-
-
Save mark05e/2db81671f39a041a5992a64a77748dc7 to your computer and use it in GitHub Desktop.
# ██████╗ ███████╗███╗ ███╗ ██████╗ ██╗ ██╗███████╗ ██╗ ██╗██████╗ | |
# ██╔══██╗██╔════╝████╗ ████║██╔═══██╗██║ ██║██╔════╝ ██║ ██║██╔══██╗ | |
# ██████╔╝█████╗ ██╔████╔██║██║ ██║██║ ██║█████╗ ███████║██████╔╝ | |
# ██╔══██╗██╔══╝ ██║╚██╔╝██║██║ ██║╚██╗ ██╔╝██╔══╝ ██╔══██║██╔═══╝ | |
# ██║ ██║███████╗██║ ╚═╝ ██║╚██████╔╝ ╚████╔╝ ███████╗ ██║ ██║██║ | |
# ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ ╚═════╝ ╚═══╝ ╚══════╝ ╚═╝ ╚═╝╚═╝ | |
# | |
# ██████╗ ██╗ ██████╗ █████╗ ████████╗██╗ ██╗ █████╗ ██████╗ ███████╗ | |
# ██╔══██╗██║ ██╔═══██╗██╔══██╗╚══██╔══╝██║ ██║██╔══██╗██╔══██╗██╔════╝ | |
# ██████╔╝██║ ██║ ██║███████║ ██║ ██║ █╗ ██║███████║██████╔╝█████╗ | |
# ██╔══██╗██║ ██║ ██║██╔══██║ ██║ ██║███╗██║██╔══██║██╔══██╗██╔══╝ | |
# ██████╔╝███████╗╚██████╔╝██║ ██║ ██║ ╚███╔███╔╝██║ ██║██║ ██║███████╗ | |
# ╚═════╝ ╚══════╝ ╚═════╝ ╚═╝ ╚═╝ ╚═╝ ╚══╝╚══╝ ╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝ | |
# | |
# ██████╗ ███████╗████████╗ █████╗ | |
# ██╔══██╗██╔════╝╚══██╔══╝██╔══██╗ | |
# ██████╔╝█████╗ ██║ ███████║ | |
# ██╔══██╗██╔══╝ ██║ ██╔══██║ | |
# ██████╔╝███████╗ ██║ ██║ ██║ | |
# ╚═════╝ ╚══════╝ ╚═╝ ╚═╝ ╚═╝ | |
# | |
# Remove HP bloatware / crapware - BETA version | |
# | |
# -- source : https://gist.github.com/mark05e/a79221b4245962a477a49eb281d97388 | |
# -- contrib: francishagyard2, mark05E, erottier, JoachimBerghmans, sikkepitje, Ithendyr | |
# -- note : this script could use your improvements. contributions welcome! | |
# List of built-in apps to remove | |
$UninstallPackages = @( | |
"AD2F1837.HPJumpStarts" | |
"AD2F1837.HPPCHardwareDiagnosticsWindows" | |
"AD2F1837.HPPowerManager" | |
"AD2F1837.HPPrivacySettings" | |
"AD2F1837.HPSupportAssistant" | |
"AD2F1837.HPSureShieldAI" | |
"AD2F1837.HPSystemInformation" | |
"AD2F1837.HPQuickDrop" | |
"AD2F1837.HPWorkWell" | |
"AD2F1837.myHP" | |
"AD2F1837.HPDesktopSupportUtilities" | |
"AD2F1837.HPQuickTouch" | |
"AD2F1837.HPEasyClean" | |
"AD2F1837.HPSystemInformation" | |
) | |
# List of programs to uninstall | |
$UninstallPrograms = @( | |
"HP Device Access Manager" | |
"HP Client Security Manager" | |
"HP Connection Optimizer" | |
"HP Documentation" | |
"HP MAC Address Manager" | |
"HP Notifications" | |
"HP System Info HSA Service" | |
"HP Security Update Service" | |
"HP System Default Settings" | |
"HP Sure Click" | |
"HP Sure Click Security Browser" | |
"HP Sure Run" | |
"HP Sure Run Module" | |
"HP Sure Recover" | |
"HP Sure Sense" | |
"HP Sure Sense Installer" | |
"HP Wolf Security" | |
"HP Wolf Security - Console" | |
"HP Wolf Security Application Support for Sure Sense" | |
"HP Wolf Security Application Support for Windows" | |
) | |
$HPidentifier = "AD2F1837" | |
$InstalledPackages = Get-AppxPackage -AllUsers ` | |
| Where-Object {($UninstallPackages -contains $_.Name) -or ($_.Name -match "^$HPidentifier")} | |
$ProvisionedPackages = Get-AppxProvisionedPackage -Online ` | |
| Where-Object {($UninstallPackages -contains $_.DisplayName) -or ($_.DisplayName -match "^$HPidentifier")} | |
$InstalledPrograms = Get-Package | Where-Object {$UninstallPrograms -contains $_.Name} | |
# Stop HP Services | |
Function StopDisableService($name) { | |
if (Get-Service -Name $name -ea SilentlyContinue) { | |
Stop-Service -Name $name -Force -Confirm:$False | |
Set-Service -Name $name -StartupType Disabled | |
} | |
} | |
StopDisableService -name "HotKeyServiceUWP" | |
StopDisableService -name "HPAppHelperCap" | |
StopDisableService -name "HP Comm Recover" | |
StopDisableService -name "HPDiagsCap" | |
StopDisableService -name "HotKeyServiceUWP" | |
StopDisableService -name "LanWlanWwanSwitchgingServiceUWP" # do we need to stop this? | |
