When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Windows Server vNext build 25997 for Insiders adds SMB over QUIC in more editions

Windows Server VNext

Microsoft has released the latest Windows Server build for people in the Windows Server Insider Program. It has the build number of 25997 and, among many changes, adds SMB over QUIC to the Datacenter and Standard editions

The new version is available to download as an ISO from the Windows Server Insider website along with a VHDX. It contains both the (Windows 11) Desktop Experience as well as a Server Core installation option for Datacenter and the Standard edition. There's also an Azure Edition, but it's only available via virtual machines.

Here is the changelog:

What's New

SMB over QUIC now available in Datacenter and Standard editions

Starting with this build (Build 25997), the SMB over QUIC server feature is now available in Windows Server Datacenter and Standard editions. This changes the previous behavior, where it was only available in Windows Server Azure Edition.

SMB firewall rule changes

Starting with this build (Build 25997), creating SMB shares changes a longtime Windows Defender Firewall default behavior. Previously, creating a share automatically configured the firewall to enable the rules in the “File and Printer Sharing” group for the given firewall profiles. Now, Windows automatically configures the new “File and Printer Sharing (Restrictive)” group, which no longer contains inbound NetBIOS ports 137-139. We plan future updates for this rule to also remove inbound ICMP, LLMNR, and Spooler Service ports and restrict down to the SMB sharing-necessary ports only.

This change enforces a higher default standard for network security as well as bringing SMB firewall rules closer to the Windows Server “File Server” role behavior. Administrators can still configure the “File and Printer Sharing” group if necessary as well as modify this new firewall group.

SMB NTLM blocking exception list

Starting with this build (Build 25997), the new SMB NTLM blocking feature first announced in Windows 11 Insider Preview Build 25951 now supports specifying exception lists for NTLM usage. This allows an administrator to configure a general block on NTLM usage while still allowing clients to use NTLM for specific servers that do not support Kerberos, either because they are not Active Directory domain joined or are a third party without Kerberos support.

For more information on this change, review https://aka.ms/SmbNtlmBlock.

SMB alternative client and server ports

Starting with this build (Build 25997), the SMB client now supports connecting to an SMB server over TCP, QUIC, or RDMA using alternative network ports to the hardcoded defaults. Previously, SMB only supported TCP/445, QUIC/443, and RDMA iWARP/5445. In addition, the SMB over QUIC server in Windows Server will add support for SMB over QUIC endpoints configured with different ports than 443 in a future preview release. Windows Server will not support configuring alternative SMB server TCP ports, but third parties such as Samba do.

You can specify an alternative SMB client port using the NET USE command and New-SmbMapping PowerShell cmdlet. You can also completely disable this feature with a group policy.

  • For more information on using this option, review https://aka.ms/SMBAlternativePorts.
  • For more information on configuring non-standard SMB server ports in third parties, consult their product documentation.

SMB over QUIC client access control certificate changes

Starting with this build (Build 25997), the SMB over QUIC client access control feature first announced in Windows 11 Insider Preview Build 25977 now supports using certificates with subject alternative names and not just a single subject. This means the client access control feature now supports using a Microsoft AD Certificate Authority and multiple endpoint names, just like the currently released version of SMB over QUIC. You can now evaluate the feature using the recommended options and not require self-signed test certificates.

The following new features are specific to Windows Server with Desktop Experience only. Some of these will require running the OS on physical systems AND having the right drivers on hand.

  • Additions to Accounts: Email & Accounts is now consistent with Windows 11. Please note, that domain join will still be necessary for most scenarios.
  • Increased coverage for Bluetooth devices. Many of you want to use BT to connect mice, keyboards, and audio devices at the Edge. Please try out your favorite keyboard, mouse, headphones, or other BT peripheral!
    • Wi-Fi present by default. Many of you want to connect servers to Wi-Fi networks at the Edge. While Wireless LAN service has been present in Windows Server, it was disabled by default. Wi-Fi support is now currently enabled by default for Edge scenarios. You will need the appropriate hardware and drivers handy. Please verify that your wireless devices work properly. When hardware and the correct drivers are present, see the corresponding Settings and Taskbar experiences. Let us know what you think!
  • First login privacy settings: This is not the final version, but you will notice a Windows 11 like first login “OOBE” experience, albeit limited to user privacy settings.

.Known Issues

  • The new Feedback Hub and Terminal apps are not functioning properly in this release due to known issues. These will be addressed in a future release. Please continue to submit feedback as described in the "We value your feedback!" section below.
  • If you are validating upgrades from Windows Server 2019 or 2022, we do not recommend that you use this build as intermittent upgrade failures have been identified for this build.
  • This build has an issue where archiving eventlogs with "wevetutil al" command causes the Windows Event Log service to crash, and the archive operation to fail. The service must be restarted by executing "Start-Service EventLog" from an administrative command line prompt.
  • If you have Secure Launch/DRTM code path enabled, we do not recommend that you install this build.

The Windows Server Preview currently is on the same build number as the current Windows 11 Insider Canary channel, which might indicate we won't see a new Server version until 2024 when Windows 12 is expected to be released.

Here's some more important info on this release:

Available Downloads

  • Downloads to certain countries may not be available. See Microsoft suspends new sales in Russia - Microsoft On the Issues
  • Windows Server Long-Term Servicing Channel Preview in ISO format in 18 languages, and in VHDX format in English only.
  • Windows Server Datacenter Azure Edition Preview in ISO and VHDX format, English only.
  • Microsoft Server Languages and Optional Features Preview

Keys: Keys are valid for preview builds only

  • Server Standard: MFY9F-XBN2F-TYFMP-CCV49-RMYVH
  • Datacenter: 2KNJJ-33Y9H-2GXGX-KMQWH-G6H67
  • Azure Edition does not accept a key

Symbols: available on the public symbol server – see Using the Microsoft Symbol Server.

Expiration: This Windows Server Preview will expire on September 15, 2024.

You can download the build here, and find the official announcement here.

Report a problem with article
Suicide Squad screenshot
Next Article

The first Suicide Squad: Kill the Justice League video insider diary is all about story

Windows 11 Insider Preview
Previous Article

Microsoft fixes Windows 11 File Explorer context menu, address bar crashes in build 23590

Join the conversation!

Login or Sign Up to read and post a comment.

0 Comments - Add comment