ANAVEM
Languagefr
How to Configure SMB over QUIC for Secure Windows File Sharing Without VPN

How to Configure SMB over QUIC for Secure Windows File Sharing Without VPN

Configure SMB over QUIC on Windows Server 2025 to provide encrypted, VPN-free remote file access using UDP 443 and TLS certificates for secure internet-facing Windows file shares.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
March 17, 2026 18 min 5
hardsmb 9 steps 18 min

Why Configure SMB over QUIC for Windows File Sharing?

Traditional SMB file sharing over the internet requires complex VPN setups or risky direct exposure of TCP port 445. SMB over QUIC revolutionizes this by providing secure, encrypted file sharing using UDP port 443 and TLS certificates - the same technology that secures web traffic.

What Makes SMB over QUIC Different from Traditional SMB?

SMB over QUIC leverages the QUIC protocol (Quick UDP Internet Connections) to provide several key advantages over traditional SMB. First, it uses UDP instead of TCP, which handles network congestion and packet loss more efficiently. Second, it mandates TLS 1.3 encryption for all connections, ensuring data is always encrypted in transit. Third, it eliminates the need for VPN infrastructure while maintaining enterprise-grade security.

Which Windows Versions Support SMB over QUIC in 2026?

As of March 2026, SMB over QUIC is fully supported in Windows Server 2025 (all editions) and Windows Server 2022 Datacenter: Azure Edition. Client support requires Windows 11 version 24H2 or later. Windows Server 2025 requires PowerShell-only configuration, as Windows Admin Center support is not available for this version.

This tutorial will guide you through configuring a production-ready SMB over QUIC deployment that allows secure remote file access without VPN complexity. You'll learn to properly configure TLS certificates, enable the QUIC protocol, create secure shares, and connect clients over the internet using encrypted UDP 443 connections.

Related: How to Enable Remote Desktop on Windows Server Core 2025

Related: How to Install and Configure WSUS on Windows Server 2019

Related: How to Install and Configure DHCP Server on Windows Server

Related: How to Deploy and Configure Remote Desktop Services (RDS)

Implementation Guide

Full Procedure

01

Install the File Server Role and Management Tools

Start by installing the File Server role on your Windows Server 2025. This provides the foundation for SMB services and includes the necessary management tools.

Install-WindowsFeature -Name FS-FileServer -IncludeManagementTools

This command installs the File Server role with all management tools. The installation typically takes 2-3 minutes and may require a restart depending on your server configuration.

Verification: Run the following command to confirm the role is installed:

Get-WindowsFeature -Name FS-FileServer

You should see Install State: Installed in the output.

Pro tip: Always run PowerShell as Administrator when installing Windows features. Right-click PowerShell and select "Run as administrator" to avoid permission issues.
02

Obtain and Install Your TLS Certificate

SMB over QUIC requires a valid TLS certificate with a Subject Alternative Name (SAN) that matches your public FQDN. You can use certificates from public CAs like Let's Encrypt, DigiCert, or your internal CA.

If using a public CA, request a certificate for your server's public hostname (e.g., fileserver.example.com). For this tutorial, we'll assume you have a certificate file ready to import.

Import the certificate into the Local Machine certificate store:

# Import certificate from PFX file
$certPassword = ConvertTo-SecureString "YourCertPassword" -AsPlainText -Force
Import-PfxCertificate -FilePath "C:\Certificates\fileserver.pfx" -CertStoreLocation Cert:\LocalMachine\My -Password $certPassword

After importing, get the certificate thumbprint which you'll need for the next steps:

Get-ChildItem Cert:\LocalMachine\My | Where-Object {$_.Subject -like "*fileserver.example.com*"} | Select-Object Thumbprint, Subject

Verification: The command above should display your certificate with its thumbprint. Copy this thumbprint value for use in step 5.

Warning: Ensure your certificate includes the exact FQDN that clients will use to connect. Wildcard certificates work, but the SAN must match the connection hostname exactly.
03

Configure DNS and Network Requirements

Create a public DNS record that resolves your chosen hostname to your server's public IP address or load balancer. This hostname must match the SAN in your TLS certificate.

For example, if your server's public IP is 203.0.113.45 and your certificate is for fileserver.example.com, create an A record:

fileserver.example.com.    IN    A    203.0.113.45

Test DNS resolution from a client machine:

nslookup fileserver.example.com

Configure Windows Firewall to allow UDP 443 inbound and block TCP 445 on the public interface:

# Allow UDP 443 for SMB over QUIC
New-NetFirewallRule -DisplayName "SMB over QUIC" -Direction Inbound -Protocol UDP -LocalPort 443 -Action Allow

# Block TCP 445 on public interface (replace "Public" with your public interface name)
New-NetFirewallRule -DisplayName "Block SMB TCP 445 Public" -Direction Inbound -Protocol TCP -LocalPort 445 -InterfaceType Public -Action Block

Verification: Check that your firewall rules are active:

Get-NetFirewallRule -DisplayName "SMB over QUIC" | Select-Object DisplayName, Enabled, Direction, Action

The rule should show as Enabled: True and Action: Allow.