StopDisableService -name "HPNetworkCap" | |
StopDisableService -name "HPSysInfoCap" | |
StopDisableService -name "HP TechPulse Core" | |
# Remove installed programs | |
$InstalledPrograms | ForEach-Object { | |
Write-Host -Object "Attempting to uninstall: [$($_.Name)]..." | |
Try { | |
$Null = $_ | Uninstall-Package -AllVersions -Force -ErrorAction Stop | |
Write-Host -Object "Successfully uninstalled: [$($_.Name)]" | |
} | |
Catch { | |
Write-Warning -Message "Failed to uninstall: [$($_.Name)]" | |
Write-Host -Object "Attempting to uninstall as MSI package: [$($_.Name)]..." | |
Try { | |
$product = Get-WmiObject win32_product | where { $_.name -like "$($_.Name)" } | |
if ($_ -ne $null) { | |
msiexec /x $product.IdentifyingNumber /quiet /noreboot | |
} | |
else { Write-Warning -Message "Can't find MSI package: [$($_.Name)]" } | |
} | |
Catch { Write-Warning -Message "Failed to uninstall MSI package: [$($_.Name)]" } | |
} | |
} | |
# Fallback attempt 1 to remove HP Wolf Security using msiexec | |
Try { | |
MsiExec /x "{0E2E04B0-9EDD-11EB-B38C-10604B96B11E}" /qn /norestart | |
Write-Host -Object "Fallback to MSI uninistall for HP Wolf Security initiated" | |
} | |
Catch { | |
Write-Warning -Object "Failed to uninstall HP Wolf Security using MSI - Error message: $($_.Exception.Message)" | |
} | |
# Fallback attempt 2 to remove HP Wolf Security using msiexec | |
Try { | |
MsiExec /x "{4DA839F0-72CF-11EC-B247-3863BB3CB5A8}" /qn /norestart | |
Write-Host -Object "Fallback to MSI uninistall for HP Wolf 2 Security initiated" | |
} | |
Catch { | |
Write-Warning -Object "Failed to uninstall HP Wolf Security 2 using MSI - Error message: $($_.Exception.Message)" | |
} | |
# Remove appx provisioned packages - AppxProvisionedPackage | |
ForEach ($ProvPackage in $ProvisionedPackages) { | |
Write-Host -Object "Attempting to remove provisioned package: [$($ProvPackage.DisplayName)]..." | |
Try { | |
$Null = Remove-AppxProvisionedPackage -PackageName $ProvPackage.PackageName -Online -ErrorAction Stop | |
Write-Host -Object "Successfully removed provisioned package: [$($ProvPackage.DisplayName)]" | |
} | |
Catch {Write-Warning -Message "Failed to remove provisioned package: [$($ProvPackage.DisplayName)]"} | |
} | |
# Remove appx packages - AppxPackage | |
ForEach ($AppxPackage in $InstalledPackages) { | |
Write-Host -Object "Attempting to remove Appx package: [$($AppxPackage.Name)]..." | |
Try { | |
$Null = Remove-AppxPackage -Package $AppxPackage.PackageFullName -AllUsers -ErrorAction Stop | |
Write-Host -Object "Successfully removed Appx package: [$($AppxPackage.Name)]" | |
} | |
Catch {Write-Warning -Message "Failed to remove Appx package: [$($AppxPackage.Name)]"} | |
} | |
# # Uncomment this section to see what is left behind | |
# Write-Host "Checking stuff after running script" | |
# Write-Host "For Get-AppxPackage -AllUsers" | |
# Get-AppxPackage -AllUsers | where {$_.Name -like "*HP*"} | |
# Write-Host "For Get-AppxProvisionedPackage -Online" | |
# Get-AppxProvisionedPackage -Online | where {$_.DisplayName -like "*HP*"} | |
# Write-Host "For Get-Package" | |
# Get-Package | select Name, FastPackageReference, ProviderName, Summary | Where {$_.Name -like "*HP*"} | Format-List | |
# # Feature - Ask for reboot after running the script | |
# $input = Read-Host "Restart computer now [y/n]" | |
# switch($input){ | |
# y{Restart-computer -Force -Confirm:$false} | |
# n{exit} | |
# default{write-warning "Skipping reboot."} | |
# } |
@Leonarduk00, did you run this with user permissions or admin permissions? I deployed this script always with SYSTEM permissions by Intune. Need to admit that I never tested or used it with user permissions. If is ran as a user I think that this could(must) be blocked in the script.
