The issue perhaps is rooted in the massive Server Message Block security hardening Microsoft introduced in Windows Server 2025. If your Windows 11 workstation is running an older build, or if a legacy Group Policy is disabling SMB signing on the client side, the server will instantly reject the connection without prompting for credentials, leaving the UNC path completely inaccessible.
To rule out an authentication protocol failure, ensure your users are not attempting to access the shared folder using the server's IP address or a short NetBIOS name. Windows Server 2025 has deprecated NetBIOS and enforces strict NTLM blocking. When you connect via an IP address, Windows falls back to legacy NTLM authentication, which the new security baselines will drop. You must explicitly map the network drive using the server's Fully Qualified Domain Name, such as \server.yourdomain.local\ShareName. Using the complete domain name forces the operating system to negotiate using the modern Kerberos authentication protocol, which satisfies the server's strict security requirements.
You should also verify that the SMB signing policies are perfectly aligned between the workstation and the server. On your Server 2025 machine, open the Registry Editor and navigate to the path HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters. Look for the registry DWORD named RequireSecuritySignature and ensure it is set to 1. You can achieve the same check by opening an elevated PowerShell window and running the command Get-SmbServerConfiguration | Select RequireSecuritySignature. You must run the equivalent check on the Windows 11 workstation using Get-SmbClientConfiguration | Select RequireSecuritySignature to ensure the client is also enforcing the signature, otherwise the secure connection will fail.
VP