just updated windows 11 KB5065426 network shares no longer connect

Chris Johnson 330 Reputation points
2025-09-10T16:04:18.42+00:00

Version 10.0.26100 Build 26100

just updated windows 11 KB5065426 network shares no longer connect. the server is older but access is required and has been working for years.

net use

New connections will be remembered.

Status Local Remote Network


Unavailable N: \MSR\radio Microsoft Windows Network

Windows for home | Windows 11 | Internet and connectivity
{count} votes

26 answers

Sort by: Most helpful
  1. Deleted

    This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.


    Comments have been turned off. Learn more

  2. Gerry 0 Reputation points
    2025-10-04T17:28:10.2133333+00:00

    Fix your problem

    0 comments No comments

  3. David Gerner 0 Reputation points
    2025-10-10T05:52:29.6133333+00:00

    I had one of 8 Workstations not break when multiple updates were done on 10/02/2025. Rolling back/ unistalling KB5065426 on the client machines. Pause Win update for 4 weeks, then restarted computer.

    After restarting Goto Search & Enter Credential Manager

    Delete any shares in Credential Manager under Windows

    Checked to ensure on PRIVATE Not Public Network

    next:

    1.Open Run command by Pressing windows + R and type regedit and hit enter to open the registry editor.

    2.Navigate to the following path.

    Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows

    3.Expand the Windows Registry Key and search for LanmanWorkstation registry key,

    If you are not able to find the registry key, then you need to create it.

    4.Right Click on the Windows Registry Key and Choose New > Key, Name the Key as LanmanWorkstation.

    Now Click on the LanmanWorkstation Registry key and from your right-hand side

    right click and choose New > DWORD 32 bit Value and name it as AllowInsecureGuestAuth.

    Double click on the AllowInsecureGuestAuth DWORD and set the value to 1 and give OK.

    ran following in Admin Privilege CMD Prompt:

    sfc/scannow

    dism /online /cleanup-image /scanhealth

    dism /online /cleanup-image /checkhealth

    dism /online /cleanup-image /restorehealth

    disable/ uncheck SMBv1 in Windows Features

    Enable/ check SMB direct in Windows Features

    Restart

    Next go into Group Policy (Pro Version Only) gpedit.msc

    Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options.

    Set both of these Below to "Disabled"

    Double click on Microsoft Network Client: Digitally sign communications (always)

    Double click on Microsoft Network Client: Digitally sign communications (if server agrees)

    Click on OK.

    Then find:

    Computer Configuration, Administrative Templates, Network, Lanman Workstation

    Double click on "Enable Insecure Guest Logons"

    Set this to "Enabled"

    Click on OK.

    Reboot

    Once rebooted & Signed in Map your shared Drive

    Of Note all computers Desktop are Windows 11 Pro, the same model Dell & specs, the big issue I saw was in reliability manager that the updates that failed at least one time then succeeded had the failure of mapped drives.


  4. Timothy Edgin 0 Reputation points
    2025-10-27T18:37:33.5133333+00:00

    I had password protected and encrypted file shares that not longer work. This is OPENLY meant to force everyone to use OneDrive so they can scan everything and steal anything of value. We have no protection from predation at this point.


  5. Ken McIntosh 10 Reputation points
    2025-11-07T16:49:43+00:00

    I have attached the instructions I wrote to execute the SID Changer process.

    Combined Instructions.txt

    No warranty is offered or implied. I HAVE ONLY USED THE FREE VERSION AND HAVE NOT TESTED THIS ON A SYSTEM RUNNING SQL SERVER OR OTHER DATA INTEGRATON SOFTWARE. Good luck - YMMV

    Where I work we use AOMEI images to deploy client systems. Every one of the same physical model w/ the same OS has the same SID for a span of about 3 mo. before we create a new image. So, the SID changer app (https://www.stratesave.com/html/sidchg.html) became necessary. I knew this was going to bite us in the butt 20 yrs ago, but I digress.

    This is done in combination with setting each PC back from public to the private network, w/ F&P sharing and network detection enabled as well as turning off the password protection in the Network and Sharing GUI. Also, in firewall settings (even if turned off - JIC) uncheck "File and printer Settings(Restrictive) for Public / Private and, if it applies, Domain.

    I have run this on both simple workgroup connected PCs and PCs on a domain w/o issue. The only two things I have noticed are; if you are doing this remotely, after SID Changers runs, the remote access key you used to access that PC will have changed and you need someone to report that new key to you to be able to access the PC remotely again, the other is that if you have specialized configs for MS Edge (this may also apply to other browsers), you need to reset Edge in the left sidebar of Settings, and then reconfigure Edge to how you want it. There may be other things I have not seen.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.