- To connect to Samba shares from Domain connected Windows 10 clients or servers, scroll to the section titled "Domain Connected Windows 10 Clients / Servers"
- For users of Windows 10 enterprise and education editions, who lost access to SMB shares in the fall of 2018, scroll to the section titled “Loss of SMB shares with Guest access” near the bottom.
- For users of OMV3, using Remote Mount to connect to Windows 10 client shares, scroll to the bottom.
Since this How-To was originally posted, Microsoft has made changes that simplify connecting Windows 10 clients to OMV network shares. One change was abandoning the "homegroup", as of version 1803, in favor of the time tested "workgroup". However, “browsing” for non-Windows servers under Windows Explorer, Network, is still problematic. While this may be somewhat inconvenient, after changing the appropriate network settings (following), there's a shortcut work around that's easy to setup and use.
Set Private NetworkMake the selections shown.
systemsecurity.PNG
Click “Next”.
A reboot is required.
wrkgrpname.PNG
Click "OK".
A reboot is required.
(For more information, see Note 3.)
OMV-wrkgrp.png
Make the following changes to the Private Profile. Leave the Guest or Public and All Networks as they are.
AdvancedSharingSettings.PNG
Save Changes
A reboot is required.
For most cases, the network setting changes made above should allow OMV's shares to be mapped as network drives, and for the creation of a Server short cut as follows.
Right click on the Windows 10 Desktop. Select New, Shortcut. The location will be \\OMVSERVERIPADDR (substitute in your servers IP address similar to this -> \\192.168.1.50). Click Next.
Name the Shortcut. (I used the server's name for this shortcut name).
When finished, the properties of the short cut should be similar to the following (with your server's IP address in the Target: field).
This modification allows admin's to change security policy, on a per-client basis, to allow connections to non-domain servers hosting network shares. It also works on Domain controllers.
On the Windows 10 client:
At the Start Button, in the search box, Type: regedit.exe and start the registry editor.
Navigate to Computer\HKLM\SYSTEM\CurrentControlSet\Control\Lsa
In the right hand window right click and select New, DWORD (32bit) Value
When it created, rename New Value #1 to LmCompatibilityLevel
Double click on LmCompatibilityLevel and set the value data to 5
Level 5 is the highest authentication level and it should work for connections to an OMV server. For other use cases, see the explanation and -> guide to the levels 1 through 5. Due to security risks, level 3 is the recommended minimum.
regedit.PNG
________________________________________________________________________________________________
For Windows 10 Clients on closed networks or that are not fully up-to-date for other reasons; the following may help with
OMV - Windows 10 connectivity.
____________________________________________________________________________________________
**Adding items to the Windows registry entails some risk from “Fat Finger” errors. Use caution.**
Run Windows Power Shell as Administrator (Right click to run as administrator)
Copy and paste the following lines into the Power Shell window.
(Do this CLEANLY, ensuring that the entire line is copied and pasted in before hitting Enter.)
ions The
These commands create 3 registry keys and set SMB2 as the operational SMB protocol. With these items added to the registry users can, selectively, turn SMB levels on or off with the registry editor.
Optional:
To verify the Power Shell cmdlet made the additions to the Registry, regedit.exe can be used. Browse to the location shown below and check the parameters for SMB1 through 3.

For more information see Note 2
Continued in the next post.
- For users of Windows 10 enterprise and education editions, who lost access to SMB shares in the fall of 2018, scroll to the section titled “Loss of SMB shares with Guest access” near the bottom.
- For users of OMV3, using Remote Mount to connect to Windows 10 client shares, scroll to the bottom.
___________________________________________________________________________
Since this How-To was originally posted, Microsoft has made changes that simplify connecting Windows 10 clients to OMV network shares. One change was abandoning the "homegroup", as of version 1803, in favor of the time tested "workgroup". However, “browsing” for non-Windows servers under Windows Explorer, Network, is still problematic. While this may be somewhat inconvenient, after changing the appropriate network settings (following), there's a shortcut work around that's easy to setup and use.
___________________________________________________________________________
Set Private Network
systemsecurity.PNG
Click “Next”.
A reboot is required.
__________________________________________________________________________________________
Set WORKGROUP name
(In the same location as above:)
Set WORKGROUP name
(In the same location as above:)
wrkgrpname.PNG
Click "OK".
