![]() |
![]() Brief Guide ➜ must view 1st! 10_BLOCK.ZIP files in plain text (ASCII) format: Complete list of files in 10_BLOCK directory. MDGx Win10 Block Tools (10_BLOCK) are also part of W95-11D.EXE + W95-11D.ZIP. More info. More tools. Comparison of Windows 10 Privacy tools. Windows 10 looks like this. |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@ MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016/2019 @@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ THE GIST ******** These topics refer strictly to all English retail/final/gamma/Gold/RTM/OEM releases, versions, editions + builds [including previews, Service Packs (SPs), updates + patches] 32-bit (x86) + 64-bit (x64) of these Microsoft Windows operating systems (OSes) - 7 http://en.wikipedia.org/wiki/Windows_7 - Server 2008 R2 http://en.wikipedia.org/wiki/Windows_Server_2008_R2 - 8 http://en.wikipedia.org/wiki/Windows_8 - 8.1 http://en.wikipedia.org/wiki/Windows_8.1 - 2012 http://en.wikipedia.org/wiki/Windows_Server_2012 - 2012 R2 http://en.wikipedia.org/wiki/Windows_Server_2012_R2 - 10 http://en.wikipedia.org/wiki/Windows_10 - Server 2016 http://en.wikipedia.org/wiki/Windows_Server_2016 - Server 2019 http://en.wikipedia.org/wiki/Windows_Server_2019 unless specified otherwise: http://www.mdgx.com/10BLK/10_BLOCK.php Also available as plain text/ASCII file (this file): http://www.mdgx.com/10BLK/10_BLOCK.TXT FYI: Windows NTx (based on Windows NT) = Windows NT4/2000/XP/2003/Vista/2008/7/8/8.1/2012/10/2016/2019/11/2022/newer Windows 9x (based on Windows 95) = Windows 95/95 OSR1/95 OSR2.x/98/98 SP1/98 SE(U)/ME * MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016/2019 stop automatic (forced!) upgrade to Windows 10 > 1-1-2016 [uninstall "Get Windows 10" (GWX) update] and disable all spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers", eliminating Microsoft annoyances and restoring online privacy [55 KB, ZIPped archive, free, unsupported]: http://www.mdgx.com/10BLK/10_BLOCK.ZIP Brief Guide: http://www.mdgx.com/xptoy.htm#10BLK This ReadMe TXT Guide => must view 1st! http://www.mdgx.com/10BLK/10_BLOCK.php ZIP archive contents: * 10_BLOCK.HTM (HTML ReadMe 1st Guide): http://www.mdgx.com/10BLK/10_BLOCK.php * 10_BLOCK.TXT (Text ReadMe 1st Guide): http://www.mdgx.com/10BLK/10_BLOCK.TXT * 10_BLOCK.CMD (Windows Command Script): http://www.mdgx.com/10BLK/10_BLOCK.CMD View as plain text: http://www.mdgx.com/10BLK/10_BLOCK.CMD.TXT * E10BLOK.CMD (Windows Command Script) executed by 10_BLOCK.CMD (see above): http://www.mdgx.com/10BLK/E10BLOK.CMD View as plain text: http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT * ELEVATE.EXE (EXEcutable) Elevate 32-bit command line tool which runs E10BLOK.CMD as Administrator in 32-bit (x86) Windows: http://code.kliu.org/misc/elevate/ * ELEVAT64.EXE (EXEcutable) Elevate 64-bit command line tool which runs E10BLOK.CMD as Administrator in 64-bit (x64) Windows: http://code.kliu.org/misc/elevate/ * ELEVATE.TXT (ReadMe 1st Text Guide) for ELEVATE.EXE + ELEVAT64.EXE (all included in 10_BLOCK.ZIP): http://www.mdgx.com/10BLK/ELEVATE.TXT * Stop DNS Client service CMD (Windows Command Script): http://www.mdgx.com/10BLK/STOP!DNS.CMD View as plain text: http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT * Start DNS Client service CMD (Windows Command Script): http://www.mdgx.com/10BLK/STARTDNS.CMD View as plain text: http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT List of files inside archive 10_BLOCK.ZIP: http://www.mdgx.com/10BLK/10_list.php Complete list of files in 10_BLOCK directory: http://www.mdgx.com/10BLK/list.php MDGx Win10 Block Tools (10_BLOCK) (ZIP Archive File): http://www.mdgx.com/10BLK/10_BLOCK.ZIP are also part of W95-11D.EXE + W95-11D.ZIP: http://www.mdgx.com/95.htm More info: http://web.archive.org/web/20180320070137/http://www.privacytools.io/#win10 More tools: http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html Windows 10 looks like this: http://i.imgur.com/zPF2k89.png USAGE => STEP-BY-STEP ********************* 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] http://www.mdgx.com/toy.htm#ZIP to open 10_BLOCK.ZIP -> extract all its files into the same dedicated/empty directory/folder. 2. Open Explorer -> go to Downloads folder (default location) %UserProfile%\Downloads [a.k.a. C:\Users\%UserName%\Downloads] -> right-click 10_BLOCK.CMD (Windows Command Script) -> Run as Administrator -> wait for batch file to complete -> restart Windows. 3. Done. ;-/ ONLINE ****** * reddit [must be logged in to view post = reddit membership is free]: http://www.reddit.com/r/windows/comments/3v2f45/ http://redd.it/3v2f45/ UPDATES ******* * Added ELEVAT64.EXE + ELEVATE.EXE [Elevate 64-bit + 32-bit EXEcutables] + ELEVATE.TXT [Elevate TXT Guide] to run 10_BLOCK.CMD, which in turn runs E10BLOK.CMD with elevated Administrator privileges, even if logged on user has reduced rights (below Administrator level), to ensure all fixes work properly. See ELEVATE.TXT (included) for details: http://www.mdgx.com/10BLK/ELEVATE.TXT ______________________________________________________________________________ Similar Windows 7/8/8.1/2012/10/2016/2019/11/2022 Anti-Spyware/Privacy Tools **************************************************************************** Windows 10/11 Fixes: http://www.majorgeeks.com/mg/sortname/windows_10_fixes.html Comparison of Windows 10/11 Privacy tools: http://www.ghacks.net/2015/08/14/comparison-of-windows-10-privacy-tools/ 11 Free Tools to Disable + Stop Windows 10/11 from Spying + Tracking You: http://www.geckoandfly.com/25083/ MANDATORY: Must run/execute/open all these apps/programs/installers (EXE)/scripts (BAT, CMD, HTA, PS1, REG, VBS) with the Explorer/shortcut right-click "Run as Administrator" option! * Blackbird 32-bit + 64-bit (free): Guide: http://www.getblackbird.net/documentation/ Program: http://www.getblackbird.net/ ReadMe: http://www.getblackbird.net/documentation/ File: http://www.getblackbird.net/download/ Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "blackbird.exe" (Application executable) -> Run as Administrator -> select options. * FixWin for Windows 10 (freeware): http://www.thewindowsclub.com/fixwin-for-windows-10/ Guide: http://www.thewindowsclub.com/repair-fix-windows-7-vista-problems-with-fixwin-utility/ Program: http://www.thewindowsclub.com/downloading-fixwin-10/ ReadMe: http://www.thewindowsclub.com/list-of-fixes-available-in-fixwin-10/ File: http://www.thewindowsclub.com/downloads/FixWin10.zip Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "FixWin 10.1.exe" (Application executable) -> Run as Administrator. * I Don't Want Windows 10 (free, open source): Guide: http://www.msfn.org/board/topic/173961-windows-10-gwx-update-removal-tool-for-windows-7-and-windows-81/ Program: http://github.com/rn10950/I-Dont-Want-Windows-10/releases/ ReadMe: http://github.com/rn10950/I-Dont-Want-Windows-10/ File: http://github.com/rn10950/I-Dont-Want-Windows-10/releases/download/4.0/I_Dont_Want_Windows_10_v4.zip Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "I Don't Want Windows 10.exe" (Application executable) -> Run as Administrator. * WindowsSpyBlocker (free, open source): Guide: http://www.ghacks.net/2016/05/15/windows-spy-blocker-review/ Program: http://github.com/crazy-max/WindowsSpyBlocker/ ReadMe: http://github.com/crazy-max/WindowsSpyBlocker/wiki/ File: http://github.com/crazy-max/WindowsSpyBlocker/releases/ Usage: Open Explorer -> right-click "WindowsSpyBlocker.exe" (Application executable) -> Run as Administrator -> select options. * Spydish 32-bit + 64-bit (free, open source): Guide: http://github.com/builtbybel/spydish/ Program: http://www.mirinsoft.com/ms-apps/spydish/ Files: http://github.com/builtbybel/spydish/releases/latest/ Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "Spydish.exe" (Application executable) -> Run as Administrator. * DisableWinTracking (free, open source): Guide: http://web.archive.org/web/20180320070137/http://www.privacytools.io/#win10 Program: http://github.com/10se1ucgo/DisableWinTracking/ ReadMe: http://github.com/10se1ucgo/DisableWinTracking/releases/ File: http://github.com/10se1ucgo/DisableWinTracking/releases/download/v2.5.1/disablewintracking.exe Usage: Open Explorer -> right-click "disablewintracking.exe" (Application executable) -> Run as Administrator -> check "Privacy" -> press Go. * Destroy Windows Spying (DWS) (free, open source): Guide: http://www.bgr.com/2015/08/14/windows-10-spying-prevention-privacy-tools/ Program: http://github.com/Nummer/Destroy-Windows-10-Spying/releases/ File: http://github.com/Nummer/Destroy-Windows-10-Spying/releases/download/1.6.722/DWS_Lite.exe Usage: Open Explorer -> right-click "DWS_Lite.exe" (Application executable) -> Run as Administrator. * O&O ShutUp10 (freeware): Guide: http://www.dottech.org/185920/ Program: http://www.oo-software.com/shutup10/ File: http://dl5.oo-software.com/files/ooshutup10/OOSU10.exe Usage: Open Explorer -> right-click "OOSU10.exe" (Application executable) -> Run as Administrator. * Win10 Spy Disabler (freeware): Guide: http://www.site2unblock.com/win10-spy-disabler/ Program: http://www.site2unblock.com/win10-spy-disabler/ File: http://www.site2unblock.com/download/win10-spy-disabler-portable.zip Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "Win10 Spy Disabler" shortcut inside installed folder -> Run as Administrator -> select options. * Windows Privacy Tweaker (freeware): Guide: http://www.phrozensoft.com/2015/09/windows-privacy-tweaker-4 Program: http://www.phrozensoft.com/2015/09/windows-privacy-tweaker-4 File: http://www.phrozensoft.com/uploads/2016/01/WindowsPrivacyTweakerV2.zip Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "Windows