Only if you edit that section of code within the script. You can remove this lines: Defender Firewall Code: Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile" /v "EnableFirewall" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile" /v "EnableFirewall" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile" /v "EnableFirewall" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile" /v "EnableFirewall" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "DisableFirewall" /t REG_SZ /d "%%windir%%\System32\netsh.exe advfirewall set allprofiles state off" /f >nul 2>&1 Defender Code: Reg add "HKLM\TK_DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_DEFAULT\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_NTUSER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_NTUSER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_NTUSER\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t REG_SZ /d "Off" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControl" /t REG_SZ /d "Anywhere" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen" /v "ConfigureAppInstallControlEnabled" /t REG_DWORD /d "0" /f >nul 2>&1 Lines from 19789 to 19809. Use the notepad++ to see the number of the lines. Instead of deleting lines you can put rem at the beginning of each line. Defender Firewall Code: rem Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile" /v "EnableFirewall" /t REG_DWORD /d "0" /f >nul 2>&1 rem Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\WindowsFirewall\PrivateProfile" /v "EnableFirewall" /t REG_DWORD /d "0" /f >nul 2>&1 rem Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\WindowsFirewall\PublicProfile" /v "EnableFirewall" /t REG_DWORD /d "0" /f >nul 2>&1 rem Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile" /v "EnableFirewall" /t REG_DWORD /d "0" /f >nul 2>&1 rem Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "DisableFirewall" /t REG_SZ /d "%%windir%%\System32\netsh.exe advfirewall set allprofiles state off" /f >nul 2>&1
I think when you integrate Windows updates EdgeChromium will be added. Not sure about that. But the 2019 server in the original ISO did not have EdgeChromium, however MS forced the installation through the new LCUs, but I don't know if this was only in specific LCUs or if in the current LCUs this EdgeChromium installation still occurs. You'll have to search a little. Perhaps someone is sure of this and already responds in the sequence.
@MSMG WOW this new version 13.3 is much faster than any I've used; thank you very much again really excellent work
Will be adding support for removing CloudExperienceHost, ClientCBS, StartmenuExperienceHost, UndockedDevKit But if it breaks the functionality of Start Menu, Taskbar or System Tray then its user's responsibilities to make alternatives for them. Support for Tablet PC and Touch Devices component removal will be added in future versions. Yes, ClientCBS contains many sub-components merged and have some files of Cortana but it can't be removed alone without the removal of ClientCBS package.
Yes, removing IE will disable the IE Mode options in Edge Chromium settings. There are no dependencies for Edge Chromium other than the source OS should be updated with latest updates.
Yes, removing Windows Update will remove the ability to install Updates and Language Packs online and also to install MSU update packages.
Make sure when you removed the components you were using the right source image with the right CU integrated specified in the Toolkit version changelog. If using a source image with a CU version higher than the one present in the Toolkit version changelog then the Windows update will fail to install the next CU. Toolkit v13.2 requires the below source images Windows 10 Client v1809 (v10.0.17763.1/v10.0.17763.3887 [KB5022286]) Windows 10 Client Enterprise LTSC 2019 (v10.0.17763.1/v10.0.17763.3887 [KB5022286]) Windows 10 Client v1903 (v10.0.18362.1) & v1903/v1909 (v10.0.1836x.2274 [KB5013945]) Windows 10 Client v2004 (v10.0.19041.1) & v2004/v20H2/v21H1/v21H2/v22H2 (v10.0.1904x.2486 [KB5022282]) Windows 10 Client LTSC 2021 (v10.0.19044.1288/v10.0.19044.2486 [KB5022282]) Windows 11 Client v21H2 (v10.0.22000.1/v10.0.22000.1455 [KB5022287]) Windows 11 Client v22H2 (v10.0.22621.1/v10.0.2262x.1105 [KB5022303]) Toolkit v13.3 requires the below source images Windows 10 Client v1809 (v10.0.17763.1/v10.0.17763.4131 [KB5023702]) Windows 10 Client Enterprise LTSC 2019 (v10.0.17763.1/v10.0.17763.4131 [KB5023702]) Windows 10 Client v1903 (v10.0.18362.1) & v1903/v1909 (v10.0.1836x.2274 [KB5013945]) Windows 10 Client v2004 (v10.0.19041.1) & v2004/v20H2/v21H1/v21H2/v22H2 (v10.0.1904x.2728 [KB5023696]) Windows 10 Client Enterprise LTSC 2021 (v10.0.19044.1288/v10.0.19044.2728 [KB5023696]) Windows 11 Client v21H2 (v10.0.22000.1/v10.0.22000.1696 [KB5023698]) Windows 11 Client v22H2 (v10.0.22621.1/v10.0.2262x.1413 [KB5023706]) If are using the correct source image and the Toolkit version, then the next CU installation will be break, if still having the issues, then let me know the Source image and Toolkit version used, will check on my side.
You can make a registry file excluding Defender and Firewall and then import the registry using the Toolkit.
It was before the release of v13.3, now it supports the current patch Tuesday updates, so yes now it supports the Moment 2 update, but the CU version should be v1413.
Toolkit supports adding DaRT to recovery image, you need to mount the recovery image while selecting the source image.
Yup.. agree... MS really full of i know what u mean and what u feel, i feel u bro ... dunno if i supposed to be angry or to laugh, but for my mental health... i decided to laugh and save money to buy a mac ... debloating windows is really a pain in the ass ... ROFL...