Windows OS Hub
  • Windows
    • Windows 11
    • Windows 10
    • Windows Server 2025
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
  • Microsoft
    • Active Directory (AD DS)
    • Group Policies (GPOs)
    • Exchange Server
    • Azure and Microsoft 365
    • Microsoft Office
  • Virtualization
    • VMware
    • Hyper-V
    • Proxmox
  • PowerShell
  • Linux
  • Home
  • About

Windows OS Hub

  • Windows
    • Windows 11
    • Windows 10
    • Windows Server 2025
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
  • Microsoft
    • Active Directory (AD DS)
    • Group Policies (GPOs)
    • Exchange Server
    • Azure and Microsoft 365
    • Microsoft Office
  • Virtualization
    • VMware
    • Hyper-V
    • Proxmox
  • PowerShell
  • Linux

 Windows OS Hub / Windows Server 2025 / SMB over QUIC: Mount File Share over Internet without VPN on Windows Server 2025

November 4, 2025

SMB over QUIC: Mount File Share over Internet without VPN on Windows Server 2025

SMB over QUIC is a new feature available on Windows Server 2025 that allows you to configure secure access to a Windows file share over the Internet without using a VPN (it was previously available only in the Windows Server 2022 Azure Edition). In the past, accessing SMB file servers remotely required deploying an additional VPN or RDS solution. Now, with SMB over QUIC, you can securely access a file server directly from untrusted and public networks.

The main features of the SMB over the QUIC protocol are:

  • The connection between the SMB server and user is protected by TLS 1.3 encryption with certificates. User authentication occurs within a secure TLS tunnel.
  • UDP/443 is used instead of the traditional SMB port TCP/445.
  • QUIC is a modern transport protocol that offers improved performance and resistance to poor network channels. It also includes a new compression algorithm.
  • With QUIC Client Access Control, you can restrict access to a file server for clients using certificates.
  • SMB 3.1.1 is used within the TLS tunnel.

SMB over QUIC is often referred to as an SMB VPN because it allows remote users to securely access a corporate file server over the Internet without the need for an additional VPN.

Let’s look at how to share a folder on a Windows Server 2025 file server via SMB over QUIC and provide secure access to it from clients using certificate authentication. Windows Admin Center (WAC) and PowerShell can be used to configure SMB over QUIC.

First, configure a file server on Windows Server 2025 with SMB over QUIC support. Although an Active Directory domain is preferred, SMB over QUIC can be configured for workgroup scenarios with local user accounts.

You need an SSL certificate containing the FQDN of your file server in the Subject Alternative Name (SAN). You can use a certificate from an external Certificate Authority, including a Let’s Encrypt certificate, a certificate from an internal CA, or a self-signed certificate, which is acceptable but not recommended. The certificate’s Enhanced Key Usage (EKU) field must include the use for Server Authentication.

In this example, I will use a scenario with a self-signed certificate on the server. Generate a self-signed certificate for the file server’s FQDN.

$todaydate = Get-Date
$add3year = $todaydate.AddYears(3)
New-SelfSignedCertificate -dnsname mfs01.woshub.com -notafter $add3year -CertStoreLocation cert:\LocalMachine\My

Select a certificate by its fingerprint:

$cert=Get-ChildItem -Path "Cert:\LocalMachine\My" | Where-Object Thumbprint -eq D4CB32344D21EB9E38168EA04540DBE509BBD650

Assign the certificate to the QUIC SMB server.

New-SmbServerCertificateMapping -Name mfs01.woshub.com -Thumbprint $cert.Thumbprint -StoreName My

New-SmbServerCertificateMapping for QUIC smb file share

Enable support for SMB over QUIC for the file server.

Set-SmbServerConfiguration -EnableSMBQUIC $true

Verify that the SMB server is listening on UDP port 443.

netstat -a | Select-String 443

443 UDP port for SMB quic protocol

To allow access to a file share over SMB QUIC, the appropriate rules must be enabled in the Windows Defender Firewall:

Get-NetFirewallRule -DisplayName "File and Printer Sharing (SMB-QUIC-In)"|select name,enabled,profile

By default, SMB QUIC access is granted for the Domain profile, but it is denied for the Private and Public network profile types (enable the required rules depending on your environment).

