I'm making my own script (yes, another one of the dozen already out of there), and I seem to have the common bases. I'd like to take it a step further, but I don't have the time to research the settings. I'd like to: 1. Disable Everything in Express Settings 2. Disable Location 3. Disable Cortana 4. Disable Wi-Fi Sense 5. Disable Windows Update P2P Bandwidth Stealing 6. Disable Windows Defender Cloud and Submissions 7. Toggle everything else in privacy. It should be possible to use a reg monitor, but it would save me a lot of time that I don't have, if someone already knows those reg keys.
Got one to disable cortana and bing search Code: REM Disable Cortana / Bing Search and Searchbar reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "CortanaEnabled" /t REG_DWORD /d 0 /f > NUL 2>&1 reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "SearchboxTaskbarMode" /t REG_DWORD /d 4 /f > NUL 2>&1 reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "BingSearchEnabled" /t REG_DWORD /d 0 /f > NUL 2>&1
That works except that one with a DWORD of 4 seems to be actually 0. Also, that command you posted on another topic allows me to readd all Metro Apps. I'm trying to make a process that is 100% reversible.
I've got you covered on at least the privacy settings Cody. I've been collecting my own set of registry tweaks in VM. I've actually run a registry monitor on Settings because it's a separate app (SystemSettings.exe) and these were the settings it captured. The monitor I used was RegFromApp. There are probably better ones, but it's the one I could find and it's easy to use. Spoiler Windows Registry Editor Version 5.00 ; General [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo] "Enabled"=dword:00000000 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost] "EnableWebContentEvaluation"=dword:00000000 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Input\TIPC] "Enabled"=dword:00000000 [HKEY_CURRENT_USER\Control Panel\International\User Profile] "HttpAcceptLanguageOptOut"=dword:00000001 ; Location [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{BFA794E4-F964-4FDB-90F6-51056BFE4B44}] "Value"="Deny" ; Camera [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-3445883232-1224167743-206467785-1580939083-2750001491-3097792036-3019341970\{E5323777-F976-4f5b-9B55-B94699C46E44}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-3624051433-2125758914-1423191267-1740899205-1073925389-3782572162-737981194\{E5323777-F976-4f5b-9B55-B94699C46E44}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-3232211935-909325347-210818523-1333736584-3758124246-283266685-1557978965\{E5323777-F976-4f5b-9B55-B94699C46E44}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{E5323777-F976-4f5b-9B55-B94699C46E44}] "Value"="Deny" ; Microphone [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-4153522205-3718366397-1353898457-1332184198-1210887116-3116787857-2103916698\{2EEF81BE-33FA-4800-9670-1CD474972C3F}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-2679466428-2257802901-1755839644-3032159574-3452485508-990264208-3332697187\{2EEF81BE-33FA-4800-9670-1CD474972C3F}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-3624051433-2125758914-1423191267-1740899205-1073925389-3782572162-737981194\{2EEF81BE-33FA-4800-9670-1CD474972C3F}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{2EEF81BE-33FA-4800-9670-1CD474972C3F}] "Value"="Deny" ; Speech, inking, & typing [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Personalization\Settings] "AcceptedPrivacyPolicy"=dword:00000000 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\InputPersonalization] "RestrictImplicitTextCollection"=dword:00000001 "RestrictImplicitInkCollection"=dword:00000001 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore] "HarvestContacts"=dword:00000000 [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search] "CortanaMUID"="MUID=354e6526b5cf44628c9e2bc1b71f9e04" ; Account info [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{C1D23ACC-752B-43E5-8448-8D0E519CD6D6}] "Value"="Deny" ; Contatcts [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-3232211935-909325347-210818523-1333736584-3758124246-283266685-1557978965\{7D7E8402-7C54-4821-A34E-AEEFD62DED93}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-2551677095-2355568638-4209445997-2436930744-3692183382-387691378-1866284433\{7D7E8402-7C54-4821-A34E-AEEFD62DED93}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-155514346-2573954481-755741238-1654018636-1233331829-3075935687-2861478708\{7D7E8402-7C54-4821-A34E-AEEFD62DED93}] "Value"="Deny" ; Calendar [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-2551677095-2355568638-4209445997-2436930744-3692183382-387691378-1866284433\{D89823BA-7180-4B81-B50C-7E471E6121A3}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\S-1-15-2-3232211935-909325347-210818523-1333736584-3758124246-283266685-1557978965\{D89823BA-7180-4B81-B50C-7E471E6121A3}] "Value"="Deny" [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{D89823BA-7180-4B81-B50C-7E471E6121A3}] "Value"="Deny" ; Messaging [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{992AFA70-6F47-4148-B3E9-3003349C1548}] "Value"="Deny" ; Radios [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\{A8804298-2D5F-42E3-9531-9C8C39EB29CE}] "Value"="Deny" ; Other devices [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeviceAccess\Global\LooselyCoupled] "Value"="Deny" ; Feedback and Diagnostics [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Siuf\Rules] "NumberOfSIUFInPeriod"=dword:00000000
This is probably the WU P2P thing... HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config DownloadMode DWORD 0 = Off - Download updates only from Microsoft 2 = Download updates from Microsoft and LAN 3 = Download updates from Microsoft, LAN, and Internet
Code: powershell -command "Get-AppXPackage -AllUsers | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register \"$($_.InstallLocation)\AppXManifest.xml\"}" Forgot the dash, I meant re-add, as in reinstall them all. I can get down to like 5 apps by attempting to remove all APPX (lots of fails as it returns core system stuff), and then put them all back with that line.
