Discussion in 'MDL Projects and Applications' started by pf100, Nov 28, 2016.
Atleas your script will make my pc windows update disabled forever :v
@pf100 has worked very hard in the past year or so keeeping up with ms's f--kery, hats off to the man
Yow you right buddy just keep up about this script anyway
My old win 7 machine died recently & now forced onto to win 10, your script works perfectly for mine on this OS, thank you.
get an intel 8th or 9th gen cpu, H310C (R2.0) board, add intel usb drivvers to boot and install wims and robert is your mothers brother.
I'm not sure this version works anymore. If I run Sledgehammer and then go "net start wuauserv", it fails, and "sc query wuauserv" explains the service is disabled, both of which are expected, but I checked the list of updates and a bunch of them got installed yesterday. Not sure how this is happening.
Microsoft-OneCore-ApplicationModel-Sync-Desktop-FOD-Package~31bf3856ad364e35~amd64~~10.0.18362.295 | Superseded | OnDemand Pack | 10/4/2019 5:55 AM
Microsoft-OneCore-ApplicationModel-Sync-Desktop-FOD-Package~31bf3856ad364e35~amd64~~10.0.18362.329 | Installed | OnDemand Pack | 10/4/2019 6:41 AM
Microsoft-Windows-Client-LanguagePack-Package~31bf3856ad364e35~amd64~en-US~10.0.18362.295 | Superseded | Language Pack | 10/4/2019 5:55 AM
Microsoft-Windows-Client-LanguagePack-Package~31bf3856ad364e35~amd64~en-US~10.0.18362.356 | Installed | Language Pack | 10/4/2019 6:41 AM
Microsoft-Windows-FodMetadata-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | Feature Pack | 3/19/2019 6:19 AM
Microsoft-Windows-Foundation-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | Foundation | 3/19/2019 4:56 AM
Microsoft-Windows-Hello-Face-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:18 AM
Microsoft-Windows-InternetExplorer-Optional-Package~31bf3856ad364e35~amd64~~11.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:19 AM
Microsoft-Windows-LanguageFeatures-Basic-en-us-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:19 AM
Microsoft-Windows-LanguageFeatures-Handwriting-en-us-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:19 AM
Microsoft-Windows-LanguageFeatures-OCR-en-us-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:19 AM
Microsoft-Windows-LanguageFeatures-Speech-en-us-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:19 AM
Microsoft-Windows-LanguageFeatures-TextToSpeech-en-us-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:19 AM
Microsoft-Windows-MediaPlayer-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:19 AM
Microsoft-Windows-NetFx3-OnDemand-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 8/4/2019 3:28 AM
Microsoft-Windows-QuickAssist-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:19 AM
Microsoft-Windows-TabletPCMath-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:18 AM
Microsoft-Windows-Xps-Xps-Viewer-Opt-Package~31bf3856ad364e35~amd64~~10.0.18362.145 | Superseded | OnDemand Pack | 10/4/2019 5:55 AM
Microsoft-Windows-Xps-Xps-Viewer-Opt-Package~31bf3856ad364e35~amd64~~10.0.18362.356 | Installed | OnDemand Pack | 10/4/2019 6:41 AM
OpenSSH-Client-Package~31bf3856ad364e35~amd64~~10.0.18362.1 | Installed | OnDemand Pack | 3/19/2019 6:19 AM
Package_for_DotNetRollup~31bf3856ad364e35~amd64~~10.0.1.2819 | Superseded | Update | 10/4/2019 5:59 AM
Package_for_DotNetRollup~31bf3856ad364e35~amd64~~10.0.1.3003 | Installed | Update | 10/4/2019 6:41 AM
Package_for_KB4508433~31bf3856ad364e35~amd64~~18362.263.1.1 | Installed | Security Update | 8/14/2019 3:31 PM
Package_for_KB4509096~31bf3856ad364e35~amd64~~183188.8.131.52 | Installed | Security Update | 8/4/2019 2:10 AM
Package_for_KB4515383~31bf3856ad364e35~amd64~~18362.350.1.0 | Installed | Security Update | 9/11/2019 8:26 AM
Package_for_RollupFix~31bf3856ad364e35~amd64~~18362.295.1.5 | Superseded | Update | 10/4/2019 5:55 AM
Package_for_RollupFix~31bf3856ad364e35~amd64~~18362.356.1.9 | Installed | Update | 10/4/2019 6:41 AM
@ajnauron What version of Windows 10 are you running? I have a test machine on 1903 pro that I haven't updated since July. All other version works the same the way I'm blocking updates so I don't know.
