A low‑level storage change quietly arriving in Windows Server 2025 has opened a backdoor for enthusiasts to unlock a dramatic boost for NVMe SSDs on Windows 11 — by switching on a native NVMe I/O path that bypasses decades of SCSI emulation. The capability is real and measurable in Microsoft’s server lab numbers, and community testers have reproduced consumer gains on Windows 11 by applying undocumented Feature Management overrides in the registry — but the path is unofficial, risky, and can break vendor tooling, backup workflows, and even disk visibility unless you proceed with care.
Windows historically exposed NVMe drives through a SCSI‑oriented stack that simplified OS device handling and compatibility with legacy tooling. That SCSI translation layer works, but it also introduces CPU cost, serialization points, and an I/O model that doesn’t match NVMe’s massively parallel, multi‑queue design. Microsoft’s Native NVMe initiative removes that translation for eligible devices: it installs a native NVMe class driver (nvmedisk.sys / related components) and exposes NVMe queue semantics natively to the kernel, lowering per‑IO overhead and reducing tail latency under concurrency. Microsoft’s server testing shows this can be a dramatic improvement in engineered workloads. What Microsoft reported in its server lab is straightforward and verifiable: using DiskSpd on an enterprise testbed, enabling the native NVMe path produced up to roughly 80% more 4K random IOPS and ~45% fewer CPU cycles per I/O on the specific configuration Microsoft published. Those figures are a server‑scale upper bound that depends heavily on hardware, concurrency, and the test profile. Independent editorial labs and outlets confirmed the high‑level trend while reporting that real‑world consumer gains are usually much smaller — but still tangible. Because the Server 2025 codebase shares large parts of the storage stack with Windows client builds, testers discovered the native components already exist in some Windows 11 servicing builds — they’re simply disabled by default for consumer SKUs. That opened the door to community experiments which used registry FeatureManagement overrides to flip the behavior on client machines. Those experiments are the origin of the recent headlines about seemingly “hidden” speedups in Windows 11.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides
Commonly applied values (community method) are:
If you run non‑critical hardware, have complete, verified backups, and are comfortable restoring images, the registry experiment can be a worthwhile, educational test — but treat it as an experiment, not a production upgrade. If your PC is mission‑critical, managed by IT, or relies on vendor tooling (Samsung Magician, Intel toolbox, imaging/backup software), wait for Microsoft or your vendor to provide an official client rollout or for vendor drivers to adopt the native path safely. Microsoft’s documented server toggle and lab guidance remain the proper, supported route for production server deployments.
Source: Inbox.lv A Hidden Way to Speed Up PC Performance Found in Windows 11
Background / Overview
Windows historically exposed NVMe drives through a SCSI‑oriented stack that simplified OS device handling and compatibility with legacy tooling. That SCSI translation layer works, but it also introduces CPU cost, serialization points, and an I/O model that doesn’t match NVMe’s massively parallel, multi‑queue design. Microsoft’s Native NVMe initiative removes that translation for eligible devices: it installs a native NVMe class driver (nvmedisk.sys / related components) and exposes NVMe queue semantics natively to the kernel, lowering per‑IO overhead and reducing tail latency under concurrency. Microsoft’s server testing shows this can be a dramatic improvement in engineered workloads. What Microsoft reported in its server lab is straightforward and verifiable: using DiskSpd on an enterprise testbed, enabling the native NVMe path produced up to roughly 80% more 4K random IOPS and ~45% fewer CPU cycles per I/O on the specific configuration Microsoft published. Those figures are a server‑scale upper bound that depends heavily on hardware, concurrency, and the test profile. Independent editorial labs and outlets confirmed the high‑level trend while reporting that real‑world consumer gains are usually much smaller — but still tangible. Because the Server 2025 codebase shares large parts of the storage stack with Windows client builds, testers discovered the native components already exist in some Windows 11 servicing builds — they’re simply disabled by default for consumer SKUs. That opened the door to community experiments which used registry FeatureManagement overrides to flip the behavior on client machines. Those experiments are the origin of the recent headlines about seemingly “hidden” speedups in Windows 11. What Microsoft actually shipped — verified numbers
- Microsoft’s announcement documents the feature as an opt‑in capability for Windows Server 2025, not a default consumer feature. The server guidance includes a documented FeatureManagement toggle and an explicit warning to stage and test the change. The official post also provides the DiskSpd command line parameters used in the lab.
