Skip to main content

🔒 Disable LLMNR and NetBIOS on Windows

By default, Windows ships with insecure legacy protocols like LLMNR and NetBIOS enabled. These protocols can leak username and password hashes over the network and are often abused by tools like Responder.

Disabling them significantly reduces your attack surface.


🔧 Option 1: Using Group Policy (for Windows Pro / Enterprise)

  1. Press Win + R, type gpedit.msc and press Enter
  2. Navigate to:
    Computer Configuration > Administrative Templates > Network > DNS Client
  3. Double-click Turn Off Multicast Name Resolution
  4. Set it to Enabled
  5. Click OK

🔧 Option 2: Using the Registry (for Windows Home)

  1. Press Win + R, type regedit, press Enter

  2. Navigate to:

    HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\DNSClient

    If the path doesn't exist, create it.

  3. Create a new DWORD (32-bit) Value:

    • Name: EnableMulticast
    • Value: 0

🛑 Disable NetBIOS over TCP/IP

  1. Open Control PanelNetwork and Sharing Center
  2. Click on Change adapter settings
  3. Right-click your active network interface → Properties
  4. Select Internet Protocol Version 4 (TCP/IPv4)Properties
  5. Click Advanced → Go to the WINS tab
  6. Select: Disable NetBIOS over TCP/IP
  7. Click OK → Apply the settings

NetBIOSSettings


🔄 Reboot

Restart your machine to apply all settings.


✅ Verification

LLMNR status via PowerShell:

Get-NetAdapterBinding -ComponentID ms_llmnres

The output should show LLMNR is unbound/disabled.

NetBIOS status via Command Prompt:

nbtstat -n

Should return: "No names in cache" or empty output.