Hello RaiyvaN thank you very much for your help, I really appreciate your attitude but I still have the same problem "access denied" I tried everything I used takeownership in the file I opened the property on the advanced security tab there, I also took over with full control over the file but ... the damn thing WILL NOT let me remove this s**t EDIT: see this EDIT 2: Oh s**t! after installing NSUDO v8.0.1 Update 1 as Administrator and (trying to) open the unfortunate file D: \ found.000 the file just doesn't open with any of the settings what may be happening?
@MSMG edit It's good now...got it fixed by using a template for the random folder permission bug. It's created properly every time now from HOST OS. Thx for the guide/hints and the example.tpk's
@MSMG How do I use the command below on the image mounted with MSMG Toolkit..?? Code: Dism.exe /online /Cleanup-Image /StartComponentCleanup Thanks in advance..!!
/online is meant for servicing the running OS. For offline usage: Code: Dism /Image:x:\ToolKit_v11.3\Mount\Install\1\ /Cleanup-Image /StartComponentCleanup example: Code: =============================================================================== MSMG ToolKit - Select Source from <DVD> folder =============================================================================== ------------------------------------------------------------------------------- ####Selecting Source Images#################################################### ------------------------------------------------------------------------------- Reading Image Information... =============================================================================== | Index | Arch | Name =============================================================================== | 1 | x64 | Windows 10 Pro =============================================================================== Enter the Image Index # ['Q'uit] : 1 Do you want to mount Windows Setup Boot Image ? ['Y'es/'N'o] : N Do you want to mount Windows Recovery Image ? ['Y'es/'N'o] : N ------------------------------------------------------------------------------- ####Source Image Information################################################### ------------------------------------------------------------------------------- Image : Install.wim Image Index No : 1 Image Architecture : x64 Image Version : 10.0.19041 Image Service Pack Build : 631 Image Service Pack Level : 0 Image Build : 19041 Image Default Language : en-US ------------------------------------------------------------------------------- ####Mounting Source Images##################################################### ------------------------------------------------------------------------------- ------------------------------------------------------------------------------- Mounting [Install.wim, Index : 1] Image at <\Mount\Install\1>... ------------------------------------------------------------------------------- Deployment Image Servicing and Management tool Version: 10.0.20279.1 Mounting image [==========================100.0%==========================] The operation completed successfully. ------------------------------------------------------------------------------- ####Finished Selecting & Mounting Source Images################################ ------------------------------------------------------------------------------- =============================================================================== Press any key to continue . . . Startcomponentcleanup: Code: Microsoft Windows [Version 10.0.19042.844] (c) 2020 Microsoft Corporation. All rights reserved. C:\Windows\system32>Dism /Image:d:\ToolKit_v11.3\Mount\Install\1\ /Cleanup-Image /StartComponentCleanup Deployment Image Servicing and Management tool Version: 10.0.19041.844 Image Version: 10.0.19042.631 [=========== 20.0% ] The operation completed successfully. C:\Windows\system32>
Does integrating the new Powershell replace the old one? How to avoid SFC integrity violations? Should I download Windows from UUP dump or Rg-Adguard TechBench by WZT? I don't understand what's this "latest" update bug? So if I use one older 21h1 and 19h1 it sfc scan should return all good? What do I need to be able to download free packages from Microsoft Store. Only free.
@Tiger-1, First of all, perform a deeper scan of your disk partition drive. Eventually, a restart may be required to perform this check, as the partition must be unmounted. ChkDsk D: /X /R /F or ChkDsk D: /X /F In this new file, there is a "Start" file for the script to be executed with nsudo. I added a choice for CMD command or recursive PowerShell command to delete folders. Extract it in the Toolkit folder so that the nsudo is found and executed correctly. If this attempt fails, you will have to: add the user "Everyone" to this folder and files then enable "Full Control" permissions for folders and files. right click, properties, security, edit, add user "Everyone", delete users not present on that computer, explore "advanced", change Owner to "Everyone". In the "Permissions" tab: Add user "Everyone", In the "Effective Access" tab: Select user "everyone". Note: translator translate "Todos" to "Everyone" maybe the user is "All". I dont know. Edit: I'm helping @Bira and wrongly renamed your zip, Sorry. Corrected zip file name.
I currently run Toolkithelper separately with the mounted image location and a component list passed in. This works, however, Windows Store isn't being removed. I noticed in the changelog that there has been a change to the way this is removed. What do I update my component list with? I was previously using "WindowsStore" The component list has the following: WindowsStoreApp StorePurchaseApp ServicesStoreEngagement WindowsStoreClient Do all need to be removed to get rid of the Windows Store application? Or are some of these bits needed for core Windows functionality? Thanks
good friend I give up file s**t the only solution I found was to "hide" this crap file because it always appears in the prompt as access is denied ...
Get a Gparted Live or PartedMagic distro Place it on the USB stick with Ventoy, Rufus or Balena Etcher. Ventoy is the best for me. Just prepare the thumb drive and put the iso on it. boot the live, go to the terminal and type: blkid --> to identify your partitions and then ntfsfix /dev/sdax --> where x is your partition number. then enter the file manager that is available and delete the damn folder.
@MSMG Can you explain 1 more thing for me? For example there's >> Code: Administrators LocalSystem [b]s: d:3 136[b] same for TrustedInstaller TrustedInstaller d:13 424 Code: Administrators LocalSystem d:3 120[b] TrustedInstaller TrustedInstaller s: d:9 328 What's the differents in those? Can't find anything about it...Thx!
Code: Reg add "HKLM\TK_DEFAULT\SOFTWARE\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_NTUSER\SOFTWARE\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t REG_DWORD /d "2" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows Defender\Signature Updates" /v "FirstAuGracePeriod" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /t REG_BINARY /d "030000000000000000000000" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Systray" /v "HideSystray" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "LocalSettingOverridePurgeItemsAfterDelay" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScriptScanning" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Remediation" /v "Scan_ScheduleDay" /t REG_DWORD /d "8" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Remediation" /v "Scan_ScheduleTime" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "AdditionalActionTimeOut" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "CriticalFailureTimeOut" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "DisableGenericRePorts" /t REG_DWORD /d 1 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Reporting" /v "NonCriticalTimeOut" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "AvgCPULoadFactor" /t REG_DWORD /d "10" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableArchiveScanning" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupFullScan" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableCatchupQuickScan" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRemovableDriveScanning" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableRestorePoint" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningMappedNetworkDrivesForFullScan" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "DisableScanningNetworkFiles" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "PurgeItemsAfterDelay" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanOnlyIfIdle" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScanParameters" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleDay" /t REG_DWORD /d 8 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Scan" /v "ScheduleTime" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "DisableUpdateOnStartupWithoutEngine" /t REG_DWORD /d 1 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "ScheduleDay" /t REG_DWORD /d 8 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "ScheduleTime" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Signature Updates" /v "SignatureUpdateCatchupInterval" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "LocalSettingOverrideSpynetReporting" /t REG_DWORD /d 0 /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReportingLocation" /t REG_MULTI_SZ /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f >nul 2>&1 Reg add "HKLM\TK_SYSTEM\ControlSet001\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f >nul 2>&1 Reg add "HKLM\TK_SYSTEM\ControlSet001\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f >nul 2>&1 MSMG, Are all these settings necessary for LTSC or only a part of them? p.s I think there are a lot here!