No, because the following packages do not exist or did not leak: WinEmb-Branding-Embedded-ThinPC-Package~31bf3856ad364e35~amd64~~6.1.7601.17514 WinEmb-Security-SPP-PkeyConfig-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514 WinEmb-Security-SPP-SKU-GVLK-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514 (or WinEmb-Security-SPP-SKU-EVAL-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514 for evaluation) WinEmb-Security-SPP-SKU-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514 Maybe you can use POSReady 7 packages to achieve a similar but not same result. I can only provide filenames and hashes, except for basebrd.dll and update.cat files. Spoiler: WinEmb-Branding-Embedded-ThinPC-Package~31bf3856ad364e35~amd64~~6.1.7601.17514 Code: amd64_microsoft-windows-b..ase-embedded-thinpc_31bf3856ad364e35_6.1.7601.17514_none_7d51e49b342bd242\basebrd.dll ???????????????????????????????????????? amd64_microsoft-windows-b..ase-embedded-thinpc_31bf3856ad364e35_6.1.7601.17514_none_7d51e49b342bd242.manifest 4EF37088903185866357B5A11615B66480586657 amd64_winemb-branding-emb..d-thinpc-deployment_31bf3856ad364e35_6.1.7601.17514_none_4ae452a7b16ce8c4.manifest 9BA59C97F2B665E3080600436F487DF39A05F5A2 update.mum 84A2C03B34C16EC9C2D80A05571AF9358EDDACA9 Spoiler: WinEmb-Security-SPP-PkeyConfig-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514 Code: amd64_microsoft-windows-s..pkeyconfig-embedded_31bf3856ad364e35_8.1.7601.17514_none_0765f434294bb3d8\pkeyconfig.xrm-ms DF039A4A79499C0B793695519F3D0C1DC4D365C2 amd64_microsoft-windows-s..pkeyconfig-embedded_31bf3856ad364e35_8.1.7601.17514_none_0765f434294bb3d8\pkeyconfig-embedded.xrm-ms DF039A4A79499C0B793695519F3D0C1DC4D365C2 amd64_microsoft-windows-s..pkeyconfig-embedded_31bf3856ad364e35_8.1.7601.17514_none_0765f434294bb3d8.manifest 5AFE10710680B7DE46D3BA8E0A9D82422C72DA11 amd64_winemb-security-spp..g-thinpc-deployment_31bf3856ad364e35_6.1.7601.17514_none_ccc4f0bdec5718b0.manifest 2248087755EF4F0D605CA83C889225DC9D4B79AC Spoiler: WinEmb-Security-SPP-SKU-GVLK-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514 Code: amd64_microsoft-windows-s..t-sku-embedded-gvlk_31bf3856ad364e35_8.1.7601.17514_none_8e014c03fa2fb5df.manifest 3D56BE064F12F3BE2827DAF4A4EE14F169C1933C amd64_winemb-security-spp..k-thinpc-deployment_31bf3856ad364e35_6.1.7601.17514_none_25802252b543e935.manifest E1F2A3E77350F47149B3D07BE8E159D5BC1FEA91 update.mum B8F37545F4A4472719202EC8121445C989A071A8 Spoiler: WinEmb-Security-SPP-SKU-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17514 Code: amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-pl.xrm-ms A24556871DAC86C713D34C62D19721D4642790BB amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-ppdlic.xrm-ms CCAB00C639465733D2E89B496B5EDD12D2880710 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-TIMEBASEDEVAL-pl.xrm-ms C481AE29B0CD4785308F3539E08C48738E3B9F9C amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-TIMEBASEDEVAL-ul-oob.xrm-ms DF492047A25EC4207F9CE4E68882345967230414 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-ul-oob.xrm-ms 54C1943C83AFA7B2DD475DBFA5B595D965F37813 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-ul-phn.xrm-ms 5E1A7360FFB69919848FF70B53B69E5BF5DC99AF amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-BYPASS-RAC-private.xrm-ms 69D95F1F87D929CF258F06D6DD25DD164F517023 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-BYPASS-RAC-public.xrm-ms F49363A14A9D918FB2444E7F6A23F458C7ADC46C amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-BYPASS-ul.xrm-ms 2CACE1BEC40E990192FCBDEAD73383F4B5AD5DB1 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-BYPASS-ul-oob.xrm-ms 7D63EDB37C10F7407D42FC1C8F8DC827BD27BB33 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-DMAK-pl.xrm-ms C0F429F26F6EDD3FBFD18DA65395F7FDC3860E8A amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-DMAK-ul-oob.xrm-ms 9909740C22289B91E282D842B5E5AE6AA9BE5FED amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52\Security-SPP-Component-SKU-Embedded-VL-DMAK-ul-phn.xrm-ms C238BB7ADA7434F1B8688561AF9D4C2F776ABC80 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17514_none_129b72984ee7bb52.manifest CE34B96B96B08B2ED471C2C98CC02AF3FFBD9984 amd64_winemb-security-spp..u-thinpc-deployment_31bf3856ad364e35_6.1.7601.17514_none_dc5dbd16d1422e80.manifest 455B100C9240B9BF42559314F799E276FBECBEFA