Skip to content

Instantly share code, notes, and snippets.

@jrnt30
Forked from CHEF-KOCH/Stopcallinghome.txt
Created December 15, 2015 19:49
Show Gist options
  • Save jrnt30/0044c45c81f353c986b2 to your computer and use it in GitHub Desktop.
Save jrnt30/0044c45c81f353c986b2 to your computer and use it in GitHub Desktop.
Windows 10 seems to be an privacy nightmare, here is how you can stop the home calling function
@echo off
cls
echo This Script will do the following:
echo Disable Data Logging Services
echo Configure Windows Explorer
echo Uninstall Onedrive
echo Edit the Hosts file to block sending Telemetry Data to Microsoft
echo.
echo press any key to continue...
pause > NUL
echo Checking for Administrator elevation...
echo.
openfiles > NUL 2>&1
if %errorlevel%==0 (
echo Elevation found! Proceeding...
) else (
echo You are not running as Administrator...
echo This batch cannot do it's job without elevation!
echo.
echo Right-click and select ^'Run as Administrator^' and try again...
echo.
echo Press any key to exit...
pause > NUL
exit
)
echo.
echo Disabling Data Logging Services
sc config diagtrack start=disabled
sc config dmwappushservice start=disabled
sc config RetailDemo start=disabled
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f > NUL 2>&1
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v AllowTelemetry /t REG_DWORD /d 0 /f > NUL 2>&1
schtasks /change /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /DISABLE
schtasks /change /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /DISABLE
schtasks /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /DISABLE
schtasks /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /DISABLE
schtasks /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /DISABLE
echo.
echo Removing all Folders from MyPC
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{088e3905-0323-4b02-9826-5d99428e115f}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{1CF1260C-4DD0-4ebb-811F-33C572699FDE}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{24ad3ad4-a569-4530-98e1-ab02f9417aa8}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{374DE290-123F-4565-9164-39C4925E467B}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3dfdf296-dbec-4fb4-81d1-6a3438bcf4de}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A0953C92-50DC-43bf-BE83-3742FED03C9C}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{d3162b92-9365-467a-956b-92703aca08af}" /f > NUL 2>&1
REG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{f86fa3ab-70d2-4fc7-9c99-fcbf05467f3a}" /f > NUL 2>&1
echo.
echo Setup Windows Explorer View
REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v LaunchTo /t REG_DWORD /d 1 /f > NUL 2>&1
REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t REG_DWORD /d 0 /f > NUL 2>&1
REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t REG_DWORD /d 1 /f > NUL 2>&1
REG DELETE "HKEY_CLASSES_ROOT\CABFolder\CLSID" /f > NUL 2>&1
REG DELETE "HKEY_CLASSES_ROOT\SystemFileAssociations\.cab\CLSID" /f > NUL 2>&1
REG DELETE "HKEY_CLASSES_ROOT\CompressedFolder\CLSID" /f > NUL 2>&1
REG DELETE "HKEY_CLASSES_ROOT\SystemFileAssociations\.zip\CLSID" /f > NUL 2>&1
echo.
echo Uninstalling OneDrive
set x86="%SYSTEMROOT%\System32\OneDriveSetup.exe"
set x64="%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe"
taskkill /f /im OneDrive.exe > NUL 2>&1
ping 127.0.0.1 -n 5 > NUL 2>&1
if exist %x64% (
%x64% /uninstall
) else (
%x86% /uninstall
)
ping 127.0.0.1 -n 8 > NUL 2>&1
rd "%USERPROFILE%\OneDrive" /Q /S > NUL 2>&1
rd "C:\OneDriveTemp" /Q /S > NUL 2>&1
rd "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S > NUL 2>&1
rd "%PROGRAMDATA%\Microsoft OneDrive" /Q /S > NUL 2>&1
echo.
echo Removeing OneDrive from the Explorer Side Panel.
REG DELETE "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f > NUL 2>&1
REG DELETE "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f > NUL 2>&1
echo.
echo Editing Hosts File
SET NEWLINE=^& echo.