You already said wuauserv is disabled, so check task scheduler "\microsoft\windows\updateorchestrator" and all tasks under "last run result" should say either "task has not yet run" or "access denied."
None of those updates you listed should have installed on their own and I have no other reports of anything like this happening.
Open admin powershell window. Enter "Get-WindowsUpdateLog". This will create a WindowsUpdate.log file on your desktop. Make a link to where I can download it or post it on pastebin and I'll take a look.
You need to login to view this posts content.
@ajnauron I looked through the update log for the updates you put in bold and there's no record of them being installed through windows updates.
Did you install any software on the morning of October 4, like Office or any manufacturer software (dell, hp, lenovo)?
I could be wrong, but it looks like those updates were installed through the installation of other software that was installed either manually, or downloaded and installed by a program that updates itself.
No manual installs/SW install GPOs/automated SW installs (non-domain joined). If this interests you I could provide any additional logs as requested, but otherwise I'll just keep an eye on them, not clear what's happening.
I wish I could be physically present or connect to your computer to find evidence of what might have happened. I'm not a pro at forensically tracing logs of update installs because I've never had an unexpected update and needed to trace that process specifically in my research.
Can you send me your "Windows\SoftwareDistribution\ReportingEvents.log" file?
seemingly ms pushes dotnet updates to the machines.
i suspect my dear1 machine at work as targeted by ms extended patience (the lovely immersive start menu is broken now - thank god for open shellol). i do not know but im absolutely sure it's caused by windows (dotnet) update.
however -> sledgehammer protected me from installing useless spy-updates for several months now. thank you once more for your work on the project! i do know how much time scripting consumes
If this is happening because an external program is downloading or updating DotNet or whatever like how some programs will download or update Visual C++ or DirectX runtimes then I want to let that happen. But if it's coming through any of Windows 10's forced update mechanisms then I want to force control of all of that. None of the previously mentioned updates appear to be coming through Windows Update as best as I can tell. No updates should ever be getting through in Home versions without allowing it like in the problem above or any other version. I'll keep a close eye on this because my mission in life is to control Windows 10's forced updates.
This might have been a case of Store-updating/downloading a Centennial App. I suspect the downloaded Dotnet updates are dependencies/requirements of the Centennial-packed Store app (like, e. g. Paint). You can check the history of Store App updates in the Store account info.
Sledgehammer doesn't block the Store update, or does it?
Sledgehammer doesn't block any Store and app updates on purpose, but it can block some operations of the Store just because wuauserv is disabled.
I'm not sure where the line is drawn on what the Store can and can't update while Sledgehammer is in place because Microsoft keeps changing things.
The Store used to require wuauserv to run, but at some point you can now open the Store with wuauserv disabled, you just can't install an app.
All I know is that the Store itself has full functionality when you allow it in the script's Configurator screen.
The script has never blocked anything to do with any app once it's installed, or if it does I've never heard of it happening.
I've never studied exactly how the Store works so I'll ask around about this. Thanks for the info.
It's, of course, only speculation. However, if WU is blocked, Store is the only thing that could theoretically push things onto the system (apart from external apps that trigger).
Apart from that, the log only shows the packages have been installed, but not where they came from. Even with wuauserv disabled, DISM can still install CAB packages. That's what WSUS Offline Update does, for example (clarification: it shuts down wuauserv, but not disables it. The service is not started through update installing).
pf100 first of all I want to say thank you for making this wonderful script.
I really like how it works and it fits my need perfectly for someone who is a professional gamer.
I wanted to be able to run my games without any sort of windows updates ever happening to me at inconvenient times.
I also like how I can play windows store games by using the E option (In the configurator of your script)
My question for you, is there any-way to run just the CONFIGURATOR just by its self.
I am switching the service on an off quite a lot so that I can use the store temporarily, and as you might know there is a lot of stuff the script does before hand every single time.
Should I be just using WUB to do this easier or should I run your configurator inside the script every time?
Which one would be faster.
Or can you make a new script which just is the configurator?
Thank you very much