Privacy Tweaker.exe" (Application executable) -> Run as Administrator. * W10Privacy (freeware + donationware): Guide: http://www.bgr.com/2015/08/14/windows-10-spying-prevention-privacy-tools/ Program: http://www.winprivacy.de/english-home/ File: http://www.winprivacy.de/app/download/12302828636/W10Privacy.zip Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "W10Privacy.exe" (Application executable) -> Run as Administrator. * Win.Privacy Beta (freeware): Guide: http://windotprivacy.co.nf/ Program: http://windotprivacy.co.nf/ File: http://www.majorgeeks.com/files/details/win_privacy.html Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "Win.Privacy.exe" (Application executable) -> Run as Administrator. * WinPurify (freeware): Guide: http://www.majorgeeks.com/files/details/winpurify.html Program: http://www.winpurify.xyz/ File: http://www.winpurify.xyz/WinPurify.zip Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "WinPurify.exe" (Application executable) -> Run as Administrator. * Spybot Anti-Beacon for Windows 10 (freeware): Guide: http://www.majorgeeks.com/files/details/spybot_anti_beacon_for_windows_10.html Program: http://forums.spybot.info/showthread.php?72686 ReadMe: http://forums.spybot.info/downloads.php?id=58 File: http://download.spybot.info/AntiBeacon/StandAlone/SDAntiBeacon-1.5.exe Usage: Open Explorer -> right-click "SDAntiBeacon-1.5.exe" (Application executable) -> Run as Administrator. * Ashampoo AntiSpy for Windows 10 (freeware): Guide: http://www.majorgeeks.com/files/details/ashampoo_antispy_for_windows_10.html Program: http://www.ashampoo.com/en/usd/pin/1004/security-software/Antispy-for-Windows-10/ ReadMe: http://www.ashampoo.com/en/usd/pde/1004/security-software/Antispy-for-Windows-10/ File: http://cdn1.ashampoo.net/public/ashf/1004/Ashampoo_AntiSpy.exe Usage: Open Explorer -> right-click "Ashampoo_AntiSpy.exe" (Application executable) -> Run as Administrator. * Win10 SpyStop (freeware): Guide: http://www.majorgeeks.com/files/details/win10_spystop.html Program: http://www.evorim.com/en/ File: http://www.evorim.com/win10spystop/win10spystop-x32-setup.exe Usage: Open Explorer -> right-click "win10spystop-x32-setup.exe" (Application executable) -> Run as Administrator. * DoNotSpy10 (freeware: adware! + donationware): Guide: http://www.bleepingcomputer.com/forums/t/586731/ Program: http://www.pxc-coding.com/portfolio/donotspy10/ ReadMe: http://www.pxc-coding.com/portfolio/donotspy10/ File: http://www.pxc-coding.com/downloads/donotspy10/DoNotSpy10-1.1.0.0-Setup.exe Usage: 1. Open Explorer -> right-click "DoNotSpy10-1.1.0.0-Setup.exe" (Application executable) -> Run as Administrator. 2. Open Explorer -> right-click "DoNotSpy10" shortcut inside installed folder -> Run as Administrator -> select options. * Never10 (freeware): Guide: http://www.grc.com/never10/details.htm Program: http://www.grc.com/never10.htm ReadMe: http://www.grc.com/never10.htm File: http://www.grc.com/files/never10.exe Usage: Open Explorer -> right-click "never10.exe" (Application executable) -> Run as Administrator. * Windows 10 Rollback Utility (freeware): Guide: http://www.majorgeeks.com/files/details/windows_10_rollback_utility.html Program: http://www.neosmart.net/Win10Rollback/ ReadMe: http://www.neosmart.net/Win10Rollback/ File: http://www.majorgeeks.com/files/details/windows_10_rollback_utility.html Usage: 1. Burn "Windows 10 Rollback Utility.iso" (ISO File) on blank/empty CD-R/DVD-R/BD-R/USB media. 2. Reboot from CD-R/DVD-R/BD-R/USB disc/stick. 3. Follow instructions to revert (roll) back to previous Windows 7/8/8.1 OS (if any). * Aegis CMD script (free, open source): Guide: http://www.ghacks.net/2016/01/26/block-all-windows-10-components-on-windows-7-and-8/ Program: http://www.voat.co/v/technology/comments/459263/ ReadMe: http://github.com/th3power/aegis-voat/ File: http://github.com/th3power/aegis-voat/archive/v1.10.zip Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "aegis.cmd" (Windows Command Script) -> Run as Administrator. * GWX Control Panel (freeware): Guide: http://blog.ultimateoutsider.com/2015/08/using-gwx-stopper-to-permanently-remove.html Program: http://www.ultimateoutsider.com/downloads/ ReadMe: http://blog.ultimateoutsider.com/2015/08/using-gwx-stopper-to-permanently-remove.html File: http://www.ultimateoutsider.com/downloads/GwxControlPanelSetup.exe Usage: 1. Open Explorer -> right-click "GwxControlPanelSetup.exe" (Application executable) -> Run as Administrator. 2. Open Explorer -> right-click "GWX Control Panel" shortcut inside installed folder -> Run as Administrator -> select options. * 10AppsManager (freeware): Guide: http://www.majorgeeks.com/files/details/10appsmanager.html Program: http://www.thewindowsclub.com/10appsmanager-windows-10/ ReadMe: http://www.thewindowsclub.com/10appsmanager-windows-10/ File: http://www.thewindowsclub.com/downloading-10appsmanager/ Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "10AppsManager.exe" (Application executable) -> Run as Administrator. * Windows X App Remover (free, open source): Guide: http://sourceforge.net/projects/windows8appremover/ Program: http://mademan.bplaced.net/page-v2/unterseite-1-1.html ReadMe: http://winxappremover.codeplex.com/ File: http://sourceforge.net/projects/windows8appremover/files/ Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "WindowsXAppRemover.exe" (Application executable) -> Run as Administrator. * Uninstall Cortana from Windows 10 CMD script (freeware): Guide: http://www.winaero.com/blog/how-to-uninstall-and-remove-cortana-in-windows-10/ Program: http://www.winaero.com/download.php?view.1832 File: http://www.winaero.com/request.php?1832 Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "Uninstall Cortana.cmd" (Windows Command Script) -> Run as Administrator. * Edge Blocker (freeware): Guide: http://www.sordum.org/9312/ Program: http://www.sordum.org/9312/ File: http://www.sordum.org/files/download/edge-blocker/EdgeBlock.zip Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click "EdgeBlock.exe" (Application executable) -> Run as Administrator. * Windows10Debloater (free, open source): Guide: http://github.com/Sycnex/Windows10Debloater/blob/master/README.md/ Program: http://github.com/Sycnex/Windows10Debloater/ ReadMe: http://github.com/Sycnex/Windows10Debloater/blob/master/README.md/ Files [right-click each 1 -> Save as...]: http://raw.githubusercontent.com/Sycnex/Windows10Debloater/master/Windows10Debloater.ps1 http://raw.githubusercontent.com/Sycnex/Windows10Debloater/master/Windows10DebloaterGUI.ps1 Usage: Open Explorer -> right-click "Windows10Debloater.ps1" + then "Windows10DebloaterGUI.ps1" -> Run as Administrator -> enable execution of PowerShell scripts: Set-ExecutionPolicy Unrestricted -Force -> run each PowerShell script (.ps1) file above -> restart computer. * Debloat Windows 10 (free, open source): Guide: http://github.com/W4RH4WK/Debloat-Windows-10/ Program: http://github.com/W4RH4WK/Debloat-Windows-10/ File: http://github.com/W4RH4WK/Debloat-Windows-10/archive/master.zip ReadMe: http://github.com/W4RH4WK/Debloat-Windows-10/blob/master/README.md/ Usage: 1. Use an unZIPping/unARChiving/unRARing tool [free(ware)] to open ZIP (.zip) archive and extract its files: http://www.mdgx.com/toy.htm#ZIP 2. Open Explorer -> right-click each .ps1 (PowerShell script) file in .zip -> Run as Administrator -> enable execution of PowerShell scripts: Set-ExecutionPolicy Unrestricted -Force -> right-click PowerShell.exe shortcut -> Run as Administrator -> unblock PowerShell scripts + modules from within files folder: ls -Recurse *.ps1 | Unblock-File ls -Recurse *.psm1 | Unblock-File -> run each PowerShell script in ZIP -> restart computer. ______________________________________________________________________________ Disable/Reenable User Account Control (UAC) ******************************************* Windows Vista/newer users: right-click each file in Windows/File Explorer -> select Run as Administrator (temporary fix) or disable User Account Control (UAC) (permanent fix) in: - Windows 10/2016/2019/11/2022: http://www.tenforums.com/tutorials/3577-user-account-control-uac-change-settings-windows-10-a.html - Windows 8/2012/8.1/2012 R2: http://www.eightforums.com/tutorials/5509-user-account-control-uac-change-settings-windows-8-a.html - Windows 7/2008 R2: http://www.petri.com/disable-uac-in-windows-7/ - Windows Vista/2008: http://www.petri.com/disable_uac_in_windows_vista/ Free(ware) tools to disable/reenable UAC: - UAC Pass: http://sites.google.com/site/freeavvarea/uac-pass/uac-pass/ - TweakUAC: http://www.winability.com/tweak-uac/ - Disable UAC: http://www.majorgeeks.com/files/details/disable_uac.html FYI: MDGx Tweaked + Customized File Manager (FM) installer FMNT32.EXE (free): http://www.mdgx.com/xptoy.htm#FMNT also installs "Disable User Account Control (UAC)" + "Enable User Account Control (UAC)" items to Desktop right-click shell context menu. For details open TAKEOWN.INF + TAKEOWN.REG (both in C:\FileMan) using Notepad or better Notepad replacement [free(ware)]: http://www.mdgx.com/toy.htm#TXT ______________________________________________________________________________ Restore/(Re)Install Windows 7 SP1/8/8.1 or Switch to Linux (free + safe) ************************************************************************ * Strongly Recommended: Windows 10 users: 30 days after Windows 10 was installed (mostly by force, behind your back, without your knowledge!) on your computer(s)/laptop(s) you still have the option to restore/(re)install your (previous) operating system (OS): Windows 7 SP1, 8 or 8.1: MSKB: http://support.microsoft.com/help/4027936/ How-To Geek: http://www.howtogeek.com/220723/ PC Advisor: http://www.pcadvisor.co.uk/how-to/windows/how-downgrade-windows-10-to-windows-7-8-easy-3615606/ * Or Switch to Linux (free + safe): Switch to Linux... The Free OS: http://www.mdgx.com/linux.htm How to Move from Windows to Linux in 8 steps: http://www.wikihow.com/Move-from-Windows-to-Linux/ How to Switch from Windows to Ubuntu in 7 steps (example): http://www.wikihow.com/Switch-to-Ubuntu/ 10 Reasons Why You Should Switch To Linux: http://itsfoss.com/reasons-switch-linux-windows-xp/ Switch to Netrunner Linux distro (example): http://www.betanews.com/2019/01/14/netrunner-blackbird-linux-win7/ Is Windows 10 Conditioning Us for a Microsoft Linux OS? http://www.redmondmag.com/articles/2017/09/13/is-windows-10-conditioning-us-linux.aspx ______________________________________________________________________________ Windows 10 = Errors, Flaws, Spyware + Privacy Nightmare ******************************************************* * Hold on to your horses... ;-/ Too many Windows 10 Updates are buggy/flawed, may generate errors, lock up your computer(s)/laptop(s), restart/reboot unexpectedly in the middle of performing critical/essential/vital work, and/or even cause loss of data [!], and these are just a few examples: http://kotaku.com/1846864671/ http://www.techradar.com/news/new-windows-10-update-is-causing-a-whole-world-of-pain/ http://betanews.com/2021/02/07/windows-10-updates-kb4598299-kb4598301-visual-studio-problems/ http://www.komando.com/security-privacy/latest-windows-10-update-causing-serious-issues-including-blue-screen-of-death/760098/ http://callnerds.com/windows-10-update-disaster-and-what-you-should-do-about-it/ http://www.pcmag.com/news/microsoft-re-releasing-windows-10-october-update-for-all/ http://www.maketecheasier.com/latest-windows-10-update-problems/ http://www.howtogeek.com/658194/ http://www.forbes.com/sites/gordonkelly/2020/05/19/microsoft-windows-10-warning-crashes-bsod-chrome-browser-slowdown-gaming-problems-upgrade-windows-10-free/ http://www.pcmag.com/news/windows-10-update-degrades-performance-in-some-games/ http://www.forbes.com/sites/gordonkelly/2020/05/27/microsoft-issues-windows-10-update-warning-kb4556799-free-windows-10-upgrade/ http://www.cnet.com/news/microsoft-windows-10-forced-updates-auto-restarts-are-the-worst/ ... And it goes on, and on... Microsoft accidentally reveals that it is testing ads in Windows Explorer: http://arstechnica.com/gadgets/2022/03/microsoft-accidentally-reveals-that-it-is-testing-ads-in-windows-explorer/ WTF Microsoft: For months Microsoft hid that Registry backup no longer worked while Windows 10 reported it as successfully completed: http://www.computerworld.com/article/3406846/wtf-microsoft.html Microsoft Issues Warning for 800 Million Windows 10 Users: http://www.forbes.com/sites/gordonkelly/2019/06/29/microsoft-windows-10-upgrade-registry-warning-upgrade-windows/ Microsoft explains the lack of Registry backups in Windows 10: http://www.ghacks.net/2019/06/29/microsoft-explains-the-lack-of-registry-backups-in-windows-10/ Don't use Windows 10 - It's a privacy nightmare: http://web.archive.org/web/20180320070137/http://www.privacytools.io/#win10 What Windows 10's "Privacy Nightmare" Settings Actually Do: http://www.lifehacker.com/1722267229/ Windows 10 Sends Your Data 5500 Times Every Day Even After Tweaking Privacy Settings: http://www.thehackernews.com/2016/02/microsoft-windows10-privacy.html Even when told not to Windows 10 just can't stop talking to Microsoft: http://www.arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/ From the horse's mouth: Microsoft Windows 10 License Terms: http://www.microsoft.com/en-us/useterms/retail/windows/10/useterms_retail_windows_10_english.htm Windows 10 doesn't offer much privacy by default: Here's how to fix it: http://www.arstechnica.com/information-technology/2015/08/windows-10-doesnt-offer-much-privacy-by-default-heres-how-to-fix-it/ Microsoft may be collecting more data than initially thought: http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/ Windows 10 privacy issues you should know about: http://www.thenextweb.com/microsoft/2015/07/29/wind-nos/ How to disable data logging in W10: http://www.reddit.com/r/Windows10/comments/3f38ed/ Windows 10 Privacy Settings: http://www.tweakhound.com/2015/11/19/windows-10-privacy-settings-2/ Microsoft warning: 'Use Windows 7 at Your Own Risk', seriously?: http://www.thehackernews.com/2016/01/microsoft-windows-7.html Microsoft's Windows 10 is a privacy nightmare. Here's how to protect yourself: http://www.slate.com/articles/technology/bitwise/2015/08/windows_10_privacy_problems_here_s_how_bad_they_are_and_how_to_plug_them.html Windows 10 is spying on almost everything you do -- here's how to opt out: http://www.bgr.com/2015/07/31/windows-10-upgrade-spying-how-to-opt-out/ Windows 10 automatically spies on your children and sends you a dossier of their activity: http://www.boingboing.net/2015/08/10/windows-10.html Microsoft's Windows 10 has permission to watch your every move: http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html Is Windows 10 really a privacy nightmare? http://money.cnn.com/2015/08/17/technology/windows-10-privacy/ Windows 10 comes with built-in spyware; if your work requires confidentiality DO NOT INSTALL: http://www.dailykos.com/story/2015/8/2/1408113/-Windows-10-comes-with-built-in-spyware-If-your-work-requires-confidentiality-DO-NOT-INSTALL/ How Bad Is Microsoft's Data Land-Grab? http://www.slate.com/articles/technology/bitwise/2016/01/microsoft_holds_a_copy_of_windows_10_users_drive_encryption_keys_how_scary.html Updategate: Microsoft is about to make it even harder to opt out of Windows 10: http://www.theinquirer.net/inquirer/news/2430786/updategate-microsoft-is-now-installing-windows-10-by-default-in-windows-update/ Microsoft upgraded users to Windows 10 without their OK: http://www.infoworld.com/article/3043526/ 10 reasons you shouldn't upgrade to Windows 10: http://www.infoworld.com/article/2972298/ Microsoft Starts Collecting User Data from Windows 7 and Windows 8 PCs: http://news.softpedia.com/news/microsoft-starts-collecting-user-data-from-windows-7-and-windows-8-pcs-490302.shtml Changes in Computing: Super Silos and Garbage Heap Dogs [Why is Windows 10 different?]: http://www.jsware.net/jsware/comp2012plus.php5 Microsoft CMO on Windows 10's Pushy Update: http://www.youtube.com/watch?v=R-j3ZSa33Fw Microsoft Blog: Windows 10 for Enterprise: More secure and up to date: http://blogs.windows.com/business/2015/01/30/windows-10-for-enterprise-more-secure-and-up-to-date/ Microsoft Blog: Our continuing commitment to your privacy with Windows 10: http://blogs.windows.com/windowsexperience/2017/01/10/continuing-commitment-privacy-windows-10/ Windows 7 Users Are Refusing to Upgrade to Windows 10: Here's Why: http://www.laptopmag.com/articles/windows-7-market-share/ Windows 10 looks like this: http://i.imgur.com/zPF2k89.png ______________________________________________________________________________ Windows 7/8/8.1: Block/Disable/Stop Forced Windows 10 Upgrade ************************************************************* Complete List of All Updates You Should Uninstall to Block Windows 10: http://www.addictivetips.com/windows-tips/a-complete-list-of-all-updates-you-should-uninstall-to-block-windows-10/ Block Windows 8.1/10 Automatic (Forced) Upgrade > 1-1-2016 step-by-step Guides: Can't stop Windows 10 upgrade: http://www.hardforum.com/showthread.php?t=1871988 Disable Data Collection in Windows 10: http://www.msfn.org/board/topic/174160-guide-disable-data-collection-in-windows-10/ How to Stop Windows 7/8 from Downloading Windows 10 Automatically: http://www.howtogeek.com/228551/ What Is $WINDOWS.~BT Folder On My Hard Drive?: http://www.addictivetips.com/windows-tips/what-is-the-windows-bt-folder-on-my-hard-drive/ Manage Windows 10 Notification + Upgrade options [DisableOSUpgrade]: http://support.microsoft.com/help/3080351/ Disable Windows 8.1 store upgrade offer prompt: http://www.winaero.com/blog/disable-windows-8-1-store-upgrade-offer-prompt/ Disable Get Windows 10 icon in notification area (tray): http://www.superuser.com/questions/922068/ Block specific Windows update hotfix: http://www.serverfault.com/questions/145843/ Disable KB3035583 "Get Windows 10" (GWX) update + spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" tasks: http://support.microsoft.com/help/3080351/ Block Windows Spying: http://blockwindows.wordpress.com/ BlockWindows: http://github.com/WindowsLies/BlockWindows/ Stop Windows 10 upgrade notification in Windows 7: http://answers.microsoft.com/en-us/windows/forum/windows_10-win_upgrade/stop-windows-10-upgrade-notification-on-windows-7/adda31a7-ebbe-44b7-bcb4-f3da1563688c/ How to clean Windows 10 crapware off your Windows 7 or 8.1 PC: http://www.infoworld.com/article/2983777/ Windows 10 tools to block automatic updates: http://www.ghacks.net/2015/12/18/two-windows-10-tools-to-block-automatic-updates/ Uninstall and Block Updates and Drivers in Windows 10: http://www.howtogeek.com/223864/ Temporarily prevent Windows or Driver Update from reinstalling in Windows 10: http://support.microsoft.com/help/3073930/ File: http://download.microsoft.com/download/F/2/2/F22D5FDB-59CD-4275-8C95-1BE17BF70B21/wushowhide.diagcab Win Updates Disabler (freeware): http://www.site2unblock.com/win-updates-disabler/ File: http://www.site2unblock.com/download/win-updates-disabler-setup.exe Portable: http://www.site2unblock.com/download/win-updates-disabler-portable.zip Open E10BLOK.CMD (included) in Notepad for details: http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT ______________________________________________________________________________ Windows 7/8/8.1: Uninstall Forced Windows 10 Upgrade/Updates ************************************************************ * Uninstall KB3035583 "Get Windows 10" (GWX) Update Guide: http://www.winsupersite.com/windows-10/how-stop-windows-10-upgrade-downloading-your-system Uninstall KB3035583 and Hide from Windows Updates in BAT file: http://www.reddit.com/r/windows/comments/38ivhp/ Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1: http://support.microsoft.com/help/3035583/ Update for customer experience and diagnostic telemetry: http://support.microsoft.com/help/3068708/ Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7: http://support.microsoft.com/help/3075249/ Update for customer experience and diagnostic telemetry: http://support.microsoft.com/help/3080149/ Open E10BLOK.CMD (included) in Notepad for details: http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT * Remove Windows 10 Upgrade updates from Windows 7/8/8.1: http://www.ghacks.net/2015/04/17/how-to-remove-windows-10-upgrade-updates-in-windows-7-and-8/ http://support.4it.com.au/article/disable-get-windows-10-notifications-from-the-command-prompt/ Prevent Windows 10 Upgrade from Installing: http://www.winsupersite.com/windows-10/prevent-windows-10-upgrade-installing-after-making-your-reservation Block Specific Updates in Windows Update: http://www.ghacks.net/2010/08/11/how-to-block-specific-updates-in-windows-update/ Remove Windows 10 GWX Upgrade nonsense: http://www.dedoimedo.com/computers/windows-7-to-10-gwx-how-to-remove.html Block specific Windows update hotfix: http://www.serverfault.com/a/341318/ ______________________________________________________________________________ Uninstall Windows 7/8/8.1/2012/10/2016/2019 Spyware *************************************************** Uninstall spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers": KB3022345, KB3068708, KB3075249 + KB3080149: Update for customer experience and diagnostic telemetry: http://support.microsoft.com/help/3022345/ Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1: http://support.microsoft.com/help/3035583/ Update for customer experience and diagnostic telemetry: Update that adds telemetry points to consent.exe in Windows 8.1 and Windows 7: http://support.microsoft.com/help/3075249/ Update for customer experience and diagnostic telemetry: http://support.microsoft.com/help/3080149/ Open E10BLOK.CMD (included) in Notepad for details: http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT ______________________________________________________________________________ Windows 10 Blocked Games ************************ Windows 10 Won't Run CD-ROM/DVD-ROM Games Using SafeDisc Or Securom DRM: http://www.rockpapershotgun.com/2015/08/17/windows-10-safedisc-securom-drm/ http://gadgets.ndtv.com/games/news/windows-10-will-not-run-older-pc-games-with-drm-729304 http://www.pcworld.com/article/2972271/ http://www.ign.com/articles/2015/08/19/windows-10-wont-run-games-with-safedisk-securom-drm Windows 10 Games Compatibility List: http://answers.microsoft.com/en-us/insider/forum/insider_wintp-insider_install/windows-10-games-compatibility-list/a31335a8-730f-4ac9-8c19-7c8c3a664ced ______________________________________________________________________________ Hiden Disk Partition ******************** Fix: Windows 10 1803 creates an extra Disk Partition: http://www.thewindowsclub.com/windows-10-creates-extra-disk-partition-fixed/ ______________________________________________________________________________ Group Policy Editor (GPE) ************************* MDGx Group Policy Editor (GPE) fixes + tools (free): http://www.mdgx.com/xptoy.htm#GPO MDGx gpedit.msc Guide: http://www.mdgx.com/reg.htm#ADM ****************************************************************************** * Enable Group Policy Editor (gpedit.msc) in Windows 10 Home Edition: http://www.majorgeeks.com/content/page/enable_group_policy_editor_in_windows_10_home_edition.html http://www.itechtics.com/enable-gpedit-windows-10-home/ Add Group Policy Editor to Windows 10 Home with PowerShell batch file: http://www.majorgeeks.com/files/details/add_gpedit_msc_with_powershell.html http://www.itechtics.com/easily-enable-group-policy-editor-gpedit-msc-in-windows-10-home-edition/ Group Policy Editor for Windows 10 Home Edition: http://www.majorgeeks.com/files/details/group_policy_editor_for_windows_10_home_edition.html Group Policy Editor Enabler for Windows 10 Home Edition: http://www.majorgeeks.com/files/details/group_policy_editor_in_windows_10_home_edition_enabler.html Policy Plus: Group Policy Editor (GPEdit) Alternative for Windows 7/8/8.1/10: http://github.com/Fleex255/PolicyPlus/ Direct download [364 KB]: http://github.com/Fleex255/PolicyPlus/releases/latest/ Requires Microsoft .Net Framework Redistributable (NFR) 4.5/newer: http://www.mdgx.com/add.htm#NFR Policy Plus Guide: http://www.itechtics.com/best-group-policy-editor-gpedit-msc-alternative-for-windows/ http://www.majorgeeks.com/files/details/policy_plus.html Right-click "PolicyPlus.exe" -> Run as Administrator -> Help -> Acquire Policy Definitions (ADMX + ADML files) -> Begin button -> Wait for download + install to complete... -> OK/Yes button. Newest Windows 2008/7/8/8.1/2012/10/2016/2019/11/2022 Policy Definitions (ADMX + ADML files) used by Group Policy Editor (GPEdit) + Policy Plus: http://www.microsoft.com/download/103124/ File [13 MB]: http://download.microsoft.com/download/5/e/7/5e7224e8-919c-4799-8ea3-c69b32d70832/Administrative%20Templates%20(.admx)%20for%20Windows%2010%20May%202021%20Update.msi Group Policy Administrative Templates: http://docs.microsoft.com/troubleshoot/windows-client/group-policy/create-and-manage-central-store/ Install or Update Group Policy Administrative Templates (ADMX): http://www.thewindowsclub.com/install-or-update-group-policy-administrative-templates-admx/ Enable Local Security Policy (secpol.msc) in Windows 10 Home: http://www.majorgeeks.com/content/page/how_to_enable_local_security_policy_in_windows_10_home.html ****************************************************************************** * Microsoft Windows XP SP1/XP SP1a/XP SP2/2003 Group Policy Management Console (GPMC) v1.0.2 32-bit tool (English): http://msdn.microsoft.com/library/aa814316.aspx GPMC.EXE [5.55 MB, right-click to save!]: http://download.microsoft.com/download/a/d/b/adb5177d-01a7-4f04-bfcc-cb7cea8b5bb7/gpmc.msi More info: http://www.microsoft.com/download/details.aspx?id=21895 Windows XP SP1/XP SP1a require GPEDIT.DLL Hotfix already installed: http://support.microsoft.com/help/326469/ Windows XP Pre-SP2 requires Microsoft .Net Framework Redistributable (NFR) (free): http://www.mdgx.com/add.htm#NFR Microsoft Windows 2000/XP/2003 Group Policy Object (GPO) 32-bit tool: http://technet.microsoft.com/library/cc784165.aspx GPOTOOL.EXE [77 KB]: http://web.archive.org/web/20120528223141/http://download.microsoft.com/download/win2000platform/Tool/Q314147/NT5XP/EN-US/GPOTool.EXE Group Policy in Windows 2003 DOCument [660 KB, right-click to save!]: http://web.archive.org/web/20120601160027/http://download.microsoft.com/download/0/0/4/0044470e-5f3a-4569-9255-91f932e4da3b/gpintro.doc Microsoft Windows 2000/XP/2003/Vista/2008/7/8/8.1/2012/10/2016/2019/11/2022 Group Policy Settings [Excel XLS format, right-click to save!]: http://www.microsoft.com/download/details.aspx?id=25250 Microsoft Windows Vista/2008/7/8/8.1/2012 Planning and Deploying Group Policy DOCument: http://www.microsoft.com/download/details.aspx?id=22478 GP Plan Deploy DOC [1 MB, DOC format, right-click to save!]: http://web.archive.org/web/20150602062335/http://download.microsoft.com/download/f/3/8/f3847f2c-5a90-449b-9fd1-0464e3ab3187/GP_Plan_Deploy.doc Microsoft Windows 2003 Group Policy Infrastructure DOCument: http://www.microsoft.com/download/details.aspx?id=14392 GP Infrastructure DOC [1 MB, DOC format, right-click to save!]: http://web.archive.org/web/20131124191505/http://download.microsoft.com/download/e/1/0/e1081217-de3d-4e2e-8663-13d59d06cbbd/gpinfra.doc MS TechNet: Windows Server: Group Policy: http://technet.microsoft.com/windowsserver/bb310732.aspx MS TechNet: Group Policy Collection: http://technet.microsoft.com/library/cc779838.aspx MSDN: Step-by-Step Guide to Understanding Group Policy: http://msdn.microsoft.com/library/bb742376.aspx Windows 7: Group Policy management for IT pros: http://windows.microsoft.com/en-us/windows7/group-policy-management-for-it-pros/ MSKB: How to use Group Policy to remotely install software in Windows 2003 + 2008: http://support.microsoft.com/help/816102/ Wikipedia: Group Policy: http://en.wikipedia.org/wiki/Group_Policy MDGx gpedit.msc Guide: http://www.mdgx.com/reg.htm#ADM Group Policy Search (GPS): http://gpsearch.azurewebsites.net/ FYI: Microsoft removed Group Policy Editor (GPE) [respectively GPEdit.DLL + gpedit.msc] from all Basic, Home and Starter Editions of Windows XP/Vista/7/8/8.1/10/11! Restore GPE on all Windows NTx Editions: http://www.askvg.com/how-to-enable-group-policy-editor-gpedit-msc-in-windows-7-home-premium-home-basic-and-starter-editions/ Add Group Policy Editor to Windows 10 Home PowerShell batch file: http://www.majorgeeks.com/files/details/add_gpedit_msc_with_powershell.html Enable Group Policy Editor (gpedit.msc) in Windows 10/11 Home Edition: http://www.majorgeeks.com/content/page/enable_group_policy_editor_in_windows_10_home_edition.html Install Group Policy Editor (GPEdit.DLL + gpedit.msc) on Windows 7/8/8.1/10: http://www.rushinformation.com/windows-find-gpedit-msc-error-windows-78-fixed/ More info: http://www.deviantart.com/drudger/art/Add-GPEDIT-msc-215792914/ GPEdit Enabler BATch file for