FIND /C /I "telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "vortex.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 vortex.data.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "vortex-win.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 vortex-win.data.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "telecommand.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telecommand.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "telecommand.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "oca.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 oca.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "oca.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 oca.telemetry.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "sqm.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 sqm.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "sqm.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "watson.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "watson.telemetry.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "redir.metaservices.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 redir.metaservices.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "choice.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 choice.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "choice.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 choice.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "wes.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 wes.df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "reports.wes.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 reports.wes.df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "services.wes.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 services.wes.df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "sqm.df.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 sqm.df.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "watson.ppe.telemetry.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.ppe.telemetry.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "telemetry.appex.bing.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telemetry.appex.bing.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "telemetry.urs.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telemetry.urs.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "telemetry.appex.bing.net:443" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 telemetry.appex.bing.net:443>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "settings-sandbox.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 settings-sandbox.data.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "vortex-sandbox.data.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 vortex-sandbox.data.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "watson.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "survey.watson.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 survey.watson.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "watson.live.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 watson.live.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "statsfe2.ws.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 statsfe2.ws.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "corpext.msitadfs.glbdns2.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "compatexchange.cloudapp.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 compatexchange.cloudapp.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "cs1.wpc.v0cdn.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 cs1.wpc.v0cdn.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "a-0001.a-msedge.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 a-0001.a-msedge.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "fe2.update.microsoft.com.akadns.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 fe2.update.microsoft.com.akadns.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "statsfe2.update.microsoft.com.akadns.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 statsfe2.update.microsoft.com.akadns.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "sls.update.microsoft.com.akadns.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 sls.update.microsoft.com.akadns.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "diagnostics.support.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 diagnostics.support.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "corp.sts.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 corp.sts.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "statsfe1.ws.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 statsfe1.ws.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "pre.footprintpredict.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 pre.footprintpredict.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "i1.services.social.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 i1.services.social.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "i1.services.social.microsoft.com.nsatc.net" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 i1.services.social.microsoft.com.nsatc.net>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "feedback.windows.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 feedback.windows.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "feedback.microsoft-hohm.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 feedback.microsoft-hohm.com>>%WINDIR%\System32\drivers\etc\hosts
FIND /C /I "feedback.search.microsoft.com" %WINDIR%\system32\drivers\etc\hosts > NUL 2>&1
IF %ERRORLEVEL% NEQ 0 ECHO %NEWLINE%^0.0.0.0 feedback.search.microsoft.com>>%WINDIR%\System32\drivers\etc\hosts
echo.
echo.
echo Please make sure you do the following as well:
echo Head to Settings > Privacy, and disable everything, unless there are some things you really need.
echo While within the Privacy page, go to Feedback, select Never in the first box, and Basic in the second box
pause
pause
' VBS Script to get the Windows Product Key from a PC's registry.
'
' Save the VBScript as "getwinkey.vbs" somewhere on your WindowsPC.
' Now, when you double-click the local script file an alertbox pops up
' displaying the product key stored in the machine's Windows registry.
Set WshShell = WScript.CreateObject("WScript.Shell")
KeyPath = "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId"
MsgBox ExtractKey(WshShell.RegRead(KeyPath))
Function ExtractKey(KeyInput)
Const KeyOffset = 52
i = 28
CharWhitelist = "BCDFGHJKMPQRTVWXY2346789"
Do
Cur = 0
x = 14
Do
Cur = Cur * 256
Cur = KeyInput(x + KeyOffset) + Cur
KeyInput(x + KeyOffset) = (Cur \ 24) And 255
Cur = Cur Mod 24
x = x -1
Loop While x >= 0
i = i -1
