The Universal Naming Convention (UNC) enables network file sharing, albeit at the risk of man-in-the-middle attacks and credential theft. In this article, we explain UNC paths and demonstrate how to secure them.
What You Will Learn
- What UNC paths are and why they are used in network file sharing.
- UNC path security risks
- How hardened UNC paths improve security
- Steps to harden UNC paths
- Security guidance
What is a Hardened UNC Path?
Universal Naming Convention (UNC) paths enable file sharing across networks. Hardening UNC paths enhances authentication and integrity, ensuring sensitive data is protected against tampering or unauthorized access while adhering to security best practices. To get secure access to the UNC paths, this policy must be configured.
The Hardened UNC Path is a Group Policy Object present at:
| Computer Configuration > Policies > Administrative Templates > Network > Network Provider |
This policy does not apply to a standalone system.
The recommended state for this policy is: Enabled. There are some prerequisites:
- Requires Mutual Authentication set for all NETLOGON and SYSVOL shares
- Requires Integrity set for all NETLOGON and SYSVOL shares
Now, only specific UNC paths are accessible. From Windows 8.0 / Windows Server 2012, the Server Message Block (SMB) privacy setting encryption is enabled by default. Older operating systems cannot access these paths unless they support SMB encryption. Therefore, proceed with caution when using this additional SMB encryption option.
How to Enable Hardened UNC Path?
UNC Hardening Default Value: Disabled
Policy Path:
| Computer ConfigurationPoliciesAdministrative TemplatesNetworkNetwork ProviderHardened UNC Paths |
By default, the group policy path is not available. You must add this Group Policy template:
NetworkProvider.admx/adml
Make sure that the UI path is set as ‘Enabled’ and the following paths are configured:
| *NETLOGON RequireMutualAuthentication=1, RequireIntegrity=1
*SYSVOL RequireMutualAuthentication=1, RequireIntegrity=1 |
Registry Settings:
The following registry settings back up this group policy setting:
| HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsNetworkProviderHardenedPaths: *NETLOGON
HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsNetworkProviderHardenedPaths: *SYSVOL |

Creating UNC paths relies on mapped network drive credentials to control access rather than enabling access directly via hidden root admin shares. Properly hardened UNC paths will restrict permissions through access control lists tied to Windows Explorer identities and domain credentials, preventing the exploitation of network resources.
Applying limits and auditing to UNC access using tools such as command prompt utilities and network infrastructure rules strengthens defenses.
Will hardening the UNC Path cause issues?
UNC (Universal Naming Convention) identifies devices, such as servers, printers, and other resources. Hardening UNC paths aligns with industry recommendations to protect against a variety of cyber threats, including credential-based attacks.
UNC Path Security Recommendations
CIS Benchmarks recommends:
‘Hardened UNC Paths’ is set to ‘Enabled, with “Require Mutual Authentication” and “Require Integrity” set for all NETLOGON and SYSVOL shares’
To mitigate the remote code execution vulnerability in Group Policy, the following steps must be followed:
- New security update installation
- Specific group policy settings must be deployed to all the systems on the domain from Windows Server 2008 to later versions.
Key Takeaways
- UNC paths are widely used for sharing files over a network.
- They are high-value targets for attackers.
- Unhardened UNC paths expose systems to potential attacks.
- Hardened UNC paths strengthen security.
- Compliance and security benchmarks recommend enabling hardening.
CalCom’s Automation Tools Harden UNC Paths
Every policy change, including configuration updates, impacts your production environment. Before making changes, it’s critical to verify no application or function relies on the UNC path.
CalCom’s hardening automation tool eliminates the need for extensive lab testing. It analyzes your production environment and automatically identifies the potential impact of configuration changes. This approach effectively hardens your infrastructure. This is especially important for medium-sized organizations and larger ones.