Disable "Telnet Client" feature
- Single actionThis page belongs to a script, containing basic changes to achieve a task.
- Windows onlyThis script improves your privacy on Windows
- Impact: MinimumSystem Functionality Loss Risk: Low
This action improves privacy with minimal impact when you run the recommended script. - Batch (batchfile)These changes use Windows system commands to update your settings.
- Fully reversible
You can fully restore this action (revert back to the original behavior) using this website.
The restore/revert methods provided here can help you fix issues.
Overview
This script disables the Telnet Client feature in Windows.
The Telnet Client enables remote server connections 1. It is inherently insecure because it transmits all data, including sensitive credentials, in clear text without encryption 2 3. This lack of encryption makes it vulnerable to interception and misuse 3. Due to these security flaws, entities such as NIST 2, Department of Defense 2 and Microsoft 1 recommend removing or disabling this feature.
Although this feature is disabled by default in newer versions of Windows 1, ensuring that it remains disabled can prevent accidental or unauthorized use.
This may lead to reduced functionality or connectivity issues, particularly in enterprise environments where remote administration is necessary.
Overview of default feature statuses
Feature name | TelnetClient |
Display name | Telnet Client |
Description | Allows you to connect to other computers remotely. |
Default (Windows 11 ≥ 23H2) | 🔴 Disabled |
Default (Windows 10 ≥ 22H2) | 🔴 Disabled |
Sources
- Windows 10: Enabling Telnet Client - TechNet Articles - United States (English) - TechNet Wiki. social.technet.microsoft.com. (2023).
Original: https://social.technet.microsoft.com/wiki/contents/articles/38433.windows-10-enabling-telnet-client.aspx
Archived: https://web.archive.org/web/20231207105605/https://social.technet.microsoft.com/wiki/contents/articles/38433.windows-10-enabling-telnet-client.aspx - The Telnet Client must not be installed on the system.. stigviewer.com. (2024).
Original: https://www.stigviewer.com/stig/microsoft_windows_10/2023-09-29/finding/V-220721
Archived: https://web.archive.org/web/20240413140012/https://www.stigviewer.com/stig/microsoft_windows_10/2023-09-29/finding/V-220721 - Secure Telnet – Information Technology. Missouri S&T. it.mst.edu. (2024).
Original: https://it.mst.edu/policies/secure-telnet
Archived: https://web.archive.org/web/20240413140230/https://it.mst.edu/policies/secure-telnet/
Apply Now
Choose one of three ways to apply:
Download script
Download and run the script directly- No app needed
- Offline usage
- Easy-to-apply
- Free
- Open-source
Help
How to apply or restore "Disable "Telnet Client" feature" using script
- ≈ 2 min to complete
- Tools: Web Browser
- Difficulty: Simple
- ≈ 5 instructions
- 1
Download
Download the script file by clicking on thebutton above.
Use button above to restore changes. - 2
Keep the file
If warned by your browser, keep the file. - 3
Open
Open the downloaded file. - 4
Exit
Once it's done, press any key to exit the window. - 5
Restart
Restart your computer for all changes to take effect.
Apply with privacy.sexy
Guided, automated application with safety checks- Recommended for most users
- Includes safety checks
- Free
- Open-source
- Popular
- Offline/Online usage
Help
How to apply or restore "Disable "Telnet Client" feature" using privacy.sexy
- ≈ 3 min to complete
- Tools: privacy.sexy
- Difficulty: Simple
- ≈ 4 instructions
- 2
Choose script
- Search for the script name: Disable "Telnet Client" feature
- Check the script by clicking on the checkbox.
- 3
Run
Click on ▶️ Run button at the bottom of the page.This button only appears on desktop version (recommended). On browser, use 💾 Save button.
- Apply
- Revert
:: Disable the "TelnetClient" feature
PowerShell -ExecutionPolicy Unrestricted -Command "$featureName = 'TelnetClient'; $feature = Get-WindowsOptionalFeature -FeatureName "^""$featureName"^"" -Online -ErrorAction Stop; if (-Not $feature) { Write-Output "^""Skipping: The feature `"^""$featureName`"^"" is not found. No action required."^""; Exit 0; }; if ($feature.State -eq [Microsoft.Dism.Commands.FeatureState]::Disabled) { Write-Output "^""Skipping: The feature `"^""$featureName`"^"" is already disabled. No action required."^""; Exit 0; }; try { Write-Host "^""Disabling feature: `"^""$featureName`"^""."^""; Disable-WindowsOptionalFeature -FeatureName "^""$featureName"^"" -Online -NoRestart -LogLevel ([Microsoft.Dism.Commands.LogLevel]::Errors) -WarningAction SilentlyContinue -ErrorAction Stop | Out-Null; } catch { Write-Error "^""Failed to disable the feature `"^""$featureName`"^"": $($_.Exception.Message)"^""; Exit 1; }; Write-Output "^""Successfully disabled the feature `"^""$featureName`"^""."^""; Exit 0"
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