{"id":576,"date":"2025-07-29T15:38:50","date_gmt":"2025-07-29T20:38:50","guid":{"rendered":"https:\/\/triplescomputers.com\/blog\/?p=576"},"modified":"2025-09-01T20:38:51","modified_gmt":"2025-09-02T01:38:51","slug":"solution-0x80070035-the-network-path-was-not-found-on-windows-11-24h2","status":"publish","type":"post","link":"https:\/\/triplescomputers.com\/blog\/casestudies\/solution-0x80070035-the-network-path-was-not-found-on-windows-11-24h2\/","title":{"rendered":"SOLUTION: 0x80070035 \u2013 &#8220;The network path was not found&#8221; on Windows 11 24H2"},"content":{"rendered":"\n<p>If you\u2019ve recently upgraded to <strong>Windows 11\u202f24H2<\/strong> and suddenly can\u2019t access your NAS or another PC\u2019s shared folders, you\u2019re not alone. Microsoft quietly hardened <strong>SMB (Server Message Block)<\/strong> security defaults in this release, and one side effect is the dreaded:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Error Code:\u202f0x80070035<\/strong> \u2013 <em>The network path was not found<\/em><\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/triplescomputers.com\/blog\/wp-content\/uploads\/2025\/07\/error-code-80070035-network-path-was-not-found.webp\"><img loading=\"lazy\" decoding=\"async\" width=\"938\" height=\"279\" src=\"https:\/\/triplescomputers.com\/blog\/wp-content\/uploads\/2025\/07\/error-code-80070035-network-path-was-not-found.webp\" alt=\"\" class=\"wp-image-577\" srcset=\"https:\/\/triplescomputers.com\/blog\/wp-content\/uploads\/2025\/07\/error-code-80070035-network-path-was-not-found.webp 938w, https:\/\/triplescomputers.com\/blog\/wp-content\/uploads\/2025\/07\/error-code-80070035-network-path-was-not-found-300x89.webp 300w, https:\/\/triplescomputers.com\/blog\/wp-content\/uploads\/2025\/07\/error-code-80070035-network-path-was-not-found-768x228.webp 768w, https:\/\/triplescomputers.com\/blog\/wp-content\/uploads\/2025\/07\/error-code-80070035-network-path-was-not-found-500x149.webp 500w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What Changed?<\/h2>\n\n\n\n<p>Starting in 24H2, Windows now <strong>requires SMB signing<\/strong> (digitally signing every SMB packet) by default on <em>both<\/em> the client and server roles. While this makes sense in enterprise environments, many home users and small businesses still have older NAS devices, media servers, or peer\u2011to\u2011peer Windows PCs that either:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Don\u2019t understand SMB signing at all, or<\/li>\n\n\n\n<li>Support it but can\u2019t negotiate it quickly enough.<\/li>\n<\/ol>\n\n\n\n<p>The result is that Windows drops the connection before the remote share ever responds, and you get a network path error instead of an authentication prompt.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">The Fix: Make SMB Signing <em>Optional<\/em> Again<\/h2>\n\n\n\n<p>You don\u2019t have to turn SMB signing completely off (though you can). Simply tell Windows: <em>\u201cDon\u2019t require it\u2014use it if both sides support it.\u201d<\/em> There are three easy ways to do that.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">1. PowerShell (One\u2011Liners)<\/h4>\n\n\n\n<p>Run <strong>PowerShell as Administrator<\/strong> and paste:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code># Relax signing requirement for inbound (server) and outbound (client) SMB<br>Set-SmbServerConfiguration  -RequireSecuritySignature $false -Confirm:$false<br>Set-SmbClientConfiguration  -RequireSecuritySignature $false -Confirm:$false<br><\/code><\/pre>\n\n\n\n<p>If you\u2019re stuck with a legacy NAS that breaks even with optional signing, also run:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>Set-SmbServerConfiguration  -EnableSecuritySignature $false -Confirm:$false<br>Set-SmbClientConfiguration  -EnableSecuritySignature $false -Confirm:$false<br><\/code><\/pre>\n\n\n\n<p>That disables automatic signing entirely.