KeyOutput = Mid(CharWhitelist, Cur + 1, 1) & KeyOutput
If (((29 - i) Mod 6) = 0) And (i <> -1) Then
i = i -1
KeyOutput = "-" & KeyOutput
End If
Loop While i >= 0
ExtractKey = KeyOutput
End Function
For the home versions you should change the registry yourself:
HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection, find the key 'AllowTelemetry' and put it on 0. (also check HKLM\SOFTWARE\Wow6432Node\Policies\Microsoft\ on 64 bit systems) HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive, find the key 'DisableFileSyncNGSC' and put it on 1. (also check HKLM\SOFTWARE\Wow6432Node\Policies\Microsoft\ on 64 bit systems) HKLM\SOFTWARE\Policies\Microsoft\Windows Defender, find the key 'DisableAntiSpyware' and put it on 1. (also check HKLM\SOFTWARE\Wow6432Node\Policies\Microsoft\ on 64 bit systems)
See also:
https://www.microsoft.com/en-us/download/details.aspx?id=25250
0.0.0.0 adnxs.com
0.0.0.0 c.msn.com
0.0.0.0 g.msn.com
0.0.0.0 h1.msn.com
0.0.0.0 msedge.net
0.0.0.0 ads.msn.com
0.0.0.0 adnexus.net
0.0.0.0 ac3.msn.com
0.0.0.0 c.atdmt.com
0.0.0.0 m.adnxs.com
0.0.0.0 rad.msn.com
0.0.0.0 so.2mdn.net
0.0.0.0 ads1.msn.com
0.0.0.0 ec.atdmt.com
0.0.0.0 flex.msn.com
0.0.0.0 rad.live.com
0.0.0.0 ui.skype.com
0.0.0.0 msftncsi.com
0.0.0.0 a-msedge.net
0.0.0.0 a.rad.msn.com
0.0.0.0 b.rad.msn.com
0.0.0.0 cdn.atdmt.com
0.0.0.0 m.hotmail.com
0.0.0.0 ads1.msads.net
0.0.0.0 a.ads1.msn.com
0.0.0.0 a.ads2.msn.com
0.0.0.0 apps.skype.com
0.0.0.0 b.ads1.msn.com
0.0.0.0 view.atdmt.com
0.0.0.0 watson.live.com
0.0.0.0 aidps.atdmt.com
0.0.0.0 preview.msn.com
0.0.0.0 static.2mdn.net
0.0.0.0 a.ads2.msads.net
0.0.0.0 b.ads2.msads.net
0.0.0.0 db3aqu.atdmt.com
0.0.0.0 secure.adnxs.com
0.0.0.0 www.msftncsi.com
0.0.0.0 cs1.wpc.v0cdn.net
0.0.0.0 live.rads.msn.com
0.0.0.0 ad.doubleclick.net
0.0.0.0 bs.serving-sys.com
0.0.0.0 a-0001.a-msedge.net
0.0.0.0 pricelist.skype.com
0.0.0.0 a-0002.a-msedge.net
0.0.0.0 a-0003.a-msedge.net
0.0.0.0 a-0004.a-msedge.net
0.0.0.0 a-0005.a-msedge.net
0.0.0.0 a-0006.a-msedge.net
0.0.0.0 a-0007.a-msedge.net
0.0.0.0 a-0008.a-msedge.net
0.0.0.0 a-0009.a-msedge.net
0.0.0.0 choice.microsoft.com
0.0.0.0 watson.microsoft.com
0.0.0.0 feedback.windows.com
0.0.0.0 aka-cdn-ns.adtech.de
0.0.0.0 cds26.ams9.msecn.net
0.0.0.0 lb1.www.ms.akadns.net
0.0.0.0 corp.sts.microsoft.com
0.0.0.0 az361816.vo.msecnd.net
0.0.0.0 az512334.vo.msecnd.net
0.0.0.0 telemetry.microsoft.com
0.0.0.0 msntest.serving-sys.com
0.0.0.0 secure.flashtalking.com
0.0.0.0 telemetry.appex.bing.net
0.0.0.0 pre.footprintpredict.com
0.0.0.0 vortex.data.microsoft.com
0.0.0.0 statsfe2.ws.microsoft.com
0.0.0.0 statsfe1.ws.microsoft.com
0.0.0.0 df.telemetry.microsoft.com
0.0.0.0 oca.telemetry.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com
0.0.0.0 telemetry.urs.microsoft.com
0.0.0.0 survey.watson.microsoft.com
0.0.0.0 compatexchange.cloudapp.net
0.0.0.0 feedback.microsoft-hohm.com
0.0.0.0 s.gateway.messenger.live.com
0.0.0.0 vortex-win.data.microsoft.com
0.0.0.0 feedback.search.microsoft.com
0.0.0.0 schemas.microsoft.akadns.net
0.0.0.0 watson.telemetry.microsoft.com
0.0.0.0 choice.microsoft.com.nsatc.net
0.0.0.0 wes.df.telemetry.microsoft.com
0.0.0.0 sqm.df.telemetry.microsoft.com
0.0.0.0 settings-win.data.microsoft.com
0.0.0.0 redir.metaservices.microsoft.com
0.0.0.0 i1.services.social.microsoft.com
0.0.0.0 vortex-sandbox.data.microsoft.com
0.0.0.0 diagnostics.support.microsoft.com