Firewall Rule: File and Printer Sharing (SMB-QUIC-In)

Note that when connecting to a shared folder, the SMB client attempts to use the standard TCP port 445. If that port is unavailable, the client will switch to QUIC. So, it is recommended to configure the server’s firewall rules to restrict external client access to SMB on standard port 445.

Next, configure a connection to the SMB shared folder via QUIC on the client computer (the following operating systems are supported as clients: Windows 11, Windows Server 2025, and Linux with Samba version 4.23 or newer. However, Windows 10 doesn’t support the QUIC protocol.

Check if SMB over QUIC support is enabled on the Windows 11 client:

Get-SmbClientConfiguration | select EnableSMBQUIC

Get-SmbClientConfiguration check for EnableSMBQUIC

Client computers must trust the certificate installed on the file server. When using a corporate CA, you can distribute the CA’s root and intermediate certificates and add them to the trusted certificate store on client devices (the certificate can be deployed via GPO). If you are using a self-signed certificate, you will need to import it into the client’s trusted certificate store.

Now you can map a shared folder from the file server using the New-SmbMapping PowerShell cmdlet:

New-SmbMapping -LocalPath W: -RemotePath \\mfs01.woshub.com\Docs -TransportType QUIC

Or using the net use command:

net use W: \\mfs01.woshub.com\Docs /TRANSPORT:QUIC

map shared folder in windows using TRANSPORT:QUIC

To ensure that the QIUC transport was used to connect a shared folder, check the Event Viewer logs on a client for Event ID 30832 (Event Viewer -> Applications and Services Logs -> Microsoft -> Windows -> SMBClient -> Connectivity).

The initial connection to the share was established.
Share name: \xxxxx
Server address: xxxxxxx:443
Session ID: 0x1900014000079
Tree ID: 0xD
Transport type: Quic
Signing used: true

Event ID 30832 The initial connection to the share was established. Transport type: Quic

If you see Event ID 30803 in the log, it most likely means that the server certificate is not installed on the client, or the client doesn’t trust it.

Failed to establish a network connection.
Error: The QUIC connection encountered a bad certificate during TLS.

Event ID 30803 SMBClient The QUIC connection encountered a bad certificate during TLS.

You can use Client Access Control rules to allow access to a server share via the QUIC protocol only if clients have the necessary certificates. Enable mandatory SMB client certificate authentication for connections to the file server.

Set-SmbServerCertificateMapping -Name mfs01.woshub.com -RequireClientAuthentication $true

Let’s create a self-signed certificate on a client computer that is valid for three months.

$clientCert = New-SelfSignedCertificate -DnsName mfs01.woshub.com -CertStoreLocation "Cert:\LocalMachine\My" -NotAfter (Get-Date).AddMonths(3) -KeyAlgorithm "RSA" -KeyLength "2048"

Bind this certificate on the client device for use when connecting to the corporate file server:

New-SmbClientCertificateMapping -Namespace mfs01.woshub.com -Thumbprint $clientCert.Thumbprint -Store My

Get the SHA-256 hash of the client certificate.

$clientCert.GetCertHashString("SHA256")

New-SmbClientCertificateMapping

Allow connections from clients with this certificate on the SMB server with QUIC share (by its SHA-256 hash).

Grant-SmbClientAccessToServer -Name mfs01.woshub.com -IdentifierType SHA256 -Identifier "B05E517D9FCA15BE3A38D95AA97A87003F55D524FE67DB7D7E81BB99B5C1D50B"

Grant-SmbClientAccessToServer - grant access to a QUIC file server by a client certificate

To list all Client Access Control rules on a file server:

Get-SmbClientAccessToServer -Name mfs01.woshub.com

Or, you can allow connections from all clients with certificates from a specific publisher (specified in X.500 format). This CA’s root and intermediate certificates must be trusted by the SMB server:

Grant-SmbClientAccessToServer -Name mfs01.woshub.com -IdentifierType ISSUER -Identifier "<subject name>"

Enable auditing of certificate authentication events (Applications and Services Logs\Microsoft\Windows\SMBServer\Audit):

Set-SmbServerConfiguration -AuditClientCertificateAccess $true

As a result, only clients with approved certificates will be able to connect to your SMB file server.

With SMB over QUIC, all SMB traffic, including authentication, is fully encrypted. If a domain controller is unavailable for client authentication, then NTLMv2 authentication will be used instead of Kerberos authentication. This encryption protects NTLM authentication from being intercepted or harvested by attackers, ensuring that even when NTLM is used, the credentials and authentication process remain safeguarded inside the encrypted QUIC channel.