Windows 10 Home: http://www.itechtics.com/enable-gpedit-windows-10-home/ Direct download [379 B]: http://www.itechtics.com/wp-content/uploads/downloads/gpedit-enabler.bat Policy Plus: Group Policy Editor (GPEdit) Alternative for Windows 7/8/8.1/10: http://github.com/Fleex255/PolicyPlus/ Direct download [360 KB]: http://github.com/Fleex255/PolicyPlus/releases/latest/ Requires Microsoft .Net Framework Redistributable (NFR) 4.5/newer: http://www.mdgx.com/add.htm#NFR Policy Plus Guide: http://www.itechtics.com/best-group-policy-editor-gpedit-msc-alternative-for-windows/ http://www.majorgeeks.com/files/details/policy_plus.html Right-click "PolicyPlus.exe" -> Run as Administrator -> Help -> Acquire ADMX files -> Begin button -> Wait for download + install to complete... -> OK/Yes button. Newest Windows 2008/7/8/8.1/2012/10/2016/2019/11/2022 Policy Definitions (ADMX + ADML files) used by Group Policy Editor (GPEdit) + Policy Plus: http://www.microsoft.com/download/103124/ File [13 MB]: http://download.microsoft.com/download/5/e/7/5e7224e8-919c-4799-8ea3-c69b32d70832/Administrative%20Templates%20(.admx)%20for%20Windows%2010%20May%202021%20Update.msi Group Policy Administrative Templates: http://docs.microsoft.com/troubleshoot/windows-client/group-policy/create-and-manage-central-store/ Install or Update Group Policy Administrative Templates (ADMX): http://www.thewindowsclub.com/install-or-update-group-policy-administrative-templates-admx/ FIX: GPEDIT.MSC snap-in creation failed/failed to initialize: http://www.rushinformation.com/gpedit-msc-snap-in-creation-failed-initialize-error/ GPE files for Windows XP Home: http://bogdan.org.ua/2007/11/15/windows-xp-he-home-edition-gpedit-msc-group-policy-editing-via-registry.html Direct download [845 KB]: http://bogdan.org.ua/wp-content/uploads/2007/11/gpedit-for-windows-xp-home.zip GPE registry entries for Windows XP Home: http://web.archive.org/web/20160324222902/http://www.j79zlr.com/gphome.php ______________________________________________________________________________ DNS Cache ********* http://www.mdgx.com/hosts.php#N2 Optional: DNS Client Service caches Domain Name System names (DNS Cache) which slows down processing of large HOSTS [hosts] files with many IPs: Disable Client-Side DNS Caching in Windows XP/2003: http://support.microsoft.com/help/318803/ Flush Windows DNS Cache: http://www.thewindowsclub.com/flush-windows-dns-cache/ Stop/Start DNS Client service: http://www.computerstepbystep.com/dns_client_service.html MDGx HOSTS Guide: DNS Client Service: http://www.mdgx.com/hosts.php#N2 Open STARTDNS.CMD + STOP!DNS.CMD (both included) in Notepad for details: http://www.mdgx.com/10BLK/STARTDNS.CMD.TXT http://www.mdgx.com/10BLK/STOP!DNS.CMD.TXT ______________________________________________________________________________ TURN OFF Windows Update (WU) **************************** Optional: * MDGx WINDOWS8.TXT: http://www.mdgx.com/8.php http://www.mdgx.com/WINDOWS8.TXT -> "Tweaks + Fixes" -> * Turn OFF Windows Updates (WU) + related Registry settings in Windows 7/8/8.1: http://support.microsoft.com/help/328010/ http://github.com/vFense/vFenseAgent-win/wiki/Registry-keys-for-configuring-Automatic-Updates-&-WSUS http://www.smallvoid.com/article/winnt-automatic-updates-config.html TIP: Use Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT to create a plain text Registry file containing the lines between Cut & Paste delimiters below -> save it as plain text/ASCII file (Encode: -> ANSI) with the REG extension (.reg) -> right-click it -> Run as Administrator -> answer Yes/OK to all prompts to register its information into your Registry. -----Begin cut & paste here----- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate] "DisableWindowsUpdateAccess"=dword:1 "ElevateNonAdmins"=dword:1 "DisableOSUpgrade"=dword:1 "WUServer"="0.0.0.0" "WUStatusServer"="0.0.0.0" [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU] "AutoInstallMinorUpdates"=dword:0 "NoAutoUpdate"=dword:1 "NoAutoRebootWithLoggedOnUsers"=dword:1 "NoAUAsDefaultShutdownOption"=dword:1 "RebootRelaunchTimeout"=dword:3 "RebootRelaunchTimeoutEnabled"=dword:1 "UseWUServer"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate] "DisableWindowsUpdateAccess"=dword:1 "ElevateNonAdmins"=dword:1 "DisableOSUpgrade"=dword:1 "WUServer"="0.0.0.0" "WUStatusServer"="0.0.0.0" [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate\AU] "AutoInstallMinorUpdates"=dword:0 "NoAutoUpdate"=dword:1 "NoAutoRebootWithLoggedOnUsers"=dword:1 "NoAUAsDefaultShutdownOption"=dword:1 "RebootRelaunchTimeout"=dword:3 "RebootRelaunchTimeoutEnabled"=dword:1 "UseWUServer"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update] "NextSqmReportTime"="0" "NextFeaturedUpdatesNotificationTime"="0" "EnableFeaturedSoftware"=dword:0 "FeaturedUpdatesNotificationSeqNum"=dword:0 "FeaturedUpdatesNotificationSeqNumGenTime"="0" "SetupWizardLaunchTime"="0" "ForcedReboot"=dword:0 "AUOptions"=dword:1 "ConfigVer"=dword:1 "BalloonTime"="0" "ScheduledInstallDay"=dword:0 "ScheduledInstallTime"=dword:0 "IncludeRecommendedUpdates"=dword:0 "NextDetectionTime"="0" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoWindowsUpdate"=dword:1 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoWindowsUpdate"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade] "AllowOSUpgrade"=dword:0 "ReservationsAllowed"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State] "OSUpgradeState"=dword:1 "OSUpgradeStateTimeStamp"="2015-05-05 05:05:05" [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main] "EnableAutoUpgrade"=dword:0 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Media Player] "DisableAutoUpdate"=dword:1 [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions] "NoUpdateCheck"=dword:1 ; ------End cut & paste here------ * Disable Windows Update (WU): Disable Automatic (Forced) Windows Update (WUA) [NoAutoUpdate]: http://www.pctools.com/guides/registry/detail/1176/ Configure Automatic Updates [AutoInstallMinorUpdates]: http://technet.microsoft.com/library/cc708449.aspx Automatic Updates Settings [NoAutoRebootWithLoggedOnUsers]: http://technet.microsoft.com/library/dd939923.aspx Automatic Updates using Registry Editor [NoWindowsUpdate]: http://technet.microsoft.com/library/dd939844.aspx Windows Update Client (WUC) + Windows Update Agent (WUA): http://www.mdgx.com/xptoy.htm#WUC Open E10BLOK.CMD (included) in Notepad for details: http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT ______________________________________________________________________________ Uninstall Cortana + OneDrive/SkyDrive ************************************* Optional: Uninstall Cortana from Windows 10 (by using install_wim_tweak.exe): http://www.winaero.com/blog/how-to-uninstall-and-remove-cortana-in-windows-10/ File: http://www.winaero.com/request.php?1832 Completely disable Cortana in Windows 10: http://www.superuser.com/questions/949569/ Uninstall/Reinstall Windows 10 Built-in Apps: http://www.howtogeek.com/224798/ Remove default apps from Windows 10: http://www.reddit.com/r/windows/comments/3f6gsl/ Killing Cortana: Disable Windows 10 info-hungry digital assistant: http://www.pcworld.com/article/2949759/ Uninstall OneDrive: http://web.archive.org/web/20190420050553/http://gist.github.com/CHEF-KOCH/ca8fbf6bb7f6fa7bab06/ Open E10BLOK.CMD (included) in Notepad for details: http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT ______________________________________________________________________________ Restore Windows Help (WinHlp32) Functionality ********************************************* WinHlp32 for Windows 10: http://raxsoft.com/raxccm/software_app.php?progid=13 Direct download [735 KB, freeware]: http://assets.raxsoft.com/bin/winhlp32/winhlp32.msi Windows Help + HTML Help: http://www.mdgx.com/add.htm#HHU ______________________________________________________________________________ HOSTS ***** http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT http://www.mdgx.com/10BLK/10_BLOCK.ZIP http://www.mdgx.com/hosts.php Copy & paste these 0.0.0.0 (redirected to null) IP addresses to your HOSTS [hosts] (plain text/ASCII ANSI encoded file) located in: %windir%\SYSTEM32\DRIVERS\ETC\HOSTS [where %windir% = usually C:\WINDOWS]. Source: http://www.pastebin.com/gebp8edd Edit HOSTS file in Windows 7/8/8.1/2012/10/2016/2019/11/2022: http://www.petri.com/easily-edit-hosts-file-windows-10/ http://www.petri.com/edit-hosts-file-windows-8/ http://www.petri.com/edit-hosts-file-windows-7/ Take Ownership of files + folders right-click Explorer option: http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/ MDGx Tweaked + Customized File Manager (FM) installs a better Take Ownership tool (FixNT6) to the right-click Explorer menus: http://www.mdgx.com/xptoy.htm#FMNT FM ReadMe Guide: http://www.mdgx.com/fmnt32/fmnt32.php FM [2.2 MB, free]: http://www.mdgx.com/fmnt32/FMNT32.EXE FixNT6 Take Ownership tool (freeware): http://www.jsware.net/jsware/nt6fix.php5#restfix FixNT6 [36 KB, freeware]: http://www.jsware.net/jsware/zips/fix6r.zip Open E10BLOK.CMD (included) in Notepad for details: http://www.mdgx.com/10BLK/E10BLOK.CMD.TXT If 0.0.0.0 HOSTS redirects do not work properly on your computer(s), you can substitute all null [0.0.0.0] text strings below with default localhost: 127.0.0.1 Open HOSTS file (as Administrator) in Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT -> right-click your HOSTS file [%windir%\SYSTEM32\DRIVERS\ETC\HOSTS where %windir% is usually C:\WINDOWS] -> Properties -> Security tab -> Edit... -> click Administrators (Your User Name/Administrator) -> check Full control box -> OK -> OK -> right-click your HOSTS file -> Run as Administrator -> Edit -> Replace [Ctrl+H] -> Find what: 0.0.0.0 -> Replace with: 127.0.0.1 Replace all instances -> Save HOSTS file -> refresh/restart your app(s)/browser(s)/service(s) or reboot your computer(s). BONUS: List below contains most all known Microsoft controlled/owned servers one may wish to block/disable, but some will deactivate Windows Update (WU) and/or some will block/disable other Microsoft programs/features/services/etc you may need or care about. CAUTION: View your specific programs/features/services/etc documentation/guidelines to learn how to allow/enable/use them properly. NOTE: You can always disable or delete completely (already disabled) servers you wish to access: To (re)enable/edit/customize -> open HOSTS file (as Administrator) in Notepad/similar/better free(ware) plain text/ASCII editor/viewer http://www.mdgx.com/toy.htm#TXT -> comment/remark (precede with # followed by 1 space) or delete desired line(s) below -> save your HOSTS file -> refresh/restart your app(s)/browser(s)/service(s) or reboot your computer(s). Recommended HOSTS lines: -----Begin cut & paste here----- ############################################################################## # MDGx HOSTS Guide: # http://www.mdgx.com/hosts.php # HOSTS (plain text/ASCII ANSI encoded file) is located in %windir% [usually C:\WINDOWS] in Windows 9x or # %windir%\SYSTEM32\DRIVERS\ETC in Windows NTx. # Transmission Control Protocol/Internet Protocol (TCP/IP) maps Internet Protocol (IP) addresses (1st column) to # corresponding hostnames (2nd column): # http://en.wikipedia.org/wiki/Hosts_%28file%29 # Each entry must be on its own separate line. Columns must be separated by at least 1 space or tab. # All lines starting with a pound/hash sign (#) are comments/remarks and are not processed. # Domain Name System (DNS) itself handles localhost name resolution: # http://en.wikipedia.org/wiki/Localhost # All local host(s) lines must be listed at the top of the HOSTS file in this exact order: # http://en.wikipedia.org/wiki/Multicast_address # 1. Internet Protocol version 4 (IPv4). # http://en.wikipedia.org/wiki/IPv4 # 2. Internet Protocol version 6 (IPv6). # http://en.wikipedia.org/wiki/IPv6 # Lines below map IPv4 local protocols: # http://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv4 0.0.0.0 null 127.0.0.1 local localhost.localdomain localdomain localhost 255.255.255.255 broadcasthost # Lines below map IPv6 local protocols: # http://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv6 ::0 null ::1 hosta localhost fe80::1 localhost fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts # WARNING: # Some of the disabled sites in this file will attempt to send your personal/private data/information to Microsoft # controlled/owned servers and/or spy on your computer(s)/device(s) the moment you ENABLE and ACCESS them! # http://www.mdgx.com/hosts.php#AB # IPv4 hostnames below are disabled -> redirected to 0.0.0.0 (null). # http://en.wikipedia.org/wiki/0.0.0.0 # Alternatively can be redirected to 127.0.0.1 (localhost), but will take longer to process with large number of # HOSTS entries. # http://en.wikipedia.org/wiki/Hostname # To (re)enable/disable/edit/customize -> open HOSTS file as Administrator in Notepad/similar/better free(ware) # plain text/ASCII editor # http://www.mdgx.com/toy.htm#TXT # -> comment/remark (precede each line with # followed by 1 space) or delete desired line(s) -> save it as HOSTS # (no extension) -> refresh (F5)/restart your app(s)/browser(s)/service(s)/device(s) or reboot/restart if needed. ############################################################################## # Lines below recommended to disable Microsoft controlled/owned servers (examples): windows updates (WU), forced upgrades, # ad(vertisment)s, promotions, "experience", "offers", "suggestions", collect, diagnostic, live, login, logging, spyware, # telemetry, "phone home", (geo)location, tracking: 0.0.0.0 00001b-1.l.windowsupdate.com 0.0.0.0 000043-1.l.windowsupdate.com 0.0.0.0 000061-1.l.windowsupdate.com 0.0.0.0 0000a3-1.l.windowsupdate.com 0.0.0.0 0000f2-1.l.windowsupdate.com 0.0.0.0 0000f9-1.l.windowsupdate.com 0.0.0.0 0000fe-1.l.windowsupdate.com 0.0.0.0 00015e-1.l.windowsupdate.com 0.0.0.0 0001a5-1.l.windowsupdate.com 0.0.0.0 0001bc-1.l.windowsupdate.com 0.0.0.0 0001d4-1.l.windowsupdate.com 0.0.0.0 0001ed-1.l.windowsupdate.com 0.0.0.0 000202-1.l.windowsupdate.com 0.0.0.0 000238-1.l.windowsupdate.com 0.0.0.0 000263-1.l.windowsupdate.com 0.0.0.0 00028e-1.l.windowsupdate.com 0.0.0.0 00028f-1.l.windowsupdate.com 0.0.0.0 0002ae-1.l.windowsupdate.com 0.0.0.0 0002c3-1.l.windowsupdate.com 0.0.0.0 0002fd-1.l.windowsupdate.com 0.0.0.0 000371-1.l.windowsupdate.com 0.0.0.0 000396-1.l.windowsupdate.com 0.0.0.0 0003fc-1.l.windowsupdate.com 0.0.0.0 000410-1.l.windowsupdate.com 0.0.0.0 000418-1.l.windowsupdate.com 0.0.0.0 000452-1.l.windowsupdate.com 0.0.0.0 000464-1.l.windowsupdate.com 0.0.0.0 000498-1.l.windowsupdate.com 0.0.0.0 0004ad-1.l.windowsupdate.com 0.0.0.0 0004ee-1.l.windowsupdate.com 0.0.0.0 0004f1-1.l.windowsupdate.com 0.0.0.0 000502-1.l.windowsupdate.com 0.0.0.0 00054d-1.l.windowsupdate.com 0.0.0.0 000589-1.l.windowsupdate.com 0.0.0.0 000646-1.l.windowsupdate.com 0.0.0.0 0006df-1.l.windowsupdate.com 0.0.0.0 0007be-1.l.windowsupdate.com 0.0.0.0 0007e4-1.l.windowsupdate.com 0.0.0.0 00081a-1.l.windowsupdate.com 0.0.0.0 0008f7-1.l.windowsupdate.com 0.0.0.0 000968-1.l.windowsupdate.com 0.0.0.0 000989-1.l.windowsupdate.com 0.0.0.0 0009a5-1.l.windowsupdate.com 0.0.0.0 0009b8-1.l.windowsupdate.com 0.0.0.0 0009fe-1.l.windowsupdate.com 0.0.0.0 000a55-1.l.windowsupdate.com 0.0.0.0 000a56-1.l.windowsupdate.com 0.0.0.0 000a60-1.l.windowsupdate.com 0.0.0.0 000afa-1.l.windowsupdate.com 0.0.0.0 000b25-1.l.windowsupdate.com 0.0.0.0 000b3d-1.l.windowsupdate.com 0.0.0.0 000b62-1.l.windowsupdate.com 0.0.0.0 000b78-1.l.windowsupdate.com 0.0.0.0 000bc0-1.l.windowsupdate.com 0.0.0.0 000bcf-1.l.windowsupdate.com 0.0.0.0 000bdf-1.l.windowsupdate.com 0.0.0.0 000be0-1.l.windowsupdate.com 0.0.0.0 000c0c-1.l.windowsupdate.com 0.0.0.0 000c19-1.l.windowsupdate.com 0.0.0.0 000c27-1.l.windowsupdate.com 0.0.0.0 000c33-1.l.windowsupdate.com 0.0.0.0 000cb0-1.l.windowsupdate.com 0.0.0.0 000cca-1.l.windowsupdate.com 0.0.0.0 000d29-1.l.windowsupdate.com 0.0.0.0 000d40-1.l.windowsupdate.com 0.0.0.0 000d6d-1.l.windowsupdate.com 0.0.0.0 000e78-1.l.windowsupdate.com 0.0.0.0 000efd-1.l.windowsupdate.com 0.0.0.0 000f40-1.l.windowsupdate.com 0.0.0.0 001007-1.l.windowsupdate.com 0.0.0.0 001056-1.l.windowsupdate.com 0.0.0.0 001089-1.l.windowsupdate.com 0.0.0.0 0010bb-1.l.windowsupdate.com 0.0.0.0 0010da-1.l.windowsupdate.com 0.0.0.0 0010e3-1.l.windowsupdate.com 0.0.0.0 00111c-1.l.windowsupdate.com 0.0.0.0 001173-1.l.windowsupdate.com 0.0.0.0 0011da-1.l.windowsupdate.com 0.0.0.0 0011f3-1.l.windowsupdate.com 0.0.0.0 001233-1.l.windowsupdate.com 0.0.0.0 00123a-1.l.windowsupdate.com 0.0.0.0 001390-1.l.windowsupdate.com 0.0.0.0 001402-1.l.windowsupdate.com 0.0.0.0 00149f-1.l.windowsupdate.com 0.0.0.0 0016c3-1.l.windowsupdate.com 0.0.0.0 0017b1-1.l.windowsupdate.com 0.0.0.0 0017c5-1.l.windowsupdate.com 0.0.0.0 0017f1-1.l.windowsupdate.com 0.0.0.0 00184b-1.l.windowsupdate.com 0.0.0.0 00185d-1.l.windowsupdate.com 0.0.0.0 001891-1.l.windowsupdate.com 0.0.0.0 0018c4-1.l.windowsupdate.com 0.0.0.0 001949-1.l.windowsupdate.com 0.0.0.0 00196e-1.l.windowsupdate.com 0.0.0.0 00198e-1.l.windowsupdate.com 0.0.0.0 0019a2-1.l.windowsupdate.com 0.0.0.0 0019d8-1.l.windowsupdate.com 0.0.0.0 001a1f-1.l.windowsupdate.com 0.0.0.0 001a27-1.l.windowsupdate.com 0.0.0.0 001a32-1.l.windowsupdate.com 0.0.0.0 001a43-1.l.windowsupdate.com 0.0.0.0 001a83-1.l.windowsupdate.com 0.0.0.0 001a92-1.l.windowsupdate.com 0.0.0.0 001bb5-1.l.windowsupdate.com 0.0.0.0 001c02-1.l.windowsupdate.com 0.0.0.0 001cdc-1.l.windowsupdate.com 0.0.0.0 001d09-1.l.windowsupdate.com 0.0.0.0 001d1f-1.l.windowsupdate.com 0.0.0.0 001d49-1.l.windowsupdate.com 0.0.0.0 001d7a-1.l.windowsupdate.com 0.0.0.0 001dc2-1.l.windowsupdate.com 0.0.0.0 001e03-1.l.windowsupdate.com 0.0.0.0 001e05-1.l.windowsupdate.com 0.0.0.0 001e0c-1.l.windowsupdate.com 0.0.0.0 001e0f-1.l.windowsupdate.com 0.0.0.0 001e27-1.l.windowsupdate.com 0.0.0.0 001e4b-1.l.windowsupdate.com 0.0.0.0 001e8d-1.l.windowsupdate.com 0.0.0.0 001e9c-1.l.windowsupdate.com 0.0.0.0 001ec3-1.l.windowsupdate.com 0.0.0.0 001f23-1.l.windowsupdate.com 0.0.0.0 001f4f-1.l.windowsupdate.com 0.0.0.0 001f7f-1.l.windowsupdate.com 0.0.0.0 001fbb-1.l.windowsupdate.com 0.0.0.0 002012-1.l.windowsupdate.com 0.0.0.0 002062-1.l.windowsupdate.com 0.0.0.0 0020a7-1.l.windowsupdate.com 0.0.0.0 002108-1.l.windowsupdate.com 0.0.0.0 00210c-1.l.windowsupdate.com 0.0.0.0 00210e-1.l.windowsupdate.com 0.0.0.0 002182-1.l.windowsupdate.com 0.0.0.0 0021a0-1.l.windowsupdate.com 0.0.0.0 0021d0-1.l.windowsupdate.com 0.0.0.0 0021ff-1.l.windowsupdate.com 0.0.0.0 00227f-1.l.windowsupdate.com 0.0.0.0 0022a7-1.l.windowsupdate.com 0.0.0.0 0022c1-1.l.windowsupdate.com 0.0.0.0 0022db-1.l.windowsupdate.com 0.0.0.0 0022e6-1.l.windowsupdate.com 0.0.0.0 0022eb-1.l.windowsupdate.com 0.0.0.0 00235c-1.l.windowsupdate.com 0.0.0.0 002384-1.l.windowsupdate.com 0.0.0.0 00238e-1.l.windowsupdate.com 0.0.0.0 002394-1.l.windowsupdate.com 0.0.0.0 0023c5-1.l.windowsupdate.com 0.0.0.0 0023df-1.l.windowsupdate.com 0.0.0.0 00249b-1.l.windowsupdate.com 0.0.0.0 002518-1.l.windowsupdate.com 0.0.0.0 002557-1.l.windowsupdate.com 0.0.0.0 002562-1.l.windowsupdate.com 0.0.0.0 0025be-1.l.windowsupdate.com 0.0.0.0 0025ea-1.l.windowsupdate.com 0.0.0.0 0025f2-1.l.windowsupdate.com 0.0.0.0 00268c-1.l.windowsupdate.com 0.0.0.0 0026a1-1.l.windowsupdate.com 0.0.0.0 0026bc-1.l.windowsupdate.com 0.0.0.0 