0.0.0.0 watson.ppe.telemetry.microsoft.com
0.0.0.0 msnbot-65-55-108-23.search.msn.com
0.0.0.0 telecommand.telemetry.microsoft.com
0.0.0.0 settings-sandbox.data.microsoft.com
0.0.0.0 sls.update.microsoft.com.akadns.net
0.0.0.0 fe2.update.microsoft.com.akadns.net
0.0.0.0 vortex-bn2.metron.live.com.nsatc.net
0.0.0.0 vortex-cy2.metron.live.com.nsatc.net
0.0.0.0 oca.telemetry.microsoft.com.nsatc.net
0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net
0.0.0.0 reports.wes.df.telemetry.microsoft.com
0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com
0.0.0.0 services.wes.df.telemetry.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com.nsatc.net
0.0.0.0 statsfe2.update.microsoft.com.akadns.net
0.0.0.0 i1.services.social.microsoft.com.nsatc.net
0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net
0.0.0.0 telemetry.appex.bing.com
0.0.0.0 nsa
0.0.0.0 ns4.1-800-hosting.com
0.0.0.0 ns3.1-800-hosting.com
0.0.0.0 ns2.1-800-hosting.com
0.0.0.0 ns1.1-800-hosting.com
0.0.0.0 ns7.dns-net.de
0.0.0.0 ns1.dns-net.de
0.0.0.0 ns2.21vianet.com.cn
0.0.0.0 ns1.21vianet.com.cn
0.0.0.0 dns.east3.247realmedia.com
0.0.0.0 dns.east1.247realmedia.com
0.0.0.0 name2.my7star.com
0.0.0.0 name1.my7star.com
0.0.0.0 warrane.connect.com.au
0.0.0.0 yarrina.connect.com.au
0.0.0.0 ns2.abac.com
0.0.0.0 ns1.abac.com
0.0.0.0 ns.above.net
0.0.0.0 ns3.above.net
0.0.0.0 dns2.accesscomm.ca
0.0.0.0 dns1.accesscomm.ca
0.0.0.0 ns2.pnap.net
0.0.0.0 ns1.pnap.net
0.0.0.0 ns3.pnap.net
0.0.0.0 dns2.artelecom.pt
0.0.0.0 dns1.artelecom.pt
0.0.0.0 ns.relc.com
0.0.0.0 ns.ukrnet.net
0.0.0.0 ns.ua.net
0.0.0.0 ns.lucky.net
0.0.0.0 ns.adams.net
0.0.0.0 lx.adams.net
0.0.0.0 ns2.acnusa.net
0.0.0.0 ns1.acnusa.net
0.0.0.0 ns2.eatel.net
0.0.0.0 gamma.aei.ca
0.0.0.0 delta.aei.ca
0.0.0.0 dns1.aeronetpr.com
0.0.0.0 dns2.aeronetpr.com
0.0.0.0 ns1.acelerate.com
0.0.0.0 ns2.acelerate.com
0.0.0.0 ns1.afrinic.net
0.0.0.0 ns.ati.tn
0.0.0.0 ns2.ati.tn
0.0.0.0 gate.aikotech.com.ua
0.0.0.0 ns.secondary.net.ua
0.0.0.0 dca-ans-01.inet.qwest.net
0.0.0.0 svl-ans-01.inet.qwest.net
0.0.0.0 ns2.calpop.com
0.0.0.0 ns1.calpop.com
0.0.0.0 thunder.lightning.net
0.0.0.0 storm.lightning.net
0.0.0.0 ns1.scservers.com
0.0.0.0 ns2.scservers.com
0.0.0.0 dns.jefftech.tec.pa.us
0.0.0.0 dns2.telia.com
0.0.0.0 dns1.telia.com
0.0.0.0 sns.tiscali.net
0.0.0.0 pns.tiscali.net
0.0.0.0 ns0.interoute.net.uk
0.0.0.0 ns1.interoute.net.uk
0.0.0.0 dns3.xspedius.net
0.0.0.0 dns2.xspedius.net
0.0.0.0 dns1.xspedius.net
0.0.0.0 ns2.level3.net
0.0.0.0 ns1.level3.net
0.0.0.0 proof.rain.fr
0.0.0.0 ns.ripe.net
0.0.0.0 bow.rain.fr
0.0.0.0 ya.akamai.com
0.0.0.0 access.akamai.com
0.0.0.0 ns1.amstec.net
0.0.0.0 ns2.amstec.net
0.0.0.0 authns3.sttl.qwest.net
0.0.0.0 authns2.dnvr.qwest.net
0.0.0.0 authns1.mpls.qwest.net
0.0.0.0 ns2.nlayer.net
0.0.0.0 ns1.nlayer.net
0.0.0.0 castor.teleglobe.net
0.0.0.0 pollux.teleglobe.net
0.0.0.0 ns1.jsv.qwest.net
0.0.0.0 ns1.ewr.qwest.net
0.0.0.0 ns1.iad.qwest.net
0.0.0.0 ns1.bur.qwest.net
0.0.0.0 ns3.he.net
0.0.0.0 ns2.he.net
0.0.0.0 ns1.he.net
0.0.0.0 mum.neric.org
0.0.0.0 dns2.neric.org
0.0.0.0 cva2.cableonline.com.mx
0.0.0.0 cva1.cableonline.com.mx
0.0.0.0 ns.alfa.com.ni
0.0.0.0 dns2.alfanumeric.com.ni
0.0.0.0 ns2.business.allstream.net
0.0.0.0 ns1.business.allstream.net
0.0.0.0 ns4-auth.alltel.net
0.0.0.0 ns2-auth.alltel.net
0.0.0.0 ns3-auth.alltel.net
0.0.0.0 ns1-auth.alltel.net
0.0.0.0 ns4-auth.windstream.net