Here are my personal findings: 4.) Don't know if it still works because I haven't tested Win10 RTM on my Laptop yet, but I did a few months ago and back then I figured this out: *) reg add "HKLM\SOFTWARE\Microsoft\wcmsvc\wifinetworkmanager\crowdsrcplugin" /v "EnableWiFiCrowdsourcing" /t *) reg_dword /d 0 /f --- 6.) Two registry keys: *) reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t reg_dword /d 0 /f *) reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /t reg_dword /d 0 /f BUT you first have to get the rights to modify them, i.e. take ownership + grant the rights to yourself! --- 7.) Most is disabled by these two PS lines: *) powershell -command "Get-ChildItem HKCU:\Software\Microsoft\Windows\CurrentVersion\BackgroundAccessApplications | New-ItemProperty -Name Disabled -Value 1" *) powershell -command "Get-ChildItem HKCU:\Software\Microsoft\Windows\CurrentVersion\DeviceAccess\Global | Set-ItemProperty -Name Value -Value Deny" The rest: *) reg add "HKCU\Control Panel\International\User Profile" /v "HttpAcceptLanguageOptOut" /t reg_dword /d 1 /f *) reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack" /v "DiagTrackAuthorization" /t reg_dword /d 0 /f *) reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t reg_dword /d 0 /f *) reg add "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t reg_dword /d 0 /f --- Keep in mind however, that I already started with non-express settings and disabled everything there, so the above lines only "repair" the remaining settings.
I got that script from an article online I haven't tested it myself though. Manypeople tried it but they reported more success with just creating a new user profile...
I just did PrivacySettings.reg seemed to do the trick with notepad everything off ? Right now plus i use a local account ..? I also looked in settings and locations and everything off plus looked in edge about the location setting in \All Control Panel Items / internet options and is disabled .. Thanks by the way ..?
If it is then I'm doing something wrong on my VM because adding that key does nothing. The only thing that changes the setting on my VM is: Code: [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization] "SystemSettingsDownloadMode"=dword:00000001
Yeah, they changed the key name (Honi soit qui mal y pense). Now it's: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v "DODownloadMode" /t reg_dword /d 0 /f
I reset my VM and choose express settings. The spoiler in my first post now doesn't assume that you turned everything off.
@TheCandyManHK Sorry for the ignorance. When you say PrivacySettings.reg are you implying 'slayer9450 post #4' on this page or something else. Please advise. Regards
Anyone figured out how to use Windows SIM to make an autounattend.xml to set the default OOBE options to disable the privacy invasion crap? All I can find are the old OOBE things that have no relevance.
Looks like I indeed had it wrong. Values for me seem to be 0 = Disabled 1 = LAN 2 = LAN+WAN The HKCU one is weird in that it doesn't map. It becomes 1 if I set it to LAN and then off. I'm just going to keep that one, but I have seen it hit 3, never 0. Can someone confirm the Wi-Fi Sense? I don't have the posted key, nor a Windows 10 test environment with Wi-Fi, hence no way to see Wi-Fi settings. Otherwise, things are going along quite well so far.
DoNotSpy10 has this feature. So I ran it and a registry monitor. As determined by RegFromApp and RegShot: Code: [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\WcmSvc\wifinetworkmanager\features\S-1-5-21-3902212115-2543662138-3061636537-1001] "FeatureStates"=dword:0000033c Note: Since my VM doesn't have Wi-Fi (it doesn't show up in the Network & Internet section of Settings) we'll take the software's word for it.
We need a stickied first post updated with commented scripts on what everything is doing.... I don't want to really be responsible for it, but If I must then I must.