lol come on you can do it better, many programs even security related install their own service to work. Just want to be informed and see your point of view.
- of course, many programs even security related install their own service to work, but that does not mean they are better than OS service, in this case OS-Audit-Policies. - but do not need you to worry if you're satisfied, that's just my opinion.
@dhjohns: I don't say that Win 10 stinks... On Win 7 it was easy to get the Update Service working when you allow the Windows Update Service and a few IP's for the svchost.exe. With Win 10 it is really not so easy to get Windows Update working with a whitelisted firewall. So, I think you comparison is wrong...
Still most of the discussions on this forum degenerate into talking about how horrible Windows 10 is and how to bind, and gag it so it doesn't work.
If Windows 10 is a car, this blocking is more like removing a fancy new GPS system that's a little too smart for its own good. We can get to where we need to go without it.
lol According to dhjohns if I claim NSA and associates (M$, long etc.) are spying I must present solid, robust and undeniable evidence of such claims. How can I do that? A mere mortal citizen? (From Mexico in my case) Besides, that superior power (US government and world elite) is using all its infinite resources to be elusive and hide from people trying to prove its existence ROFL.
Actually with this setup, what will be blocked? Can you give a list? Like, Telemetry Cortana Edge OneDrive so and so.... Because if something doesn't work as usual I'll know that it's because I blocked it through this.
In the OP there's 2 .reg files, one to allow Windows Update and another to block. Although shouldn't we be able to block it just by not having those IP's rules? My point: Isn't the rule of having to block those IP's the same of not having them there at all? Since outbound connections that do not match a rule are blocked i think there's really no need of having them there. Correct me if i'm wrong tho.