its folders. Oddly, having pinned the Synology to my “Quick Access” list the folders could still be accessed through QA but not under Network. Go figure. I discovered that only by disabling Malwarebytes (right-click System Tray icon and select “Quit/Exit”) and rebooting/logging out of my account did this allow the NAS to re-appear as before with its list of Folders. This was repeatable ad nauseam.
I filed a Support Ticket with Malwarebytes, got a Ticket number on 17/10, and still await their response as of 22/10.
For clarity, the following conditions are true:-
1. The WIN10Prox64 install was downloaded from MS servers and updated to latest 2004 build by WU OOBE with no “tweaking”.
2. The deprecated SMB1 was not re-engaged in “Programs & Features/Turn Windows Features On and Off” for the security reasons explained in this article.
3. The Synology NAS was connected on a standard 192.xxx.xxx.xxx APIPA internal network and DSM v6 was set to disallow SMB1 and instead force SMB2 as a minimum and SMB3 as a Max. Local Master Browser was un-checked (as enabling opens the Guest Account by default). Disallowing SMB1 prevented my 6-year old Samsung/HP CLX-6260 MFD from scanning docs to NAS but was overcome by setting up Scan-to-FTP instead and imposing stricter firewall rules on this.
4. On the PC, Network Discovery File and Printer Sharing was allowed and set to Private with Public turned off by default.
Very detailed, very good explanations.. i have figured out problems on my NAS server unsolved already 2 months.
thx
Obrigado:
Excelente postagem, estou completamente satisfeito.
Parabéns
The “SMB enable” saved me, totally!!!
Thanks!!!
SMB1 is not used on newer OS’s and is typically disabled on older ones due to its vulnerabilities that let Ransomware propagate between machines, so dont enable SMB1 !!
What else worth checking out. Thank you, point #4 was the case: checking the required services it sorted out that DNS Client was not started and altogether grayed out. I had to start it from command line.
On the other hand, looks not so uncommon, so I would place this point as another point to check for , but earlier in the article.
Anyway thank you for the hint!
This is a great article! However, one of the security updates (not sure which) that came out in February 2021 broke my Samba shares. I’m on Windows version 20H2 and my shares are SMB 3.0. This is across all 4 of my Windows 10 computers! Everything was fine until the security update! I didn’t change a thing on my Linux side! I’ve also tried limiting Samba to SMB 2, but behavior is exactly the same.
I get 2 different behaviors, seems to be pretty random. Either I can’t access the share (mapped drive) and get an error, “X:\ is not accessible. The request is not supported.” or the share shows up and I can see all the files. But, I can’t open anything. And when I try to revisit the share, I get the error “X:\ is not accessible. The directory name is invalid.” If I disconnect the drive, I can then remap it, but the behavior is the same.
Please HELP!!
change in HKLM\SYSTEM\CurrentControlSet\Control\Lsa
put LmCompatibilityLevel from 1 to 5 ( zie https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level )
try this : change in registry HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel the LmCompatibilityLevel from 1 to 5 ( see https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level )
Hi. You provide commands for disabling SMB2.
This is the last command: Set-SmbServerConfiguration –EnableSMB2Protocol $true
Should that be $true ?
You give a test command: Get-SmbServerConfiguration | select “*enablesmb*”|fl
Results: SMB1=False but SMB2=True.
If I change your Set-SmbServerConfiguration –EnableSMB2Protocol $true to $false, then the test result is false for both.
I’m on Win 10 pc, not server.
You thoughts?
Thanks.
Answering my own question: SMB2 & SMB3 protocols share the same stack. If SMB2 is completely disabled, SMB3 will also be disabled, according to MS.
Thanks for this – it was the enabling insecure guest logons in gpe that solved this for me. I’ve been all over the place disabling adaptors and re-enabling and editing all sorts of policies before finding this. I just hope I’ve not done too much damage!
Much appreciated