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">2. Batch File<\/h4>\n\n\n\n<p>Save this as <code>Fix-SMBSigning.bat<\/code>, right\u2011click <strong>Run as Administrator<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>@echo off<br>setlocal EnableDelayedExpansion<br>set \"alert=\"<br><br>for %%K in (\"HKLM\\SYSTEM\\CurrentControlSet\\Services\\LanmanServer\\Parameters\"<br>            \"HKLM\\SYSTEM\\CurrentControlSet\\Services\\LanmanWorkstation\\Parameters\") do (<br>    for \/f \"tokens=3\" %%V in ('reg query %%K \/v RequireSecuritySignature 2^&gt;nul ^| find \"REG_DWORD\"') do if \/i \"%%V\"==\"0x1\" (<br>        if not defined alert echo Disabling SMB Signing Requirement &amp; set alert=1<br>        reg add %%K \/v RequireSecuritySignature \/t REG_DWORD \/d 0 \/f &gt;nul<br>    )<br>)<br>endlocal<br><br>:: Uncomment these lines if you want to force a restart of SMB services immediately<br>:: net stop lanmanserver \/y &amp; net start lanmanserver<br>:: net stop lanmanworkstation \/y &amp; net start lanmanworkstation<br><\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">3. Direct Registry Import<\/h4>\n\n\n\n<p>If you prefer a .reg file, paste the following into Notepad and save as <code>DisableSMBSigning.reg<\/code>, then <strong>double\u2011click<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>Windows Registry Editor Version 5.00<br><br>[HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\LanmanServer\\Parameters]<br>\"RequireSecuritySignature\"=dword:00000000<br><br>[HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\LanmanWorkstation\\Parameters]<br>\"RequireSecuritySignature\"=dword:00000000<br><\/code><\/pre>\n\n\n\n<p><strong>Reboot<\/strong> or restart the <code>LanmanServer<\/code> and <code>LanmanWorkstation<\/code> services for the change to take effect.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why Not Leave SMB Signing On?<\/h2>\n\n\n\n<p>If you\u2019re in a corporate environment with Active Directory, you should leave SMB signing required. But for home and small\u2011office setups\u2014especially with devices that can\u2019t handle it\u2014the risk of disabling the requirement is minimal as long as you\u2019re on a trusted LAN (which I&#8217;m sure your home network is&#8230; hopefully).<\/p>\n\n\n\n<p>SMB signing defends against man\u2011in\u2011the\u2011middle attacks by cryptographically verifying every packet. If all your devices are inside a secured network, that\u2019s probably not a major concern.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Bottom Line<\/h2>\n\n\n\n<p>The 24H2 update didn\u2019t <em>break <\/em>the connection to your NAS; it simply enforced a security feature your <a href=\"https:\/\/triplescomputers.com\/blog\/casestudies\/case-study-when-precision-undervolting-saves-a-1000-motherboard-replacement\/\">hardware<\/a> can\u2019t handle. Loosening that requirement restores normal behavior.<\/p>\n\n\n\n<p>If you\u2019re still seeing <strong>0x80070035<\/strong> after applying one of the fixes above, double\u2011check:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Firewall isn\u2019t blocking <strong>File and Printer Sharing (SMB\u2011In)<\/strong><\/li>\n\n\n\n<li>The remote device is actually reachable (ping its IP)<\/li>\n\n\n\n<li>Correct share permissions are in place<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve recently upgraded to Windows 11\u202f24H2 and suddenly can\u2019t access your NAS or another PC\u2019s shared folders, you\u2019re not alone. Microsoft quietly hardened SMB (Server Message Block) security defaults in this release, and one side effect is the dreaded: &hellip; <a href=\"https:\/\/triplescomputers.com\/blog\/casestudies\/solution-0x80070035-the-network-path-was-not-found-on-windows-11-24h2\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[181,3],"tags":[],"class_list":["post-576","post","type-post","status-publish","format-standard","hentry","category-application-troubleshooting","category-casestudies"],"_links":{"self":[{"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts\/576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/comments?post=576"}],"version-history":[{"count":1,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts\/576\/revisions"}],"predecessor-version":[{"id":584,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/posts\/576\/revisions\/584"}],"wp:attachment":[{"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/media?parent=576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/categories?post=576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/triplescomputers.com\/blog\/wp-json\/wp\/v2\/tags?post=576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}