04

Map the TLS Certificate to SMB Server

Now you'll bind your TLS certificate to the SMB server service. This tells Windows which certificate to use for SMB over QUIC connections.

Use the certificate thumbprint you obtained in step 2:

# Replace with your actual certificate thumbprint
$thumbprint = "1234567890ABCDEF1234567890ABCDEF12345678"
Set-SmbServerCertificateMapping -Thumbprint $thumbprint -StoreName My

Verify the certificate mapping is configured correctly:

Get-SmbServerCertificateMapping

This should display your certificate thumbprint and store name. If you see an error about the certificate not being found, double-check that:

  • The certificate is in the Local Machine\My store
  • The thumbprint is correct (no extra spaces or characters)
  • The certificate has not expired

Verification: The Get-SmbServerCertificateMapping command should return your certificate details without errors.

Pro tip: You can get the exact thumbprint by copying it from the certificate properties in the Windows Certificate Manager (certmgr.msc), but remove any spaces that might be copied along with it.
05

Enable SMB over QUIC on the Server

Enable the SMB over QUIC feature on your Windows Server 2025. This is the core configuration that allows SMB traffic to use the QUIC protocol over UDP 443.

Set-SmbServerConfiguration -EnableSMBQUIC $true

When prompted, confirm the change by typing Y and pressing Enter. This setting takes effect immediately without requiring a restart.

Verify that SMB over QUIC is enabled:

Get-SmbServerConfiguration | Select-Object EnableSMBQUIC

You should see EnableSMBQUIC : True in the output.

Check that the SMB server is listening on UDP 443:

Get-NetUDPEndpoint | Where-Object {$_.LocalPort -eq 443}

Verification: The UDP endpoint check should show the SMB server process listening on port 443. If you don't see this, restart the Server service:

Restart-Service -Name "Server" -Force
Warning: Restarting the Server service will temporarily disconnect all existing SMB connections. Plan this during a maintenance window if you have active users.
06

Create and Configure SMB Shares

Create the directory structure and SMB shares that will be accessible over QUIC. For this example, we'll create a "Projects" share.

First, create the directory:

New-Item -Path "C:\Shares\Projects" -ItemType Directory -Force

Create the SMB share with appropriate permissions:

New-SmbShare -Name "Projects" -Path "C:\Shares\Projects" -FullAccess "BUILTIN\Administrators" -ChangeAccess "BUILTIN\Users"

Configure additional share-level permissions if needed. For domain environments, you might want to grant access to specific domain groups:

# Example for domain environment
# Grant-SmbShareAccess -Name "Projects" -AccountName "CORP\FileServer-Projects-Modify" -AccessRight Change -Force

Set NTFS permissions on the folder for additional security:

# Grant modify permissions to Users group on the folder
icacls "C:\Shares\Projects" /grant "Users:(OI)(CI)M"

Verification: Check that your share is created and accessible:

Get-SmbShare -Name "Projects" | Select-Object Name, Path, Description

Test local access to ensure the share works:

Test-Path "\\localhost\Projects"

This should return True if the share is accessible locally.

07

Configure Windows 11 Client for SMB over QUIC

On your Windows 11 client (version 24H2 or later), enable SMB over QUIC support. This must be done on each client that will access the shares.

Open PowerShell as Administrator on the client machine and enable SMB over QUIC:

Set-SmbClientConfiguration -EnableSMBQUIC $true

Confirm the change when prompted. Verify the setting is enabled:

Get-SmbClientConfiguration | Select-Object EnableSMBQUIC

Ensure the client trusts your server's certificate. If you're using a public CA, this should work automatically. For internal CAs, import the root certificate:

# Only needed for internal CAs
# Import-Certificate -FilePath "C:\Certificates\RootCA.crt" -CertStoreLocation Cert:\LocalMachine\Root

Test connectivity to your server's FQDN:

Test-NetConnection -ComputerName "fileserver.example.com" -Port 443 -InformationLevel Detailed

Verification: The connection test should show TcpTestSucceeded: True. If it fails, check your firewall rules and DNS resolution.

Pro tip: If you're testing from the same network as the server, make sure your router or firewall allows hairpin NAT, or test from a truly external network to simulate real-world usage.
08

Connect to SMB Shares Using QUIC Protocol

Now connect to your SMB shares from the Windows 11 client using the QUIC protocol. This is where you'll see the magic happen - secure file sharing over the internet without a VPN.

Map a network drive using the -UseQUIC parameter:

New-SmbMapping -RemotePath "\\fileserver.example.com\Projects" -LocalPath "Z:" -UseQUIC

If prompted for credentials, enter your domain credentials or local account credentials that have access to the share.

