Disabling file and printer sharing reduces exposure of SMB services on untrusted networks and limits the impact of attacks that target open sharing ports such as TCP 445. Keeping sharing disabled on systems that do not intentionally publish shares helps prevent accidental data exposure and lowers the reachable attack surface.
In Windows 11, folder and printer sharing is handled by the SMB server components and Windows Firewall rules in the File and Printer Sharing group. The Advanced sharing settings page controls these rules per network profile (Public, Private, and Domain), determining whether inbound sharing traffic is accepted on the current network.
Turning off sharing prevents other devices from accessing shared folders and shared printers on the PC, but it does not delete existing shares or block outbound access to remote shares. On managed endpoints, Group Policy or security baselines may lock or revert sharing settings, and disabling sharing can break network printer workflows or legacy discovery features until re-enabled.

Changes apply per profile, so disabling sharing on Public does not automatically disable it on Private or Domain.
Devices on the same network will no longer be able to connect to shared folders or shared printers on this PC for the selected profile.
Disabling network discovery further reduces visibility on untrusted networks.