Symantec Endpoint Protection Trellix ( aka mcafee ) Endpoint Security # How-to configure Firewall and disable Telemetry in Symantec Endpoint Protection https://forums.mydigitallife.net/th...lemetry-repository.63874/page-73#post-1724179
In the occupied German Empire and controlled by the Allied Government of the Federal Republic of Germany
Freddie-o Could you add a note to your original script post to say these are the lines which need to be removed if you want to use OOBE: ------------------------------------------------------------------- From "delete telemetry scheduled tasks" section: reg delete "HKLM\SOFTHIVE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\CloudExperienceHost" /f From "delete telemetry services" section: reg delete "HKLM\SYSHIVE\ControlSet001\Services\DiagTrack" /f reg delete "HKLM\SYSHIVE\ControlSet001\Services\dmwappushservice" /f ------------------------------------------------------------------ Finally: At the end of the script delete this entry. rem == create panther folder and add unnatend.xml == mkdir mount\Windows\Panther copy /y unattend.xml mount\Windows\Panther ------------------------------------------------------------------- It may help those less familiar with it.
Freddie-o You've got it back-to-front, removing those lines will ENABLE OOBE not get you stuck in OOBE. If you keep them in the script you will need to use your unattend.xml
thatswhat i was thinking as cloudexperiencehost task is needed for oobe post phase or else will result in error so that one will use unattend to bypass machine as well as user oobe in xml tags of <oobe> but i was keeping myself restricted so that freddie-o will not think that i am trying to do bad for him . he has done a great job via sharing this telemetry removal script on MDL as well as dmwappushseevice is needed for oobe as well as sysprep phase.
Ok, this is a somewhat new script and in itself so okay! I can use it then but still for LTSC 2021!??
Ok, so it doesn't matter what file type it is, dism handles all file types. I didn't know that, didn't come up anywhere!
No but i suggested you for your query regarding windows Updates nothing else ie either in form of extracted cabs from msu itself or either msu itself the same way.
Extract the cabs from the msu then add them as TrustedInstaller Spoiler run_as_trustedinstaller.cmd Code: @echo off pushd "%~dp0" "%~dp0PowerRun_x64.exe" add-package.cmd add-package.cmd Code: @echo off rem == add latest servicing stack update == dism /online /add-package:SSU-19041.1525-x64.cab /norestart rem == add latest cumulative update == dism /online /add-package:Windows10.0-KB5010342-x64.cab /norestart rem == add latest .NET framework 3.5 and 4.8 update == dism /online /add-package:Windows10.0-KB5009467-x64-NDP48.cab /norestart pause