3d-ssl-secure-verification-paypal-1285d.azurewebsites.net 0.0.0.0 73307cf78bfb.microsoft.com 0.0.0.0 a-0001.a-msedge.net 0.0.0.0 a-0001.dc-msedge.net 0.0.0.0 a-0002.a-msedge.net 0.0.0.0 a-0003.a-msedge.net 0.0.0.0 a-0003.dc-msedge.net 0.0.0.0 a-0004.a-msedge.net 0.0.0.0 a-0005.a-msedge.net 0.0.0.0 a-0006.a-msedge.net 0.0.0.0 a-0007.a-msedge.net 0.0.0.0 a-0008.a-msedge.net 0.0.0.0 a-0009.a-msedge.net 0.0.0.0 a-0010.a-msedge.net 0.0.0.0 a-0011.a-msedge.net 0.0.0.0 a-0012.a-msedge.net 0.0.0.0 a-msedge.net 0.0.0.0 a.ads1.msn.com 0.0.0.0 a.ads2.msads.net 0.0.0.0 a.ads2.msn.com 0.0.0.0 a.microsoft.com 0.0.0.0 a.rad.msn.com 0.0.0.0 a00000000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com 0.0.0.0 a00000000000000000000000000000000000000000000000000000000000002.ms.a.microsoft.com 0.0.0.0 a00000000000000000000000000000000000000000000000000000000000003.ms.a.microsoft.com 0.0.0.0 a000000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com 0.0.0.0 a00000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com 0.0.0.0 a00000000000000000000000000000000000000000000000000000000001337.ms.a.microsoft.com 0.0.0.0 a0000000000000000000000000000000000000000000000000000000001.ms.a.microsoft.com 0.0.0.0 a0000000000000000000000001.ms.a.microsoft.com 0.0.0.0 a0000000000000000000000002.ms.a.microsoft.com 0.0.0.0 a0000000000000000001.ms.a.microsoft.com 0.0.0.0 a000000000000000003.ms.a.microsoft.com 0.0.0.0 a000001.ms.a.microsoft.com 0.0.0.0 a102.ms.a.microsoft.com 0.0.0.0 a106.ms.a.microsoft.com 0.0.0.0 a107.ms.a.microsoft.com 0.0.0.0 a1112.ms.a.microsoft.com 0.0.0.0 a1122.ms.a.microsoft.com 0.0.0.0 a113.ms.a.microsoft.com 0.0.0.0 a119.ms.a.microsoft.com 0.0.0.0 a120.ms.a.microsoft.com 0.0.0.0 a1205.ms.a.microsoft.com 0.0.0.0 a122.ms.a.microsoft.com 0.0.0.0 a126.ms.a.microsoft.com 0.0.0.0 a128.ms.a.microsoft.com 0.0.0.0 a129.ms.a.microsoft.com 0.0.0.0 a133.ms.a.microsoft.com 0.0.0.0 a137.ms.a.microsoft.com 0.0.0.0 a141.ms.a.microsoft.com 0.0.0.0 a142.ms.a.microsoft.com 0.0.0.0 a145.ms.a.microsoft.com 0.0.0.0 a146.ms.a.microsoft.com 0.0.0.0 a1500.ms.a.microsoft.com 0.0.0.0 a2000.ms.a.microsoft.com 0.0.0.0 a23-218-212-69.deploy.static.akamaitechnologies.com 0.0.0.0 a23.ms.a.microsoft.com 0.0.0.0 a4.ms.a.microsoft.com 0.0.0.0 a592.ms.a.microsoft.com 0.0.0.0 ac3.msn.com 0.0.0.0 access.microsofttemplates.org 0.0.0.0 account.live-int.com 0.0.0.0 account.live.com 0.0.0.0 account.microsoft-int.com 0.0.0.0 account.microsoft.com 0.0.0.0 acctcdn.msauth.net 0.0.0.0 acctcdn.msftauth.net 0.0.0.0 acctcdnmsftuswe2.azureedge.net 0.0.0.0 acctcdnvzeuno.azureedge.net 0.0.0.0 activate.microsoft.com 0.0.0.0 activate.one.microsoft.com 0.0.0.0 activation-v2.sls.microsoft.com 0.0.0.0 activation.sls.microsoft.com 0.0.0.0 activex.microsoft.com 0.0.0.0 activity.windows.com 0.0.0.0 ad.doubleclick.net 0.0.0.0 adcenter.microsoft.com 0.0.0.0 adcenter.msn.com 0.0.0.0 adexpert.msn.com 0.0.0.0 adl.windows.com 0.0.0.0 admin.messaging.microsoft.com 0.0.0.0 admin.training.partner.microsoft.com 0.0.0.0 adnexus.net 0.0.0.0 adnxs.com 0.0.0.0 ads.jp.msn.com 0.0.0.0 ads.msn.com 0.0.0.0 ads1.msads.net 0.0.0.0 ads1.msn.com 0.0.0.0 adsbeta.g.msn.com 0.0.0.0 adsinapps.microsoft.com 0.0.0.0 adsyndication.msn.com 0.0.0.0 advertise.bingads.microsoft.com 0.0.0.0 advertising.bingads.microsoft.com 0.0.0.0 advertising.microsoft.com 0.0.0.0 aer.microsoft.com 0.0.0.0 afkar.microsoft.com 0.0.0.0 aidps.atdmt.com 0.0.0.0 ak.or.download.microsoft.com 0.0.0.0 aka-cdn-ns.adtech.de 0.0.0.0 aka.ms 0.0.0.0 akamdub.fullproduct.download.microsoft.com 0.0.0.0 akampr.fullproduct.download.microsoft.com 0.0.0.0 akamsin.fullproduct.download.microsoft.com 0.0.0.0 alert-security.fail 0.0.0.0 alerts.live.com 0.0.0.0 alerts.microsoft.com 0.0.0.0 alpha.telemetry.microsoft.com 0.0.0.0 alventive.xbox.com 0.0.0.0 am3pap002.storage.live.com 0.0.0.0 americas.winqual.microsoft.com 0.0.0.0 answerdesk.microsoftstore.com 0.0.0.0 anz.partners.extranet.microsoft.com 0.0.0.0 apac1.notify.windows.com.akadns.net 0.0.0.0 api.bing.com 0.0.0.0 api.cortana.ai 0.0.0.0 api.onedrive.com 0.0.0.0 apis.live.net 0.0.0.0 appex-rf.msn.com 0.0.0.0 apps.skype.com 0.0.0.0 arc.msn.com 0.0.0.0 arc.msn.com.nsatc.net 0.0.0.0 arc10.msn.com 0.0.0.0 arc11.msn.com 0.0.0.0 arc2.msn.com 0.0.0.0 arc3.msn.com 0.0.0.0 arc4.msn.com 0.0.0.0 arc5.msn.com 0.0.0.0 arc6.msn.com 0.0.0.0 arc7.msn.com 0.0.0.0 arc8.msn.com 0.0.0.0 arc9.msn.com 0.0.0.0 array101-prod.do.dsp.mp.microsoft.com 0.0.0.0 array102-prod.do.dsp.mp.microsoft.com 0.0.0.0 array103-prod.do.dsp.mp.microsoft.com 0.0.0.0 array104-prod.do.dsp.mp.microsoft.com 0.0.0.0 array201-prod.do.dsp.mp.microsoft.com 0.0.0.0 array202-prod.do.dsp.mp.microsoft.com 0.0.0.0 array203-prod.do.dsp.mp.microsoft.com 0.0.0.0 array204-prod.do.dsp.mp.microsoft.com 0.0.0.0 array401-prod.do.dsp.mp.microsoft.com 0.0.0.0 array402-prod.do.dsp.mp.microsoft.com 0.0.0.0 array403-prod.do.dsp.mp.microsoft.com 0.0.0.0 array404-prod.do.dsp.mp.microsoft.com 0.0.0.0 array405-prod.do.dsp.mp.microsoft.com 0.0.0.0 array406-prod.do.dsp.mp.microsoft.com 0.0.0.0 array407-prod.do.dsp.mp.microsoft.com 0.0.0.0 array408-prod.do.dsp.mp.microsoft.com 0.0.0.0 ars.smartscreen.microsoft.com 0.0.0.0 asimov-win.settings.data.microsoft.com.akadns.net 0.0.0.0 ask.support.microsoft.com 0.0.0.0 assessment.learning.microsoft.com 0.0.0.0 assets.onestore.ms 0.0.0.0 au.download.windowsupdate.com 0.0.0.0 au.v4.download.windowsupdate.com 0.0.0.0 auth.gfx.ms 0.0.0.0 autocomplete.support.microsoft.com 0.0.0.0 autoupdate.microsoft.com 0.0.0.0 autoupdate.windowsmedia.com 0.0.0.0 az361816.vo.msecnd.net 0.0.0.0 az416426.vo.msecnd.net 0.0.0.0 az512334.vo.msecnd.net 0.0.0.0 az725175.vo.msecnd.net 0.0.0.0 azure.com 0.0.0.0 azure.microsoft.com 0.0.0.0 azurewebsites.net 0.0.0.0 b.ads1.msn.com 0.0.0.0 b.ads2.msads.net 0.0.0.0 b.office.microsoft.com 0.0.0.0 b.rad.msn.com 0.0.0.0 backup12.microsoft.com 0.0.0.0 bay01.calendar.live.com 0.0.0.0 bay02.calendar.live.com 0.0.0.0 bay03.calendar.live.com 0.0.0.0 bay04.calendar.live.com 0.0.0.0 beta.update.microsoft.com 0.0.0.0 betaoneservices.com 0.0.0.0 betaplace.msbpn.com 0.0.0.0 betaplace.partners.extranet.microsoft.com 0.0.0.0 betaservices.windowsmedia.com 0.0.0.0 bg.v4.a.dl.ws.microsoft.com 0.0.0.0 bg.v4.emdl.ws.microsoft.com 0.0.0.0 bg1.v4.a.dl.ws.microsoft.com 0.0.0.0 bg1.v4.emdl.ws.microsoft.com 0.0.0.0 bg2.v4.a.dl.ws.microsoft.com 0.0.0.0 bg2.v4.emdl.ws.microsoft.com 0.0.0.0 bg3.v4.a.dl.ws.microsoft.com 0.0.0.0 bg3.v4.emdl.ws.microsoft.com 0.0.0.0 bg4.v4.a.dl.ws.microsoft.com 0.0.0.0 bg4.v4.emdl.ws.microsoft.com 0.0.0.0 bg5.v4.a.dl.ws.microsoft.com 0.0.0.0 bg5.v4.emdl.ws.microsoft.com 0.0.0.0 billing.microsoft.com 0.0.0.0 bingads.microsoft.com 0.0.0.0 bingexplore.azurewebsites.net 0.0.0.0 bingforbusiness.com 0.0.0.0 bl2p.wns.notify.windows.com.akadns.net 0.0.0.0 bl2p.wns.windows.com 0.0.0.0 bl3301-a.1drv.com 0.0.0.0 bl3301-c.1drv.com 0.0.0.0 bl3301-g.1drv.com 0.0.0.0 blob.sn4prdstr03a.store.core.windows.net 0.0.0.0 blob.weather.microsoft.com 0.0.0.0 blugro2gms.groove.microsoft.com 0.0.0.0 bn2b-cor001.api.p001.1drv.com 0.0.0.0 bn2b-cor002.api.p001.1drv.com 0.0.0.0 bn2b-cor003.api.p001.1drv.com 0.0.0.0 bn2b-cor004.api.p001.1drv.com 0.0.0.0 bn2wns1.wns.windows.com 0.0.0.0 bn3p-cor001.api.p001.1drv.com 0.0.0.0 bn3sch020010558.wns.windows.com 0.0.0.0 bn3sch020010560.wns.windows.com 0.0.0.0 bn3sch020010618.wns.windows.com 0.0.0.0 bn3sch020010629.wns.windows.com 0.0.0.0 bn3sch020010631.wns.windows.com 0.0.0.0 bn3sch020010635.wns.windows.com 0.0.0.0 bn3sch020010636.wns.windows.com 0.0.0.0 bn3sch020010650.wns.windows.com 0.0.0.0 bn3sch020011727.wns.windows.com 0.0.0.0 bn3sch020012850.wns.windows.com 0.0.0.0 bn3sch020020322.wns.windows.com 0.0.0.0 bn3sch020020749.wns.windows.com 0.0.0.0 bn3sch020022328.wns.windows.com 0.0.0.0 bn3sch020022335.wns.windows.com 0.0.0.0 bn3sch020022361.wns.windows.com 0.0.0.0 bn4sch101120814.wns.windows.com 0.0.0.0 bn4sch101120818.wns.windows.com 0.0.0.0 bn4sch101120911.wns.windows.com 0.0.0.0 bn4sch101120913.wns.windows.com 0.0.0.0 bn4sch101121019.wns.windows.com 0.0.0.0 bn4sch101121109.wns.windows.com 0.0.0.0 bn4sch101121118.wns.windows.com 0.0.0.0 bn4sch101121223.wns.windows.com 0.0.0.0 bn4sch101121407.wns.windows.com 0.0.0.0 bn4sch101121618.wns.windows.com 0.0.0.0 bn4sch101121704.wns.windows.com 0.0.0.0 bn4sch101121709.wns.windows.com 0.0.0.0 bn4sch101121714.wns.windows.com 0.0.0.0 bn4sch101121908.wns.windows.com 0.0.0.0 bn4sch101122117.wns.windows.com 0.0.0.0 bn4sch101122310.wns.windows.com 0.0.0.0 bn4sch101122312.wns.windows.com 0.0.0.0 bn4sch101122421.wns.windows.com 0.0.0.0 bn4sch101123108.wns.windows.com 0.0.0.0 bn4sch101123110.wns.windows.com 0.0.0.0 bn4sch101123202.wns.windows.com 0.0.0.0 bn4sch102110124.wns.windows.com 0.0.0.0 boardlink.microsoft.com 0.0.0.0 brandtools.partners.extranet.microsoft.com 0.0.0.0 browser.events.data.microsoft.com 0.0.0.0 browser.pipe.aria.microsoft.com 0.0.0.0 browserdefaults.microsoft.com 0.0.0.0 bs.serving-sys.com 0.0.0.0 buy.trymicrosoftoffice.com 0.0.0.0 buynow.one.microsoft.com 0.0.0.0 buyoffice.microsoft.com 0.0.0.0 by3301-a.1drv.com 0.0.0.0 by3301-c.1drv.com 0.0.0.0 by3301-e.1drv.com 0.0.0.0 byfiles.storage.live.com 0.0.0.0 c-0001.dc-msedge.net 0.0.0.0 c.atdmt.com 0.0.0.0 c.microsoft.akadns.net 0.0.0.0 c.microsoft.com 0.0.0.0 c.msn.com 0.0.0.0 c.s-microsoft.com 0.0.0.0 c1.microsoft.com 0.0.0.0 c2.microsoft.com 0.0.0.0 c2r.microsoft.com 0.0.0.0 c2rsetup.officeapps.live.com 0.0.0.0 cache.datamart.windows.com 0.0.0.0 candycrushsoda.king.com 0.0.0.0 capccfv2.partners.extranet.microsoft.com 0.0.0.0 careers.microsoft.com 0.0.0.0 cart.production.store-web.dynamics.com 0.0.0.0 catalog.microsoft.com 0.0.0.0 catalog.update.microsoft.com 0.0.0.0 ccp.microsoft.com 0.0.0.0 cdm.microsoft.com 