Yes, it's working very well. EDIT:Win7 can be activated by replacing the secret key provided on the machine . I have two secret keys on my computer case, one is the Win10 secret key; the other has no instructions.
To make sure i have not upset any internal SLP key checks etc i examined the OEM key list in MRP, all are OK as majority are compiled from this list. If for any reason a SLP key for Brand or Edition cannot be found/used then a default ACER or ASUS SLP key for that Edition will be used as mentioned the keys are not brand specific. For example: Gigabyte Professional is one such Edition that a default SLP key will be used as Gigabyte only seemed to have Home Premium at most, the default system was put in place long before i took over the project to allow at least as many Brands/Editions activate as long as the Cert and SLIC matched.
After a clean installation of Win 11 using the MRP, Time zone i have to manually set it to UTC +01:00
I doubt it is MRP as there is nothing in the code that changes or affects any time zone. The only 'time' related option is one to put seconds on the clock, but that not work on w11 anyway and is auto disabled. Win 11 has many internal changes that is still being worked out as to what options work and not, i have turned off the ones i know that do not work as intended on w11.
Query Tool v117 is at RC3 stage and hoping to get released for Tuesday. Have started on MRP v140 too, very early stage on that and nothing to report at this time. *edit* Was hoping for Monday but other commitments had to come first, but it will certainly be Tuesday 31st Aug GMT
Uploaded the Query Tool v117.0, 2nd post download link, password and hashes have been updated. Spoiler: QTv117 Summary + Added more info and checks for TPM that shows the specification version in use first and then other data after, {major, minor, revision}, also, if available, the TPM Manufacturer/ID. + Bitlocker protection status on the system drive will be shown, if present. + If any current Win 11 'bypass' registry tweaks are in use then they will be shown as Yes/No results. + Displays Powershell's policies for running and/or Scripts. + Other internal code updates done and some rewording or extra info for results. Spoiler: Example new TPM/PS Results Code: Trusted Platform Module : Enabled Trusted Platform Module : Active/Operative TPM Specification Data : 2.0 {2.0, 0, 1.16 = major, minor, revision} TPM Manufacturer Ver{s} : 11.8 TPM Manufacturer ID Text : INTC Drive C: Bitlocker Status : Protection Off Drive C: Encrypted Status : Fully decrypted TPM 2.x Bypass Check : No SecureBoot Bypass Check : No Low RAM Bypass Check : No Allow Win 11 WU Upgrade : No ....... PS Execution Policy : Unrestricted PS Scripted Diagnostics : Unrestricted
The next MRP v140 so far has 2 new options added One to remove/hide most used apps from the start menu (w11) , experimental as for some reason after a couple of reboots when the device is connected to the internet , they can re-appear .... The other is a general OS (all supported) one, this disables a potential security risk when plugging in a USB device that has its own internal drivers/software that auto-installs, as this process is run at NT Authority/System privileges it can be abused. So this will prevent that form happening, it does not prevent the device working, just any internal software from automatically running.
My Notes: Once the MRP option is enabled, Windows will prevent any co-installers from being installed when you plug an associated USB device into your computer. Note that using the option will block a device's configuration software from automatically being installed, so you will need to download and install it from the vendor's site manually. I think it is worth the added security by blocking the installation of potentially nasty applications during the Windows Plug-and-Play process. To use the reg tweak now: Code: Windows Registry Editor Version 5.00 ; Disable USB Co-Installers. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Installer] "DisableCoInstallers"=dword:00000001 or Code: Reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Installer" /v "DisableCoInstallers" /t REG_DWORD /d "1" /f Change the 1 to 0 (zero) to allow again.