No problem The author used it as a base for his reversal script and is now constantly updating it now so you might want to look at the first page and he had an update for it Cheers... Update: to get the default apps back use my add default apps back script or create a new profile... The difference between my undo script and the authors is that for his you have to keep clicking yes or no to add back something Where as mine just does everything all at once
Hi, after disable Windows Defender, add this code to disable Windows Defender Task: Code: schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable > NUL 2>&1schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable > NUL 2>&1 schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable > NUL 2>&1 schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable > NUL 2>&1 And, add this command to delete Windows Defender cache: Code: del "C:\ProgramData\Microsoft\Windows Defender\Scans\mpcache*" /s > NUL 2>&1
Add this at last to section "Disable Windows Search", to delete Windows Search Indexing Database: Code: net stop WSearch > NUL 2>&1 del "C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb" /s > NUL 2>&1 P.D: After delete Windows Search Indexing Database and Windows Defender caché files, my SSD gain about 800 MB !!!!!
After disable Diagnostics Tracking Service, you can delete files "eventsXX.rbs" in folder "C:\ProgramData\Microsoft\Diagnosis" (about 70 MB), but these files are owned by SYSTEM. How to take ownership with CMD ?
When a new version releases, what are we supposed to do? just re-run the updated .cmd file? BTW I just noticed there is no option for disabling automatic updates, is there a reason behind that decision?
Well, expect some more updates today. I tested your powershell script, but this doesn't properly revert all default apps. There is no 100% working solution except creating a new user profile. :/
Yea your right I tested myself with a new profile and it worked Thanks for the help. So I'm just gonna take down that file right know for adding back default apps. There we go the Link is dead now Once again thanks for letting me know.
with SR1 out next week, wouldn't it be better to wait and see what that brings and does? service release 1 may do some of this and be official?
It will run just like the normal script to ask you individually for undoing tweaks. Simply confirm every step to undo every tweak. Already thought about a no-brainer version, where simply all tweaks will be removed completely as an alternative. I will update the script if anything changes.
Anyone with System Protection DISABLED can test these commands please? Code: REM Enable System Protection in C:\Drive powershell "enable-computerrestore -drive "c:\" " > NUL 2>&1 powershell "vssadmin resize shadowstorage /on=c: /for=c: /maxsize=1%" > NUL 2>&1
Add new section to disable WMI logging: Code: rem Disables Event Trace Session in Perfmon Data Collector Sets reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AITEventLog" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AppModel" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AppPlat" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Audio" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\AutoLogger-Diagtrack-Listener" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 cd C:\ProgramData\Microsoft\Diagnosis\ETLLogs\AutoLogger echo "" > AutoLogger-Diagtrack-Listener.etl > NUL 2>&1 cacls AutoLogger-Diagtrack-Listener.etl /d SYSTEM > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\Circular Kernel Context Logger" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\LwtNetLog" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\NtfsLog" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\ReadyBoot" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\SQMLogger" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\WdiContextLog" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\WiFiSession" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 P.D: the file "C:\ProgramData\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl" can be big ! (About 10-20 MB)
Add these commands to section [Disable Windows Defender] or new section [Disable WMI Logging]: Code: REM Disable Windows Defender WMI Logging reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d 0 /f > NUL 2>&1