update.mum FBA1F26771B6068139250BE65AAF3C9854CD3CBF Spoiler: WinEmb-Security-SPP-SKU-ThinPC~31bf3856ad364e35~amd64~~6.1.7601.17764 (KB2664186) Code: amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-pl.xrm-ms 5C7EA48C565893709611AEEA456D75512D67A9CD amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-ppdlic.xrm-ms E4331EF78A15879E60F869252BD1B96409E8AB4A amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-timebasedeval-pl.xrm-ms C389DEF0491BC6E4827FBC8F780890942FB7E725 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-timebasedeval-ul-oob.xrm-ms 77CFECEB838D5729399DE3C1427DB39D9F7AB5BD amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-ul-oob.xrm-ms 20681E0E40948941EEBCBD5A51693AFE970D4FD7 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-ul-phn.xrm-ms C0FFDEF24AA9B4D6C23F0BF652B69BF36E3A7D2A amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-bypass-rac-private.xrm-ms D353C4780846304FE9F273854842CF163C3A3703 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-bypass-rac-public.xrm-ms 771C33F18197FBB9473230301D1CEE9EA97A63AF amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-bypass-ul.xrm-ms B122E7E279DFC548C0D232136C4B30D50B997287 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-bypass-ul-oob.xrm-ms 85A9585F4B92088F9710C6C66F52BFCC0D693DCF amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-dmak-pl.xrm-ms 23175E9E4BB085B250A0604367E65377E3DD4581 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-dmak-ul-oob.xrm-ms 6B91E48DD311EAB49559A97749D9335D2E8C35D7 amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52\security-spp-component-sku-embedded-vl-dmak-ul-phn.xrm-ms 34FD044C54E8ACA0DBE8C2E45A2029FCDAC3FA4F amd64_microsoft-windows-s..ponent-sku-embedded_31bf3856ad364e35_8.1.7601.17764_none_129b72984ee7bb52.manifest F9EF1816A9F51129A9C817846D23EC1AB02F4F40 amd64_winemb-security-spp..u-thinpc-deployment_31bf3856ad364e35_6.1.7601.17764_none_dc5dbd16d1422e80.manifest 609A2FBF76258F19A4EB14F552FEA954E79CD02F update.mum C21620EDA18559A314A941EFBFF8FACAFAAFEF49 So these would be the names and hashes for the 64-bit files, if they would exist, I think. Of course there are no 64-bit basebrd.dll and update.cat files, but manifests and mums can be edited easily, and xrm-ms license files would be the same as the 32-bit ones. Unfortunately without valid catalogs there's no way to add these packages.
Thank you for your detailed answer. What you think can Server 2008R2 to be reconstructed in 32-bit from 64-bit files? Thank you, but that is actually the oldest solution. The question was pointed to the title of the project "Windows Editions Reconstruction Project", and the possibilities...
To remove Windows Defender from 17763 Server Desktop Experience Step 2-1 Remove these packages Code: Microsoft-Antimalware-Scan-Interface-Core-Package~31bf3856ad364e35~amd64~~10.0.17763.1 Microsoft-Windows-SenseClient-Package~31bf3856ad364e35~amd64~~10.0.17763.1 Windows-Defender-Server-Core-Package~31bf3856ad364e35~amd64~~10.0.17763.1 Step 2-2 [Online] Import this registry Code: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT] "DontOfferThroughWUAU"=dword:00000001 "DontReportInfectionInformation"=dword:00000001 [-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe] [Offline] a. Load Windows\System32\config\SOFTWARE to HKEY_LOCAL_MACHINE\SOFTWARE1 b. Import this registry Code: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE1\Policies\Microsoft\MRT] "DontOfferThroughWUAU"=dword:00000001 "DontReportInfectionInformation"=dword:00000001 [-HKEY_LOCAL_MACHINE\SOFTWARE1\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MRT.exe] c. Unload HKEY_LOCAL_MACHINE\SOFTWARE1 PS. For Server 2022, it is these packages. e.g. 20344.1 Code: Microsoft-Antimalware-Scan-Interface-Core-Package~31bf3856ad364e35~amd64~~10.0.20344.1 Microsoft-Antimalware-Scan-Interface-Core-WOW64-Package~31bf3856ad364e35~amd64~~10.0.20344.1 Microsoft-Windows-SenseClient-Package~31bf3856ad364e35~amd64~~10.0.20344.1 Windows-Defender-Server-Core-Package~31bf3856ad364e35~amd64~~10.0.20344.1 But, sooner ot later, this will cause Cumulative Updates malfunctional due to new Update Technology and PSFX update.
Q: Is it OK to remove Windows-Defender-Group-Policy-Package? A: It belongs to Microsoft-Windows-GroupPolicy-ClientTools-Package. For Server 2019, yes. For Server 2022, no if for working Windows Update.