0.0.0.0 ns2-auth.windstream.net
0.0.0.0 ns3-auth.windstream.net
0.0.0.0 ns1-auth.windstream.net
0.0.0.0 dns3.alphared.com
0.0.0.0 dns2.alphared.com
0.0.0.0 dns1.alphared.com
0.0.0.0 ns4.yahoo.com
0.0.0.0 ns2.yahoo.com
0.0.0.0 ns5.yahoo.com
0.0.0.0 ns1.yahoo.com
0.0.0.0 ns3.yahoo.com
0.0.0.0 ns1.nosc.mil
0.0.0.0 hamradio.ucsd.edu
0.0.0.0 dns.iarc.org
0.0.0.0 haig.cs.ucl.ac.uk
0.0.0.0 munnari.oz.au
0.0.0.0 hpcsos.col.hp.com
0.0.0.0 pdns3.ultradns.org
0.0.0.0 pdns1.ultradns.net
0.0.0.0 pdns2.ultradns.net
0.0.0.0 ns2.americatelnet.com.pe
0.0.0.0 ns1.americatelnet.com.pe
0.0.0.0 ns2.amis.net
0.0.0.0 ns1.amis.net
0.0.0.0 ns1.wa.amnet.net.au
0.0.0.0 ns2.wa.amnet.net.au
0.0.0.0 dns1.amnetsal.com
0.0.0.0 dns2.amnetsal.com
0.0.0.0 tungurahua.andinanet.net
0.0.0.0 pichincha.andinanet.net
0.0.0.0 mag2.magmacom.com
0.0.0.0 mag1.magma.ca
0.0.0.0 ns64.worldnic.com
0.0.0.0 ns63.worldnic.com
0.0.0.0 ns2.anteldata.com.uy
0.0.0.0 ns1.anteldata.com.uy
0.0.0.0 dns-06.ns.aol.com
0.0.0.0 dns-07.ns.aol.com
0.0.0.0 daha-07.ns.aol.com
0.0.0.0 daha-02.ns.aol.com
0.0.0.0 daha-01.ns.aol.com
0.0.0.0 dns-02.ns.aol.com
0.0.0.0 dns-01.ns.aol.com
0.0.0.0 ns2.apogeetelecom.com
0.0.0.0 ns1.apogeetelecom.com
0.0.0.0 nserver2.apple.com
0.0.0.0 nserver.apple.com
0.0.0.0 nserver.euro.apple.com
0.0.0.0 nserver.asia.apple.com
0.0.0.0 ns1.pbi.net
0.0.0.0 ns2.pbi.net
0.0.0.0 ns1.arabtel.net
0.0.0.0 ns2.arabtel.net
0.0.0.0 ns3.arcor-ip.de
0.0.0.0 ns1.arcor-ip.de
0.0.0.0 ns2.arcor-ip.de
0.0.0.0 point.areality.net
0.0.0.0 cover.areality.net
0.0.0.0 ns2.zbzoom.net
0.0.0.0 ns1.zbzoom.net
0.0.0.0 ns.embratel.net.br
0.0.0.0 ns2.embratel.net.br
0.0.0.0 ns1.landsraad.net
0.0.0.0 ns2.landsraad.net
0.0.0.0 ns2.arrival.net
0.0.0.0 ns1.arrival.net
0.0.0.0 ns2.arrownet.dk
0.0.0.0 ns1.arrownet.dk
0.0.0.0 ns2.romtelecom.net
0.0.0.0 ns1.romtelecom.net
0.0.0.0 ns1-lon.as5587.net
0.0.0.0 ns0-lon.as5587.net
0.0.0.0 ns2.asianetindia.com
0.0.0.0 ns1.asianetindia.com
0.0.0.0 dns.octor.com
0.0.0.0 dns.apol.com.tw
0.0.0.0 dns.ht.net.tw
0.0.0.0 ns3.mci.net
0.0.0.0 ns2.asp.bg
0.0.0.0 ns1.asp.bg
0.0.0.0 abac.au.ac.th
0.0.0.0 ns1.asta-net.pl
0.0.0.0 ns2.asta-net.pl
0.0.0.0 ns1.astral.ro
0.0.0.0 ns2.astral.ro
0.0.0.0 ns0.b.astral.ro
0.0.0.0 ns4.astral.ro
0.0.0.0 ns3.astral.ro
0.0.0.0 ns1.home.ne.jp
0.0.0.0 ns2.home.ne.jp
0.0.0.0 ns.uk.prserv.net
0.0.0.0 ns.nl.prserv.net
0.0.0.0 ns.de.prserv.net
0.0.0.0 dbru.br.ns.els-gms.att.net
0.0.0.0 cbru.br.ns.els-gms.att.net
0.0.0.0 dmtu.mt.ns.els-gms.att.net
0.0.0.0 cmtu.mt.ns.els-gms.att.net
0.0.0.0 fbru.br.ns.els-gms.att.net
0.0.0.0 fmtu.mt.ns.els-gms.att.net
0.0.0.0 ebru.br.ns.els-gms.att.net
0.0.0.0 emtu.mt.ns.els-gms.att.net
0.0.0.0 ns2.swbell.net
0.0.0.0 ns1.swbell.net
0.0.0.0 ns4.asp.att.net
0.0.0.0 ns3.asp.att.net
0.0.0.0 ns2.asp.att.net
0.0.0.0 ns1.asp.att.net
0.0.0.0 dns01.ono.com
0.0.0.0 dns02.ono.com
0.0.0.0 dns03.ono.com
0.0.0.0 dns1.avantel.net.mx
0.0.0.0 dns2.avantel.net.mx
0.0.0.0 ns2.betherenow.co.uk
0.0.0.0 ns1.betherenow.co.uk
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection]
"AllowTelemetry"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection]
"AllowTelemetry"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection]
"AllowTelemetry"=dword:00000000
@echo off
cls
set x86="%SYSTEMROOT%\System32\OneDriveSetup.exe"
set x64="%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe"
echo Closing OneDrive process.
