Skip to content

Instantly share code, notes, and snippets.

@ericlaw1979
Created October 17, 2025 16:33
Show Gist options
  • Select an option

  • Save ericlaw1979/1b7239ae22a9fe4ecf7c396255bff259 to your computer and use it in GitHub Desktop.

Select an option

Save ericlaw1979/1b7239ae22a9fe4ecf7c396255bff259 to your computer and use it in GitHub Desktop.
Turn Shell Previews back on regardless of file source.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
"180F"=dword:00000000
@nicoleahmed
Copy link
Copy Markdown

can this be used at HKCU - i have limited regedit rights on my org computer (and an IT team that I can't go to for help with anything )

@ericlaw1979
Copy link
Copy Markdown
Author

Yes, HKEY_CURRENT_USER will work fine so long as there's not an entry that overrides it in HKLM.

@nicoleahmed
Copy link
Copy Markdown

Thank you it worked!

@kirimaru-jp
Copy link
Copy Markdown

kirimaru-jp commented May 17, 2026

Warning, this exposes you to the risk of NTLM hash leaks: https://textslashplain.com/2019/10/09/navigating-to-file-urls/#:~:text=to%20Edge%2095%2B.-,What%E2%80%99s%20the%20Risk%3F,-The%20most%20obvious

You should disable NTLM over SMB to address that risk: Set-SMbClientConfiguration -BlockNTLM $true from PowerShell. https://www.anoopcnair.com/windows-11-security-blocking-ntlm-over-smb/

It failed on Windows 10:

Set-SMbClientConfiguration -BlockNTLM $true
Set-SmbClientConfiguration : A parameter cannot be found that matches parameter name 'BlockNTLM'.
At line:1 char:28

  • Set-SMbClientConfiguration -BlockNTLM $true
  •                        ~~~~~~~~~~
    
    • CategoryInfo : InvalidArgument: (:) [Set-SmbClientConfiguration], ParameterBindingException
    • FullyQualifiedErrorId : NamedParameterNotFound,Set-SmbClientConfiguration

Is it the same if one configs it in Group Policy as shown below?

  1. Run gpedit.msc

  2. Navigate to: Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

  3. Double-click "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers"

  4. Set it to "Deny all"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment