Skip to content

Instantly share code, notes, and snippets.

<Configuration>
<Add OfficeClientEdition="64" Channel="Current">
<Product ID="O365ProPlusRetail">
<Language ID="MatchOS" />
<Language ID="tr-tr" />
<ExcludeApp ID="Access" />
<ExcludeApp ID="Bing" />
<!-- <ExcludeApp ID="Excel" /> -->
<ExcludeApp ID="Groove" />
####################################################################################################
# BOOTSTRAP #
####################################################################################################
# Run script as Administrator if the session isn't elevated
if (-not ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]"Administrator")) {
$ArgumentList = "-NoExit -NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`""
Start-Process -FilePath "powershell.exe" -ArgumentList "$ArgumentList" -Verb RunAs
Exit
}
# Disable Windows Defender within Safe Boot
$WdServices = $(
"MDCoreSvc"
"SecurityHealthService"
"WdNisSvc"
"WinDefend"
"wscsvc"
)
foreach ($WdService in $WdServices) {

Keybase proof

I hereby claim:

  • I am dyavuz on github.
  • I am dyavuz (https://keybase.io/dyavuz) on keybase.
  • I have a public key ASD_8fjlhKUs0x66fqL6oX6ULiWnAvaHXmP-xJJpbyXiLgo

To claim this, I am signing this object: