Did you download and copy all the files in the IE11 folder to <Packs\IE11> folder? If yes then the integration will be done properly as specified in the WHD Update Pack Tool, unless something has changed with the recent updates. Will check out.
I tried adding all the files and integrating them into the image, but nothing changes. I am using VMware Workstation for the test.
LTSC 2021 isn't shown in changelog. And moreover the removepkgslist is empty for LTSC 2021. That shows its not fully supported.
Updated the Toolkit to v11.10 Spoiler: Changelog v11.10 + Updated Toolkit's Bin folder with 7-Zip v21.06 Command-line Binaries. + Updated the Toolkit to support Windows 10 Enterprise LTSC 2021 Source OS. + Updated the Feature "Integrate Microsoft Default Inbox Apps" to support integrating the Amazon App Store and NVIDIA Control Panel Apps for Windows 10 and Windows 11 Source OS. + Fixed a Bug in the Feature "Remove Windows Component", where the OOBENetworkConnectionFlow component was not removed through ToolKitHelper.exe when using the SystemApps or AllComponents category as component name. + Updated the Feature "Remove Windows Component" to support Windows 10 Client v2004 (v10.0.19041.1) & v2004/v20H2/v21H1/v21H2/LTSC2021 (v10.0.1904x.1387) Source OS. + Updated the Feature "Apply Tweaks" with Tweak to Disable Automatic Downloading and Installing 3rd Party Apps for Windows 11 Source OS.
Hi i got a question i did removed appx Search in registry i left all packages mum related to search but seems that explorer build in function to search files not working i suspect that appx is now responsible for that is it somehow possible to get that funcionality back to explorer?? (without that appx that eat more then 100mb of ram and doing other things meanwhile like telemetry) my system is LTSC2021, in 2019 there wasnt any appx like that but search files in explorer was working fine
@MSMG Sir, the latest version Number of toolkit remains as 11.9 instead of 11.10 in the toolkit window which needs to be corrected. Thank you for the update.
Its already there on this MSMG thread . Pl search abbodi posts on this thread & you will get to know that .
hello, i've copy/pasted into a reg file but the script crash on ltsc 2021 don't know what's wrong maybe outdated script ?
The problem is caused by trying to secure LSA. I think that is a very niche case. The problem is, reverting the change doesn't actually do anything because when setting RunAsPPL it sets a UEFI variable as described here https://forums.mydigitallife.net/threads/msmg-toolkit.50572/page-1081#post-1708348; To use MSMG Toolkit with LSA security enabled you will need NSudo v9. Or to revert LSA security you have to remove the registry key AND run the opt-out .efi. That restores the system to the original behavior.
i am coming up blank on searches. what does the Pl stand for? is the tweak a stand alone file or part of another file? 1084 pages to search through. thanks for your "no help at all". @abbodi1406 could you tell me where that file/post is please?
Why thank me i am of no help at all . Thank abbodi1406 for his share. i dont need anything not even any credits .
@bababafasdfggg Well, the tweaks you posted look for me as (incomplete) part of disabling UAC. I recommend make a decision for yourself or disable UAC completely, or don't touch it. A you sure they helps with Explorer search issue? Furthermore, if you disabling UAC, better disable "UAC File Virtualization Driver" (luafv) service too. Otherwise you will get sighnificant slowdowns (and system errors reports). The service is responsible for registry and drivers virtualization (capturing of "luafv.sys" driver functions). When disabled, programs will have instant (and quick) access to the important / protected system files and registry parts. Spoiler: UAC - Disable (completely) Code: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableVirtualization" /t REG_DWORD /d 0 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableInstallerDetection" /t REG_DWORD /d 0 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t REG_DWORD /d 0 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t REG_DWORD /d 0 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorUser" /t REG_DWORD /d 3 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableSecureUIAPaths" /t REG_DWORD /d 0 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ValidateAdminCodeSignatures" /t REG_DWORD /d 0 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableUIADesktopToggle" /t REG_DWORD /d 1 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "FilterAdministratorToken" /t REG_DWORD /d 0 /f reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "LocalAccountTokenFilterPolicy" /t REG_DWORD /d 1 /f reg add "HKLM\SYSTEM\CurrentControlSet\services\luafv" /v "Start" /t REG_DWORD /d 4 /f REBOOT iNFO: "LocalAccountTokenFilterPolicy" - A little known tweak for disabling so-called "Network UAC". Value "1" means limit for the audit mode. Practically it solve a stupid issues with shared LAN access (auth-window deny) over SMB2/3 among machines with diffferent OS generations (W8.1 <-> W10)