- The lab numbers Microsoft published for their enterprise testbed are: up to ~80% higher 4K random IOPS and ~45% lower CPU cycles per I/O under a heavily parallel DiskSpd workload. Those figures came from a dual‑socket server test with enterprise NVMe media and are reproducible only in similar, high‑parallelism scenarios. Treat them as an upper bound, not a guaranteed consumer uplift.
- Independent editorial testing (consumer focus) repeatedly found smaller but meaningful gains on desktop workloads: single‑digit to low‑double‑digit percent improvements in many sequential workloads and larger improvements in small‑block random I/O and latency-sensitive patterns. Those results align with the expectation that server lab ceilings are seldom seen on a single consumer system.
How the community enabled it on Windows 11 (what’s being changed)
Advanced testers found that feature flags for Native NVMe exist in client servicing builds and can be toggled using FeatureManagement Overrides in the registry. The widely circulated, community‑tested sequence most often used in Windows 11 25H2 builds is three 32‑bit DWORD entries under:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides
Commonly applied values (community method) are:
- 735209102 = 1
- 1853569164 = 1
- 156965516 = 1
- Device Manager change: drives appear under a storage‑oriented class rather than legacy disk drives.
- Driver file: check Driver Details and confirm the in‑box native file like nvmedisk.sys is listed in C:\Windows\System32\drivers.
Benchmarks: lab vs. consumer vs. anecdote — what to expect
- Microsoft server numbers (lab upper bound): up to ~80% IOPS, ~45% CPU savings on a high‑end testbed with enterprise NVMe. These are reproducible in similar server conditions.
- Editorial and consumer lab tests: typical consumer gains reported by outlets like Tom’s Hardware, TechSpot, and TechRadar fall into single‑digit to mid‑teens percent range for mixed desktop workloads; improvements are usually greater for small random I/O than for sustained sequential throughput. These tests show the native path can reduce latency and increase small‑block IOPS, but will not magically double every consumer NVMe’s sequential throughput.
- Community anecdotes: specific hardware + firmware + workload combinations have produced striking jumps. Examples circulating in community posts include an SK hynix P41 showing double‑digit AS SSD gains and an individual report claiming up to 85% increase in random write speed on a Crucial T705 in a particular test scenario. These are intriguing — and worth noting — but they’re anecdotal and must be treated cautiously. Independent outlets reproduce some large gains, but they are not universal.
Compatibility, risks, and reported failures
The registry toggle is not a feature switch blessed for consumers. Multiple risk categories have been reported:- Vendor driver interaction: If your SSD is already using a vendor‑supplied NVMe driver (Samsung Magician driver, Intel/Solidigm vendor stacks, Western Digital tooling, or platform VMD drivers), the Microsoft native path may not replace or will conflict with the vendor driver, meaning you may see no change or get unpredictable behavior. Some vendor utilities may stop recognizing the drive correctly after the switch.
- Tooling and backup breakage: Backup suites, disk managers, encryption containers, and vendor utilities that rely on specific device classes or IDs can fail to find volumes or show duplicate/changed device IDs after the driver presentation changes. That can break scheduled backups or make restore points inaccessible until the registry change is undone. Editorial coverage warned about backup utilities and partition‑aware software misidentifying disks.
- Data/visibility incidents: There are community reports of drives temporarily losing file system accessibility or appearing with changed device layout, which in some cases was resolved after undoing the registry edits. Those reports are limited in number but consequential enough to emphasize caution: back up first. The changes can leave stale device entries in PnP tables and may require vendor tools (pnputil, diskpart, or reinstalling drivers) or a full reboot/restore to recover. Treat any claim of “no risk” with skepticism.
- Unsupported state & future updates: Because the client‑side override values are undocumented, Microsoft could change or remove the keys in future updates, and there is no official consumer support path for problems caused by an unsupported registry toggle. The server option is supported in its documented server path; the client hack is community‑driven.
A practical, safety‑first checklist (if you still want to experiment)
- Create a full disk image backup of the system disk (use an image tool that supports offline restore). Do not rely on a single restore point.
- Ensure you have current, verified file backups for critical data stored outside the system disk. Backups on the same physical drive are not sufficient.
- Update Windows 11 to the latest cumulative update for your build (the native components exist only in recent servicing branches). Verify Optional driver updates are applied where appropriate.