echo.
taskkill /f /im OneDrive.exe > NUL 2>&1
ping 127.0.0.1 -n 5 > NUL 2>&1
echo Uninstalling OneDrive.
echo.
if exist %x64% (
%x64% /uninstall
) else (
%x86% /uninstall
)
ping 127.0.0.1 -n 5 > NUL 2>&1
echo Removing OneDrive leftovers.
echo.
rd "%USERPROFILE%\OneDrive" /Q /S > NUL 2>&1
rd "C:\OneDriveTemp" /Q /S > NUL 2>&1
rd "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S > NUL 2>&1
rd "%PROGRAMDATA%\Microsoft OneDrive" /Q /S > NUL 2>&1
echo Removeing OneDrive from the Explorer Side Panel.
echo.
REG DELETE "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f > NUL 2>&1
REG DELETE "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f > NUL 2>&1
sc config diagtrack start=disabled
sc config dmwappushservice start=disabled
Microsoft's Windows 10 has permission to spy on you
Well first of all "spying" is a bit misleading, it's written down in the eula/terms what can be collected, the major problem is that
this will be collected even on the first installation without getting any chance to change that.
Available Tools:
Destroy Windows 10 Spying
DoNotSpy10
Be careful with such tools (!), some of them are coming with OpenCandy and other stuff that also affects some security aspects. I not recommed to use
such tools.
Before/During Installation:
• Do not use Express Settings! Hit Customize, and make sure everything is turned off!
• It's strongly preferred that you use a local account with Windows 10.
After Installation:
• Head to Settings > Privacy, and disable everything, unless there are some things you really need.
• While within the Privacy page, go to Feedback, select Never in the first box, and Basic in the second box.
• Head to Settings > Update and Security > Advanced Options > Choose how updates are delivered, and turn the first switch off.
• Disable Cortana by clicking the Search bar/icon.
• (Optional) Disable web search in Search by going to Settings, and turning off Search online and include web results.
• Change the name of your PC by going to Start (or hitting the Windows key), typing About PC, and clicking Rename PC.
Slightly Complex
• Open up the Command Prompt by launching cmd as an administrator, and enter the following:
sc delete DiagTrack
sc delete dmwappushservice
echo "" > C:\ProgramData\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl
• Open up the Group Policy Editor by launching gpedit.msc as an administrator. Go through Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds. Double click Telemetry, hit Disabled, then apply. NOTE: This only truly works in the Enterprise edition, but the final step provides a decent enough workaround for Pro users.
• While still in the Group Policy Editor, go through Computer Configuration > Administrative Templates > Windows Components > OneDrive, double click Prevent the usage of OneDrive for file storage, hit Enabled, then apply.
• While still in the Group Policy Editor, go through Computer Configuration > Administrative Templates > Windows Components > Windows Defender, double click Turn Off Windows Defender, hit Enabled, then apply.
• Open up the Registry Editor by launching regedit as an administrator. Go through HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection, select AllowTelemetry, change its value to 0, then apply.
• First, download the Take Ownership tweak and enable it. Then, head to the Hosts File by going through C:\Windows\System32\Drivers\Etc, take ownership of the hosts file, and add all of the IPs from this page into the file.
@echo off
setlocal enableextensions enabledelayedexpansion
::
::Will stop services Diagnostic Tracking Service (diagtrack) and dmwappushservice (dmwappushsvc)
::
:BEGIN
echo.
echo This script MUST be ran as an Administrator in order to work.
echo.
choice /M "Did you run this as Administrator?"
If Errorlevel 2 echo Right click the .bat file and run as Administrator & GOTO END
echo.
echo Checking state of the Diagnostic Tracking Service... & timeout 1 >nul
echo.
sc query "diagtrack" & timeout 1 >nul
echo.
sc query "diagtrack" | findstr "STATE" | findstr "RUNNING" > nul
if %errorlevel% == 1 GOTO DIAG_STOPPED
if %errorlevel% == 0 GOTO DIAG_RUNNING
echo unknown status
GOTO END
::
:DIAG_STOPPED
echo The diagtrack service state is stopped.
echo This should prevent the dmwappushservice service from running. & timeout 1 >nul
GOTO CHECK_PUSH
::
:DIAG_RUNNING
echo The diagtrack service is running. & timeout 1 >nul
echo.
choice /M "Do you want to stop service?"