A reboot is required.
(For more information, see Note 3.)
__________________________________________________________________________________________
Set WORKGROUP name in OMV
- Setting the identical workgroup name in OMV is required.
OMV-wrkgrp.png
__________________________________________________________________________________________
Advanced Sharing Settings
Make the following changes to the Private Profile. Leave the Guest or Public and All Networks as they are.
AdvancedSharingSettings.PNG
Save Changes
A reboot is required.
__________________________________________________________________________________________
For most cases, the network setting changes made above should allow OMV's shares to be mapped as network drives, and for the creation of a Server short cut as follows.
____________________________________________________________
Create an OMV Server Shortcut
The previous steps will ensure that mapped network drives will work. However, Windows 10 may not recognize non-Windows hosts under Windows Explorer, Network. To get past this Windows 10 specific issue, create a Shortcut for your OMV server on the DesktopRight click on the Windows 10 Desktop. Select New, Shortcut. The location will be \\OMVSERVERIPADDR (substitute in your servers IP address similar to this -> \\192.168.1.50). Click Next.
Name the Shortcut. (I used the server's name for this shortcut name).
When finished, the properties of the short cut should be similar to the following (with your server's IP address in the Target: field).
W10shortcut.PNG
** For convenience, right click the completed Shortcut icon and pin it to Quick Access and Start. **
** For convenience, right click the completed Shortcut icon and pin it to Quick Access and Start. **
____________________________________________________________
Domain Connected Windows 10 Clients / Servers
(and, potentially, other difficult cases)
Thanks to @macom for this contribution.
Domain Connected Windows 10 Clients / Servers
(and, potentially, other difficult cases)
Thanks to @macom for this contribution.
This modification allows admin's to change security policy, on a per-client basis, to allow connections to non-domain servers hosting network shares. It also works on Domain controllers.
On the Windows 10 client:
At the Start Button, in the search box, Type: regedit.exe and start the registry editor.
Navigate to Computer\HKLM\SYSTEM\CurrentControlSet\Control\Lsa
In the right hand window right click and select New, DWORD (32bit) Value
When it created, rename New Value #1 to LmCompatibilityLevel
Double click on LmCompatibilityLevel and set the value data to 5
Level 5 is the highest authentication level and it should work for connections to an OMV server. For other use cases, see the explanation and -> guide to the levels 1 through 5. Due to security risks, level 3 is the recommended minimum.
regedit.PNG
________________________________________________________________________________________________
For Windows 10 Clients on closed networks or that are not fully up-to-date for other reasons; the following may help with
OMV - Windows 10 connectivity.
____________________________________________________________________________________________
Windows 10 Client: Enable SMB2 - DisableSMB3
**Adding items to the Windows registry entails some risk from “Fat Finger” errors. Use caution.**
Run Windows Power Shell as Administrator (Right click to run as administrator)
Copy and paste the following lines into the Power Shell window.
(Do this CLEANLY, ensuring that the entire line is copied and pasted in before hitting Enter.)
ions The
Source Code
- Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" SMB1 -Type DWORD -Value 0 –Force
- Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" SMB2 -Type DWORD -Value 1 –Force
- Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" SMB3 -Type DWORD -Value 0 –Force
These commands create 3 registry keys and set SMB2 as the operational SMB protocol. With these items added to the registry users can, selectively, turn SMB levels on or off with the registry editor.
Optional:
To verify the Power Shell cmdlet made the additions to the Registry, regedit.exe can be used. Browse to the location shown below and check the parameters for SMB1 through 3.
For more information see Note 2
_________________________________________________________________________________________________________________
Continued in the next post.
Video Guides



Good backup takes the "drama" out of computing.
Primary: OMV 4.1.17, ThinkServer TS140, 12GB ECC, 16GB USB boot, 4TB+4TB zmirror, 3TB client backup.
OMV 4.1.17, Intel Server SC5650HCBRP, 32GB ECC, 16GB USB boot, UnionFS+SNAPRAID
Backup: OMV 4.1.9, Acer RC-111, 4GB, 32GB USB boot, 3TB+3TB zmirror, 4TB Rsync'ed disk
The post was edited 55 times, last by flmaxey: minor additions, edits ().