To enable clients to authenticate using Kerberos, deploy a KDC proxy on the file server. This proxy forwards Kerberos requests from external clients to the domain controller over HTTPS (check the post SMB over QUIC: Configure the KDC Proxy).

One drawback of the SMB over the QUIC protocol is that it doesn’t support legacy SMB clients, including Windows 10 and earlier versions, as well as Samba versions prior to 4.23.

1 comment
0
Facebook Twitter Google + Pinterest
Questions and AnswersWindows 11Windows Server 2025
previous post
Remote Desktop (RDP) Not Working in Windows 11

Related Reading

Find a Process Causing High Disk Usage on...

July 16, 2025

Cannot Install Network Adapter Drivers on Windows Server

May 6, 2025

Configuring Windows Protected Print Mode (WPP)

May 28, 2025

Fix: Microsoft Defender Not Updating Automatically in Windows

July 15, 2025

Proxmox: Share a Host Directory with VMs via...

August 21, 2025

Blocking NTLM Connections on Windows 11 and Windows...

October 6, 2025

WMIC Command Not Found on Windows

May 19, 2025

Unable to Map Drive: An extended error has...

May 13, 2025

1 comment

admin November 4, 2025 - 2:45 pm

🗂 Windows Server 2025 introduces built-in support for SMB over QUIC. This feature enables users to securely access SMB file shares SMB file shares directly without requiring a VPN.
QUIC (Quick UDP Internet Connections) is a modern UDP-based transport protocol designed to reduce latency and improve connection reliability, useful for remote employees and mobile clients.

✅ Key advantages of SMB over QUIC

🔹 Uses QUIC instead of TCP for SMB transport
🔹 End-to-end TLS 1.3 encryption with certificate-based security
🔹 User authentication takes place inside an encrypted tunnel
🔹 Uses UDP/443 instead of TCP/445 (better firewall traversal)
🔹 Optional client certificate access control (QUIC Client Access Control)
🔹 Remote users can securely access corporate file shares without VPN, simplifying administration and reducing load on remote access infrastructure
🔹 Full Linux support beginning with Samba 4.23

📚 The referenced article covers:

✔️ Configuring SMB over QUIC on Windows Server 2025
✔️ Certificate binding and trust configuration
✔️ Windows 11 SMB client setup
✔️ Enabling certificate-based client authentication (server only accepts connections from certificates with a defined SHA-256 fingerprint or issued by a specific CA)

Reply

Leave a Comment Cancel Reply

join us telegram channel https://t.me/woshub
Join WindowsHub Telegram channel to get the latest updates!

Recent Posts

  • How to Find a Previous Computer Name in Windows

    October 28, 2025
  • How to Delete a Windows Service via CMD or PowerShell

    October 16, 2025
  • Resource Fair Sharing in Windows Server Remote Desktop Services (RDS)

    October 6, 2025
  • How to Disable (Enable) Credential Guard in Windows 11

    October 6, 2025
  • Wrong Network Profile on Windows Server after Reboot

    September 30, 2025
  • How to Get Windows 10 Extended Security Updates After End-Of-Life

    September 24, 2025
  • Blocking NTLM Connections on Windows 11 and Windows Server 2025

    September 23, 2025
  • Windows Stucks at ‘Getting Windows Ready, Don’t Turn Off Computer’

    September 15, 2025
  • Clean Up ETL Log Files in ProgramData

    September 9, 2025
  • Fix: Slow Startup of PowerShell Console and Scripts

    September 3, 2025

Follow us

  • Facebook
  • Twitter
  • Telegram
Popular Posts
  • Converting Windows 10 to Enterprise LTSC Without Losing Data
  • Permanently Disable Driver Signature Enforcement on Windows 11
  • How to Remove ‘Some Settings are Managed by Your Organization’ on Windows 11 or 10
  • Fix: Windows Update Tab (Button) is Missing from Settings
  • How to Add or Reinstall the Microsoft PDF Printer on Windows
  • Fix: Your IT Administrator Has Limited Access to Virus & Threat Protection
  • Fix: Multiple Connections to a Server or Shared Resources by the Same User
Footer Logo

@2014 - 2024 - Windows OS Hub. All about operating systems for sysadmins


Back To Top