BTW, For 21H2, I found the /remove-edge command won't work with EdgeChromium being updated Online. PS. 1. The EdgeChromium in the latest install.wim is not necessarily the latest build. 2. It's OK to integrate the latest EdgeChromium to install.wim.
OK. No more for today. Yes, there is one more. The EdgeChromium is the same one, but its functions depend on the target system. Case 1: Edge EdgeUpdate Case 2: Edge EdgeUpdate EdgeWebView Case 3: Edge EdgeCore EdgeUpdate EdgeWebView
Enable21H2 Code: <?xml version="1.0" encoding="utf-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0" copyright="Copyright (c) Microsoft Corporation. All Rights Reserved."> <assemblyIdentity name="Microsoft-Windows-21H2Enablement-Package" version="10.0.19041.1023" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" /> <package identifier="Microsoft-Windows-21H2Enablement" releaseType="Feature Pack"> <update name="Microsoft-Windows-21H2Enablement"> <mum2:customInformation xmlns:mum2="urn:schemas-microsoft-com:asm.v3"> <mum2:noAutoMerge /> </mum2:customInformation> </update> </package> </assembly>
An Enablement package should be like this: Code: <?xml version="1.0" encoding="utf-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0" copyright="Copyright (c) Microsoft Corporation. All Rights Reserved."> <assemblyIdentity name="Microsoft-Windows-21H2Enablement-Package" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" /> <package identifier="Microsoft-Windows-21H2Enablement" releaseType="Feature Pack"> <update name="Microsoft-Windows-20H2Enablement"> <mum2:customInformation xmlns:mum2="urn:schemas-microsoft-com:asm.v3"> <mum2:noAutoMerge /> </mum2:customInformation> <package contained="false" integrate="hidden"> <assemblyIdentity name="Microsoft-Windows-20H2Enablement-Payload-Package" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" /> </package> </update> <update name="Microsoft-Windows-21H1Enablement"> <mum2:customInformation xmlns:mum2="urn:schemas-microsoft-com:asm.v3"> <mum2:noAutoMerge /> </mum2:customInformation> <package contained="false" integrate="hidden"> <assemblyIdentity name="Microsoft-Windows-21H1Enablement-Payload-Package" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" /> </package> </update> <update name="Microsoft-Windows-21H2Enablement"> <mum2:customInformation xmlns:mum2="urn:schemas-microsoft-com:asm.v3"> <mum2:noAutoMerge /> </mum2:customInformation> <package contained="false" integrate="hidden"> <assemblyIdentity name="Microsoft-Windows-21H2Enablement-Payload-Package" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" /> </package> </update> </package> </assembly> Which installs a manifest like this: amd64_microsoft-windows-21h2enablement_31bf3856ad364e35_10.0.19041.844_none_6e1ed8e9d3d0bbd9.manifest Code: <?xml version="1.0" encoding="utf-8" standalone="yes"?> <assembly xmlns="urn:schemas-microsoft-com:asm.v3" manifestVersion="1.0" copyright="Copyright (c) Microsoft Corporation. All Rights Reserved."> <assemblyIdentity name="Microsoft-Windows-21H1Enablement" version="10.0.19041.844" processorArchitecture="amd64" language="neutral" buildType="release" publicKeyToken="31bf3856ad364e35" versionScope="nonSxS" /> <registryKeys> <registryKey keyName="HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FeatureManagement\Overrides\0\XXXXXXXXX"> <registryValue name="EnabledState" valueType="REG_DWORD" value="0x00000002" /> <registryValue name="EnabledStateOptions" valueType="REG_DWORD" value="0x00000000" /> <securityDescriptor name="WRP_REGKEY_DEFAULT_SDDL" /> </registryKey> </registryKeys> <trustInfo> <security> <accessControl> <securityDescriptorDefinitions> <securityDescriptorDefinition name="WRP_REGKEY_DEFAULT_SDDL" sddl="O:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464G:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464D:P(A;CI;GA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;CI;GR;;;SY)(A;CI;GR;;;BA)(A;CI;GR;;;BU)(A;CI;GR;;;S-1-15-2-1)(A;CI;GR;;;S-1-15-3-1024-1065365936-1281604716-3511738428-1654721687-432734479-3232135806-4053264122-3456934681)" operationHint="replace" /> <securityDescriptorDefinition name="WRP_FILE_DEFAULT_SDDL" sddl="O:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464G:S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464D:P(A;;FA;;;S-1-5-80-956008885-3418522649-1831038044-1853292631-2271478464)(A;;GRGX;;;BA)(A;;GRGX;;;SY)(A;;GRGX;;;BU)(A;;GRGX;;;S-1-15-2-1)(A;;GRGX;;;S-1-15-2-2)S:(AU;FASA;0x000D0116;;;WD)" operationHint="replace" /> </securityDescriptorDefinitions> </accessControl> </security> </trustInfo> </assembly> Without this registry, the new feature won't work: Code: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FeatureManagement\Overrides\0\XXXXXXXXX"