How to Disable Telnet and Legacy Network Services on Windows
Remove outdated network features that expand attack surface, and use Kudu to help identify legacy services to disable.
By the Kudu Team
Fix this automatically with Kudu
Run a free system scan to detect and resolve this issue automatically — no manual steps required.
Download Kudu Free →What Causes This?
Windows still includes some legacy networking features for compatibility with older apps, devices, and enterprise environments. Services like Telnet Client, Telnet Server, SMB 1.0/CIFS, and other outdated components can stay enabled even when you do not use them. That increases your PC’s attack surface because older protocols are less secure and are often targeted by malware, scanners, and unauthorized remote access attempts.
Common Symptoms
- Legacy features like Telnet Client or SMB 1.0 appear enabled in Windows Features
- Security scans warn about outdated or insecure network services
- You notice unnecessary listening ports or unexpected network activity
- Windows has older remote administration components enabled that you do not use
- Your PC is harder to lock down because unused networking features remain installed
How to Fix It Manually
-
Check which legacy Windows features are enabled
- Press
Windows + R, typeoptionalfeatures, and pressEnter. - In Windows Features, look for older components such as:
- Telnet Client
- TFTP Client
- SMB 1.0/CIFS File Sharing Support
- Simple TCP/IP services if present
- If you do not actively use them, clear their checkboxes.
- Click OK and let Windows apply the changes.
- Press
-
Disable Telnet services if they exist
- Press
Windows + R, typeservices.msc, and pressEnter. - In the Services window, look for Telnet or any similarly named legacy remote access service.
- Double-click it, set Startup type to Disabled, then click Stop if the service is running.
- Click Apply, then OK.
- Press
-
Turn off legacy features with PowerShell if needed
- Right-click Start and choose Windows Terminal (Admin) or PowerShell (Admin).
- To disable Telnet Client, run:
Disable-WindowsOptionalFeature -Online -FeatureName TelnetClient - To disable SMB 1.0, run:
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol - If Windows says a restart is required, save your work and restart your PC.
-
Review startup and background services
- Open Task Manager with
Ctrl + Shift + Esc. - Go to the Startup apps tab and disable entries tied to old remote management or network tools you no longer use.
- Then return to services.msc and review services with descriptions related to remote access, file sharing, or legacy protocols.
- Do not disable services unless you recognize them or have confirmed they are unnecessary.
- Open Task Manager with
-
Check Windows Defender Firewall rules
- Press
Windows + R, typewf.msc, and pressEnter. - Click Inbound Rules.
- Look for rules related to Telnet, SMB, TFTP, or other legacy services.
- Right-click unused rules and choose Disable Rule.
- Press
-
Restart and verify the changes
- Restart your PC.
- Open Windows Features again and confirm the legacy components remain unchecked.
- If you use a security scanner, run it again to confirm the warnings are gone.
Fix It Automatically with Kudu
Kudu can scan your PC for outdated Windows features, unnecessary startup items, and legacy services that increase security risk. Instead of checking Windows Features, Services, and firewall rules one by one, Kudu helps identify what is safe to disable and simplifies the cleanup.
Fix this automatically with Kudu
Run a free system scan to detect and resolve this issue automatically — no manual steps required.
Download Kudu Free →Related guides
How to Disable UPnP on Windows to Reduce Network Risk
Turn off UPnP to limit automatic port exposure and reduce attack surface, and use Kudu to help review open services.
How to Disable AutoRun and AutoPlay on Windows
Prevent USB and removable-drive attacks by disabling AutoRun and AutoPlay, and use Kudu to help harden Windows safely.
How to Disable SMB1 Protocol on Windows
Disable legacy SMB1 to reduce exposure to wormable network attacks, and use Kudu to help audit old Windows features.
How to Disable Windows Script Host to Stop Script-Based Malware
Disabling WSH can block VBS and JS malware on systems that do not need it, and Kudu can help review safe hardening steps.