Yet another "i'm here as a regular user, i tried the one from the original git and my PC's still freezing regularly, is there a latest script that I won't be running with Intune" post. I really want everything HP stripped away from my Z2's and I'm wondering what is the best version of the script to run.
Also along with all this BS, did you guys notice that out of the box, there's a Defender blanket exclusion for the entire HP folder that's not user-deleteable? Absolute fricken madness. I'm definitely returning to Lenovo for my next workstations - I wanted off a Chinese based company, and this is how a US based one treats me. Insane.
Hi @xxIPREDATORIxx, I placed my own version here: https://github.com/IntuneSpecialist/Intune/tree/main/Powershell%20scripts. Its the same version as I mentioned above but since they never responded I descided to place my own version there.
Thanks for that, its working quite well. I'm having a problem with it trying to uninstall HP Security Update Service before Wolf Security - Console which is causing it to not uninstall on first run
Hello can you please add these to the list, they run as a local account and keep coming back
- HP App Helper HSA Service
- HP Network HSA Service
- HP System Info HSA Service
- HP Analytics Service
Got to say, this is the most frustrating refresh rollout I've ever had, I've tried some of these scripts thus far, but got to say, the wolf security side of things is the worst :(
@foeyonghai did you run the script via intune remediations or just a basic script?
Hello can you please add these to the list, they run as a local account and keep coming back
* [ ] HP App Helper HSA Service * [ ] **HP Network HSA Service** * [ ] HP System Info HSA Service * [ ] HP Analytics Service
Hi @weedkiller, will look at it, you'll hear from me.
@foeyonghai did you run the script via intune remediations or just a basic script?
Hi! @funk0id
I run this as a Powershell script in Intune with the settings below. I think I need to clarify some of these details, good question from your side.
PowerShell script
DeleteHPBloatware.ps1
Run this script using the logged on credentials
No
Enforce script signature check
No
Run script in 64 bit PowerShell Host
Yes
I managed to get it going with remediations too thanks @foeyonghai and others that have contributed.
I've not done a manual run of it to see what's going on but I've still ended up with the following remaining in add remove programs and services...
Add remove programs...
HP Connection Optimizer
HP Documentation
Z by HP Data Science Stack Manager 1.5.3
Services...
HP App Helper HSA Service
HP Comm Recovery
HP Diagnostics and HSA Service
HP Hotkey UWP Service
HP Insights Analytics
HP LAN/WLAN.WWAN Switching UWP Service
HP Network HSA Service
HP SFU Service
HP System info HSA Service
(Edit - Note this is with a fresh batch of G11 devices that shipped a couple of weeks ago)
(Edit 2 - I've just added the Z by HP one to the list too, hadn't noticed that)
Hi @funk0id, thank you for the information! Is it W10 of W11 by the way? I think it shouldn't really matter but just to be sure. Maybe I can search on the internet for an image for those machines and see what happens.
Services...
Try this. They're installed as drivers apparently
# List of service names
$services = @(
"HpTouchpointAnalyticsService",
"HPSysInfoCap",
"HPOmenCap",
"HPOmenCap",
"HPDiagsCap",
"HPAppHelperCap",
"HPNetworkCap"
)
foreach ($service in $services) {
try {
# Check if the service exists
$serviceExists = Get-Service -Name $service -ErrorAction SilentlyContinue
if ($serviceExists) {
# Stop the service
Write-Host "Stopping service: $service"
Stop-Service -Name $service -ErrorAction Stop
# Set service startup type to Disabled
Write-Host "Disabling service: $service"
Set-Service -Name $service -StartupType Disabled -ErrorAction Stop
# Delete the service using sc.exe
Write-Host "Deleting service: $service"
& sc.exe delete $service
}
else {
Write-Host "Service $service does not exist. Skipping..."
}
}
catch {
Write-Host "Error occurred with service: $service. Error: $_"
}
}
Write-Host "Operation completed."
Hi @funk0id, thank you for the information! Is it W10 of W11 by the way? I think it shouldn't really matter but just to be sure. Maybe I can search on the internet for an image for those machines and see what happens.
W11
@foeyonghai Nothing !!! Either the system goes to a black screen, or it remains in the initial loading, blue screen and sometimes I can log in and in the system events there are countless errors. The PC has Windows 10 Pro and it has been operational for a few years, I wouldn't want it to be a problem with HP or system software updates.
The few times I manage to log in if I try to start the Windows 11 update it gives me an error 0x80070002
The event log is:
I think the profile was compromised as described in this post:
https://gist.github.com/mark05e/2db81671f39a041a5992a64a77748dc7?permalink_comment_id=4860762#gistcomment-4860762