- Confirm the NVMe device is currently using the Windows in‑box driver (check Device Manager → Driver Details and confirm vendor driver vs. nvmedisk.sys). If a vendor driver is installed, expect reduced likelihood of benefit and higher risk.
- Export the registry branch you will change (File → Export in regedit) so you can restore it easily. Create a System Restore point as a secondary fallback.
- Apply the three registry DWORDs (or run the documented server toggle if you are on Server), reboot, then confirm driver presentation. Use Device Manager and run a small, non‑destructive benchmark and validate filesystem mount points.
- If you encounter odd behavior (missing partitions, unexpected drive IDs, backup failures), revert the registry change immediately, reboot, and check device visibility. Keep vendor rescue media and image restore tools ready.
- Open an elevated PowerShell or Command Prompt and run:
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides" /v 735209102 /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides" /v 1853569164 /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Policies\Microsoft\FeatureManagement\Overrides" /v 156965516 /t REG_DWORD /d 1 /f - Reboot and verify Device Manager and Driver Details.
Critical analysis — is the reward worth the risk?
Strengths- Architectural correctness: The native NVMe path aligns OS I/O handling to NVMe hardware design. When hardware and workload exercise parallelism and small‑block operations, it’s the right design. The server lab figures demonstrate what a native stack can unlock.
- Measurable desktop gains in many cases: Independent tests show improvements in small random I/O and latency — exactly the areas where consumer systems can feel snappier (app launches, database work, game asset streaming). While the gains are usually modest, they are real and predictable for the right workloads.
- Long‑term alignment: This move modernizes Windows’ storage stack to better use modern flash hardware, closing a gap where other OSes have long had native NVMe behavior.
- Unsupported client toggles: The registry method used by enthusiasts is undocumented for consumer Windows and may cause edge failures, tooling incompatibility, or worse. That makes it unsuitable for production or non‑technical users.
- Vendor tool conflicts and recoverability: Backup processes or vendor utilities that rely on stable device identifiers have a realistic chance of being disrupted. Recovery often requires reverting the toggle, and in some scenarios restoring from a full image backup may be the safest path.
- Variability by hardware & firmware: Drive controller, firmware version, platform NVMe stacks (Intel/AMD VMD), and whether you use vendor drivers determine benefit and risk. Some devices see minimal improvement; others improve notably. Expect uneven results.
- Systems administrators and lab testers who can stage changes, run regression tests, and restore images quickly.
- Enthusiasts with non‑critical machines who understand driver/registry recovery and maintain full backups.
- Avoid on laptops or machines where backups are incomplete, where disk encryption or vendor management tools are required for daily operations, or in corporate environments without IT approval.
Final verdict and practical recommendation
Microsoft’s native NVMe driver is an important architectural advance for Windows storage; their server results show the performance ceiling of the approach. Community efforts to enable the same path on Windows 11 demonstrate that consumer gains are possible, particularly for small random I/O and latency‑sensitive workloads. However, the method circulating in the community is an unsupported registry override for client builds, with documented compatibility caveats and real user reports of tooling misbehavior and temporary loss of access until the change is reverted. That combination of upside and tangible downside demands a conservative approach.If you run non‑critical hardware, have complete, verified backups, and are comfortable restoring images, the registry experiment can be a worthwhile, educational test — but treat it as an experiment, not a production upgrade. If your PC is mission‑critical, managed by IT, or relies on vendor tooling (Samsung Magician, Intel toolbox, imaging/backup software), wait for Microsoft or your vendor to provide an official client rollout or for vendor drivers to adopt the native path safely. Microsoft’s documented server toggle and lab guidance remain the proper, supported route for production server deployments.
Quick recap (TL;DR for power users)
- Microsoft added a native NVMe I/O path to Windows Server 2025 with lab claims of up to ~80% IOPS and ~45% CPU savings in engineered workloads.
- Community testers found the native components in recent Windows 11 servicing builds and used undocumented FeatureManagement registry overrides to enable the path on many client machines. Typical consumer gains are single‑digit to mid‑teens percent, with occasional larger anecdotes (one report cited up to 85% on a particular drive/test). Treat large anecdotes as unverified until reproduced widely.
- Enabling the native path on Windows 11 carries compatibility and recovery risks: vendor drivers may block or conflict, backup and disk‑aware tools may fail to find volumes, and some users reported temporary loss of access that was resolved by undoing the tweak. Back up first.
Source: Inbox.lv A Hidden Way to Speed Up PC Performance Found in Windows 11