Alternatively, you can connect without mapping a drive letter:

New-SmbMapping -RemotePath "\\fileserver.example.com\Projects" -UseQUIC

Verify that the connection is using QUIC protocol:

Get-SmbConnection | Where-Object {$_.ServerName -eq "fileserver.example.com"} | Select-Object ServerName, ShareName, Dialect, Transport, Encrypted

You should see output showing:

  • Transport: QUIC
  • Encrypted: True
  • Dialect: 3.1.1 (SMB 3.1.1)

Test file operations by creating a test file:

"Test content" | Out-File -FilePath "Z:\test.txt"

Verification: Check that the file was created successfully and verify the connection details show QUIC transport. If you see TCP instead of QUIC, troubleshoot certificate trust and ensure both client and server have QUIC enabled.

Warning: If the connection falls back to TCP, it means QUIC negotiation failed. This often indicates certificate trust issues or that UDP 443 is being blocked somewhere in the network path.
09

Test and Verify Secure Remote Access

Perform comprehensive testing to ensure your SMB over QUIC configuration is working correctly and securely. This step validates that you have truly secure, VPN-free file sharing.

Test file operations from the client to ensure full functionality:

# Create a test directory
New-Item -Path "Z:\TestFolder" -ItemType Directory

# Copy a file to test upload performance
Copy-Item -Path "C:\Windows\System32\notepad.exe" -Destination "Z:\TestFolder\notepad_copy.exe"

# Test file download
Copy-Item -Path "Z:\TestFolder\notepad_copy.exe" -Destination "C:\Temp\downloaded_notepad.exe"

Monitor the connection to ensure it remains stable:

Get-SmbConnection | Where-Object {$_.Transport -eq "QUIC"} | Format-Table ServerName, ShareName, Transport, Encrypted, Dialect

Check SMB server statistics to see QUIC connections:

# Run this on the server
Get-SmbConnection | Where-Object {$_.Transport -eq "QUIC"} | Measure-Object

Test from different network locations to ensure internet accessibility. Try connecting from:

  • A different internet connection (mobile hotspot)
  • A remote office location
  • A cloud VM in a different region

Verify encryption is working by checking the connection properties:

Get-SmbConnection | Where-Object {$_.ServerName -eq "fileserver.example.com"} | Select-Object EncryptionMethod, SigningMethod

Verification: All file operations should complete successfully, and the connection should consistently show Transport: QUIC and Encrypted: True. Performance should be good even over internet connections due to QUIC's improved handling of packet loss and connection migration.

Pro tip: Monitor your server's performance using Performance Monitor (perfmon.msc). Add counters for "SMB Server Shares" and "SMB Server Sessions" to track usage and identify any performance bottlenecks.

Frequently Asked Questions

What are the main advantages of SMB over QUIC compared to traditional VPN-based file sharing?+
SMB over QUIC eliminates VPN infrastructure complexity while providing superior performance and security. It uses UDP 443 with mandatory TLS 1.3 encryption, handles network congestion better than TCP, supports connection migration for mobile users, and reduces latency through improved packet handling. Unlike VPNs, it doesn't require client software installation or complex network routing configurations.
Can I use SMB over QUIC with Windows Server 2022 or do I need Windows Server 2025?+
SMB over QUIC is supported on Windows Server 2022 Datacenter: Azure Edition or later, but Windows Server 2025 is recommended for production deployments. Windows Server 2025 provides full PowerShell configuration support and improved stability. Windows Server 2022 Standard edition does not support SMB over QUIC - you need the Datacenter edition specifically.
What type of TLS certificate do I need for SMB over QUIC and where should I install it?+
You need a valid TLS certificate with a Subject Alternative Name (SAN) that exactly matches your server's public FQDN. The certificate must be installed in the Local Machine certificate store (Cert:\LocalMachine\My). You can use certificates from public CAs like Let's Encrypt or DigiCert, or from your internal CA if clients trust it. Wildcard certificates work as long as the SAN matches the connection hostname.
How do I troubleshoot SMB over QUIC connections that fall back to TCP instead of using QUIC?+
QUIC fallback to TCP typically indicates certificate trust issues or network connectivity problems. First, verify the client trusts the server's certificate authority. Check that UDP 443 is allowed through all firewalls and routers in the path. Ensure both client and server have SMB over QUIC enabled using Get-SmbClientConfiguration and Get-SmbServerConfiguration. Test DNS resolution and verify the certificate thumbprint mapping using Get-SmbServerCertificateMapping.
Is SMB over QUIC secure enough for internet-facing file sharing without additional security measures?+
Yes, SMB over QUIC is designed for secure internet-facing deployments. It mandates TLS 1.3 encryption for all connections, uses certificate-based authentication, and can optionally require client certificates for additional security. The protocol includes built-in protection against man-in-the-middle attacks and replay attacks. However, you should still implement proper NTFS permissions, share-level security, and consider enabling client certificate authentication for highly sensitive environments.
Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...