If Errorlevel 2 GOTO END
echo.
echo Stopping diagtrack service and disabling from startup & timeout 1 >nul
echo.
sc stop "diagtrack" & timeout 1 >nul
echo.
sc config "diagtrack" start= disabled & timeout 1 >nul
echo.
sc query "diagtrack" | findstr "STATE" | findstr "RUNNING" > nul
if %errorlevel% == 1 GOTO DIAG_STOP_SUCCESS
if %errorlevel% == 0 GOTO DIAG_STOP_FAIL
echo unknown status
GOTO END
::
:DIAG_STOP_SUCCESS
echo.
echo The Diagtrack service has been stopped!
echo This should automatically disable the dmwappushservice service. & timeout 1 >nul
GOTO CHECK_PUSH
::
:DIAG_STOP_FAIL
echo.
echo Diagtrack service is still running.. I give up.
echo Maybe try and run this as Administrator.
pause
GOTO END
::
:CHECK_PUSH
echo.
echo Checking the state of dmwappushservice just in case...
echo.
timeout 1 >nul
sc query "dmwappushsvc" >nul & timeout 1 >nul
echo.
sc query "dmwappushsvc" | findstr "STATE" | findstr "RUNNING" > nul
if %errorlevel% == 1 GOTO PUSH_STOPPED
if %errorlevel% == 0 GOTO PUSH_RUNNING
echo unknown status
GOTO END
::
:PUSH_STOPPED
echo The dmwappushsvc service state is stopped & timeout 1 >nul
GOTO END
::
:PUSH_RUNNING
echo Push srvice is running. & timeout 1 >nul
echo.
choice /M "Do you want to stop service?"
If Errorlevel 2 GOTO END
echo.
echo Stopping dmwappushsvc service and disabling from startup & timeout 1 >nul
echo.
sc stop "dmwappushsvc" & timeout 1 >nul
echo.
sc config "dmwappushsvc" start= disabled & timeout 1 >nul
echo.
sc query "dmwappushsvc" | findstr "STATE" | findstr "RUNNING" > nul
if %errorlevel% == 1 GOTO PUSH_STOP_SUCCESS
if %errorlevel% == 0 GOTO PUSH_STOP_FAIL
echo unknown status
GOTO END
::
:PUSH_STOP_SUCCESS
echo.
echo Push service has been stopped & timeout 1 >nul
GOTO CHECK_PUSH
::
:PUSH_STOP_FAIL
echo.
echo Push service is still running.. I give up.
echo Maybe try and run this as Administrator.
pause
GOTO END
::
:END
echo.
echo Nothing left to do.
echo.
pause
Computer Configuration > Administrative Templates > Windows Components > Windows Defender, double click Turn Off Windows Defender, hit Enabled, then apply.
(Replace with a good Anti-Virus -optional!)
Application Experience AND Customer Experience Improvement Program can be disabled by:
Right Click Start Menu > Computer Management > Expand 'Task Scheduler' > Expand 'Task Scheduler Library' > Expand 'Microsoft' > Expand 'Windows' > Click on 'Application Experience' > Disable all Tasks in Folder > Click on 'Customer Experience Improvement Program' > Disable all Tasks in Folder
Optional: Click on 'Task Scheduler Library' > Disable any Tasks you don't want Enabled.
In Computer Management > Expand 'Services and Applications' > Click on 'Services' > Right Click on 'Windows Media Player Network Sharing Service' > Properties > Startup Type 'Disabled' > Stop if running.
Ensure 'Windows Defender Service' is not running.
Disable / Stop 'Touch Keyboard and Handwriting Panel'
(Unless you are using a Touch Screen / Photoshop DrawPad thingy)
Disable / Stop 'Secondary Login'
(Unless you play Blizzard Entertainment Videogames, it needs this service to update / download games)
Disable / Stop 'Retail Demo Service'
Ensure 'Remote Registry' is Disabled / Stopped
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment