Doesn't look like a real easy way to report on as it depends on the amount of interfaces and new interfaces can be added.
You could perhaps create a deployment package and script that queries the keys and write to a file, not ideal.
I did find this which I thought was useful.
The default setting is to obtain NetBIOS settings from your DHCP server, so you can disable it there and it will cover 99% of cases (unless a user explicitly turned it on).
Another option would be to use GPO to set the NetBIOS firewall rules to Block traffic.
For workstations we deployed a GPO that blocked outbound 137/139 UDP which effectively stops Responder attacks without having to deal with turning off netbios. Now on all new machine netbios is disabled in the image, but the GPO firewall rule was a lot quicker than relying on touching every interface.
https://support.managed.com/kb/a545/testing-and-disabling-netbios.aspx