0.0.0.0 cdn.atdmt.com 0.0.0.0 cdn.ay.gy 0.0.0.0 cdn.content.prod.cms.msn.com 0.0.0.0 cdn.onenote.net 0.0.0.0 cdp1.public-trust.com 0.0.0.0 cds10.stn.llnw.net 0.0.0.0 cds1203.lon.llnw.net 0.0.0.0 cds1204.lon.llnw.net 0.0.0.0 cds1209.lon.llnw.net 0.0.0.0 cds1219.lon.llnw.net 0.0.0.0 cds1228.lon.llnw.net 0.0.0.0 cds1244.lon.llnw.net 0.0.0.0 cds1257.lon.llnw.net 0.0.0.0 cds1265.lon.llnw.net 0.0.0.0 cds1269.lon.llnw.net 0.0.0.0 cds1273.lon.llnw.net 0.0.0.0 cds1285.lon.llnw.net 0.0.0.0 cds1287.lon.llnw.net 0.0.0.0 cds1289.lon.llnw.net 0.0.0.0 cds1293.lon.llnw.net 0.0.0.0 cds1307.lon.llnw.net 0.0.0.0 cds1310.lon.llnw.net 0.0.0.0 cds1325.lon.llnw.net 0.0.0.0 cds1327.lon.llnw.net 0.0.0.0 cds177.dus.llnw.net 0.0.0.0 cds20005.stn.llnw.net 0.0.0.0 cds20404.lcy.llnw.net 0.0.0.0 cds20411.lcy.llnw.net 0.0.0.0 cds20415.lcy.llnw.net 0.0.0.0 cds20416.lcy.llnw.net 0.0.0.0 cds20417.lcy.llnw.net 0.0.0.0 cds20424.lcy.llnw.net 0.0.0.0 cds20425.lcy.llnw.net 0.0.0.0 cds20431.lcy.llnw.net 0.0.0.0 cds20435.lcy.llnw.net 0.0.0.0 cds20440.lcy.llnw.net 0.0.0.0 cds20443.lcy.llnw.net 0.0.0.0 cds20445.lcy.llnw.net 0.0.0.0 cds20450.lcy.llnw.net 0.0.0.0 cds20452.lcy.llnw.net 0.0.0.0 cds20457.lcy.llnw.net 0.0.0.0 cds20461.lcy.llnw.net 0.0.0.0 cds20469.lcy.llnw.net 0.0.0.0 cds20475.lcy.llnw.net 0.0.0.0 cds20482.lcy.llnw.net 0.0.0.0 cds20485.lcy.llnw.net 0.0.0.0 cds20495.lcy.llnw.net 0.0.0.0 cds21205.lon.llnw.net 0.0.0.0 cds21207.lon.llnw.net 0.0.0.0 cds21225.lon.llnw.net 0.0.0.0 cds21229.lon.llnw.net 0.0.0.0 cds21233.lon.llnw.net 0.0.0.0 cds21238.lon.llnw.net 0.0.0.0 cds21244.lon.llnw.net 0.0.0.0 cds21249.lon.llnw.net 0.0.0.0 cds21256.lon.llnw.net 0.0.0.0 cds21257.lon.llnw.net 0.0.0.0 cds21258.lon.llnw.net 0.0.0.0 cds21261.lon.llnw.net 0.0.0.0 cds21267.lon.llnw.net 0.0.0.0 cds21278.lon.llnw.net 0.0.0.0 cds21281.lon.llnw.net 0.0.0.0 cds21293.lon.llnw.net 0.0.0.0 cds21309.lon.llnw.net 0.0.0.0 cds21313.lon.llnw.net 0.0.0.0 cds21321.lon.llnw.net 0.0.0.0 cds26.ams9.msecn.net 0.0.0.0 cds299.lcy.llnw.net 0.0.0.0 cds30027.stn.llnw.net 0.0.0.0 cds308.lcy.llnw.net 0.0.0.0 cds310.lcy.llnw.net 0.0.0.0 cds38.ory.llnw.net 0.0.0.0 cds405.lcy.llnw.net 0.0.0.0 cds406.lcy.llnw.net 0.0.0.0 cds407.fra.llnw.net 0.0.0.0 cds416.lcy.llnw.net 0.0.0.0 cds421.lcy.llnw.net 0.0.0.0 cds422.lcy.llnw.net 0.0.0.0 cds425.lcy.llnw.net 0.0.0.0 cds426.lcy.llnw.net 0.0.0.0 cds447.lcy.llnw.net 0.0.0.0 cds458.lcy.llnw.net 0.0.0.0 cds459.lcy.llnw.net 0.0.0.0 cds461.lcy.llnw.net 0.0.0.0 cds468.lcy.llnw.net 0.0.0.0 cds469.lcy.llnw.net 0.0.0.0 cds471.lcy.llnw.net 0.0.0.0 cds483.lcy.llnw.net 0.0.0.0 cds484.lcy.llnw.net 0.0.0.0 cds489.lcy.llnw.net 0.0.0.0 cds493.lcy.llnw.net 0.0.0.0 cds494.lcy.llnw.net 0.0.0.0 cds54.ory.llnw.net 0.0.0.0 cds812.lon.llnw.net 0.0.0.0 cds815.lon.llnw.net 0.0.0.0 cds818.lon.llnw.net 0.0.0.0 cds832.lon.llnw.net 0.0.0.0 cds836.lon.llnw.net 0.0.0.0 cds840.lon.llnw.net 0.0.0.0 cds843.lon.llnw.net 0.0.0.0 cds857.lon.llnw.net 0.0.0.0 cds868.lon.llnw.net 0.0.0.0 cds869.lon.llnw.net 0.0.0.0 ceip.microsoft.com 0.0.0.0 centergyremote.partners.extranet.microsoft.com 0.0.0.0 certification.drm.microsoft.com 0.0.0.0 certpartner.one.microsoft.com 0.0.0.0 cgl.microsoft.com 0.0.0.0 ch1-cor001.api.p001.1drv.com 0.0.0.0 ch1-cor002.api.p001.1drv.com 0.0.0.0 ch3301-c.1drv.com 0.0.0.0 ch3301-e.1drv.com 0.0.0.0 ch3301-g.1drv.com 0.0.0.0 ch3302-c.1drv.com 0.0.0.0 ch3302-e.1drv.com 0.0.0.0 challenge.eteam.partners.extranet.microsoft.com 0.0.0.0 channels.microsoft.com 0.0.0.0 checkappexec.microsoft.com 0.0.0.0 choice.live.com 0.0.0.0 choice.microsoft.com 0.0.0.0 choice.microsoft.com.nsatc.net 0.0.0.0 click.email.microsoftonline.com 0.0.0.0 client-office365-tas.msedge.net 0.0.0.0 client-s.gateway.messenger.live.com 0.0.0.0 client.wns.windows.com 0.0.0.0 clientconfig.passport.net 0.0.0.0 cmtypartnertool.partners.extranet.microsoft.com 0.0.0.0 co2.sls.microsoft.com 0.0.0.0 codepremium.msdn.microsoft.com 0.0.0.0 commerce.microsoft.com 0.0.0.0 community.advertising.microsoft.com 0.0.0.0 community.bingads.microsoft.com 0.0.0.0 compaq.windowsmedia.com 0.0.0.0 compatexchange.cloudapp.net 0.0.0.0 compatexchange1.trafficmanager.net 0.0.0.0 config.edge.skype.com 0.0.0.0 config.teams.microsoft.com 0.0.0.0 configurator.microsoft.com 0.0.0.0 connections.members.microsoft.com 0.0.0.0 content.locator.metadata.windowsmedia.com 0.0.0.0 content.microsoftstore.com 0.0.0.0 continuum.dds.microsoft.com 0.0.0.0 corp.sts.microsoft.com 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com 0.0.0.0 corporate.windowsupdate.microsoft.com 0.0.0.0 crl.microsoft.com 0.0.0.0 crystal.partners.extranet.microsoft.com 0.0.0.0 cs1.wpc.v0cdn.net 0.0.0.0 css.one.microsoft.com 0.0.0.0 ctldl.windowsupdate.com 0.0.0.0 cuai-96.microsoft.com 0.0.0.0 cuai97.microsoft.com 0.0.0.0 curah.microsoft.com 0.0.0.0 cust-supp-chat.one.microsoft.com 0.0.0.0 cy2.settings.data.microsoft.com.akadns.net 0.0.0.0 cy2.vortex.data.microsoft.com.akadns.net 0.0.0.0 cyclescentral.directtaps.net 0.0.0.0 dars.msft.net 0.0.0.0 dart.l.doubleclick.net 0.0.0.0 das.microsoft.com 0.0.0.0 data.choice.microsoft.com 0.0.0.0 data.choice.microsoft.com.nsatc.net 0.0.0.0 data.tvdownload.microsoft.com 0.0.0.0 db3aqu.atdmt.com 0.0.0.0 db3wns2011111.wns.windows.com 0.0.0.0 db5-dspcdn.tlu.dl.delivery.mp.microsoft.com 0.0.0.0 db5-eap.settings-win.data.microsoft.com.akadns.net 0.0.0.0 db5.settings-win.data.microsoft.com.akadns.net 0.0.0.0 db5.settings.data.microsoft.com.akadns.net 0.0.0.0 db5.vortex.data.microsoft.com.akadns.net 0.0.0.0 db5.wns.windows.com 0.0.0.0 db5p.wns.notify.windows.com.akadns.net 0.0.0.0 db5p.wns.windows.com 0.0.0.0 db5sch101100122.wns.windows.com 0.0.0.0 db5sch101100127.wns.windows.com 0.0.0.0 db5sch101100831.wns.windows.com 0.0.0.0 db5sch101100835.wns.windows.com 0.0.0.0 db5sch101100917.wns.windows.com 0.0.0.0 db5sch101100925.wns.windows.com 0.0.0.0 db5sch101100928.wns.windows.com 0.0.0.0 db5sch101100938.wns.windows.com 0.0.0.0 db5sch101101001.wns.windows.com 0.0.0.0 db5sch101101022.wns.windows.com 0.0.0.0 db5sch101101024.wns.windows.com 0.0.0.0 db5sch101101031.wns.windows.com 0.0.0.0 db5sch101101034.wns.windows.com 0.0.0.0 db5sch101101042.wns.windows.com 0.0.0.0 db5sch101101044.wns.windows.com 0.0.0.0 db5sch101101122.wns.windows.com 0.0.0.0 db5sch101101123.wns.windows.com 0.0.0.0 db5sch101101125.wns.windows.com 0.0.0.0 db5sch101101128.wns.windows.com 0.0.0.0 db5sch101101129.wns.windows.com 0.0.0.0 db5sch101101133.wns.windows.com 0.0.0.0 db5sch101101145.wns.windows.com 0.0.0.0 db5sch101101209.wns.windows.com 0.0.0.0 db5sch101101221.wns.windows.com 0.0.0.0 db5sch101101228.wns.windows.com 0.0.0.0 db5sch101101231.wns.windows.com 0.0.0.0 db5sch101101237.wns.windows.com 0.0.0.0 db5sch101101317.wns.windows.com 0.0.0.0 db5sch101101324.wns.windows.com 0.0.0.0 db5sch101101329.wns.windows.com 0.0.0.0 db5sch101101333.wns.windows.com 0.0.0.0 db5sch101101334.wns.windows.com 0.0.0.0 db5sch101101338.wns.windows.com 0.0.0.0 db5sch101101419.wns.windows.com 0.0.0.0 db5sch101101424.wns.windows.com 0.0.0.0 db5sch101101426.wns.windows.com 0.0.0.0 db5sch101101427.wns.windows.com 0.0.0.0 db5sch101101430.wns.windows.com 0.0.0.0 db5sch101101445.wns.windows.com 0.0.0.0 db5sch101101511.wns.windows.com 0.0.0.0 db5sch101101519.wns.windows.com 0.0.0.0 db5sch101101529.wns.windows.com 0.0.0.0 db5sch101101535.wns.windows.com 0.0.0.0 db5sch101101541.wns.windows.com 0.0.0.0 db5sch101101543.wns.windows.com 0.0.0.0 db5sch101101608.wns.windows.com 0.0.0.0 db5sch101101618.wns.windows.com 0.0.0.0 db5sch101101629.wns.windows.com 0.0.0.0 db5sch101101631.wns.windows.com 0.0.0.0 db5sch101101633.wns.windows.com 0.0.0.0 db5sch101101640.wns.windows.com 0.0.0.0 db5sch101101711.wns.windows.com 0.0.0.0 db5sch101101722.wns.windows.com 0.0.0.0 db5sch101101739.wns.windows.com 0.0.0.0 db5sch101101745.wns.windows.com 0.0.0.0 db5sch101101813.wns.windows.com 0.0.0.0 db5sch101101820.wns.windows.com 0.0.0.0 db5sch101101826.wns.windows.com 0.0.0.0 db5sch101101828.wns.windows.com 0.0.0.0 db5sch101101835.wns.windows.com 0.0.0.0 db5sch101101837.wns.windows.com 0.0.0.0 db5sch101101844.wns.windows.com 0.0.0.0 db5sch101101902.wns.windows.com 0.0.0.0 db5sch101101907.wns.windows.com 0.0.0.0 db5sch101101910.wns.windows.com 0.0.0.0 db5sch101101914.wns.windows.com 0.0.0.0 db5sch101101929.wns.windows.com 0.0.0.0 db5sch101101939.wns.windows.com 0.0.0.0 db5sch101101941.wns.windows.com 0.0.0.0 db5sch101102015.wns.windows.com 0.0.0.0 db5sch101102017.wns.windows.com 0.0.0.0 db5sch101102019.wns.windows.com 0.0.0.0 db5sch101102023.wns.windows.com 0.0.0.0 db5sch101102025.wns.windows.com 0.0.0.0 db5sch101102032.wns.windows.com 0.0.0.0 db5sch101102033.wns.windows.com 0.0.0.0 db5sch101110108.wns.windows.com 0.0.0.0 db5sch101110109.wns.windows.com 0.0.0.0 db5sch101110114.wns.windows.com 0.0.0.0 db5sch101110135.wns.windows.com 0.0.0.0 db5sch101110142.wns.windows.com 0.0.0.0 db5sch101110204.wns.windows.com 0.0.0.0 db5sch101110206.wns.windows.com 0.0.0.0 db5sch101110214.wns.windows.com 0.0.0.0 db5sch101110225.wns.windows.com 0.0.0.0 db5sch101110232.wns.windows.com 0.0.0.0 db5sch101110245.wns.windows.com 0.0.0.0 db5sch101110315.wns.windows.com 0.0.0.0 db5sch101110323.wns.windows.com 0.0.0.0 db5sch101110325.wns.windows.com 0.0.0.0 db5sch101110328.wns.windows.com 0.0.0.0 db5sch101110331.wns.windows.com 0.0.0.0 db5sch101110341.wns.windows.com 0.0.0.0 db5sch101110343.wns.windows.com 0.0.0.0 db5sch101110345.wns.windows.com 0.0.0.0 db5sch101110403.wns.windows.com 0.0.0.0 db5sch101110408.wns.windows.com 0.0.0.0 db5sch101110419.wns.windows.com 0.0.0.0 db5sch101110428.wns.windows.com 0.0.0.0 db5sch101110435.wns.windows.com 0.0.0.0 db5sch101110438.wns.windows.com 0.0.0.0 db5sch101110442.wns.windows.com 0.0.0.0 db5sch101110501.wns.windows.com 0.0.0.0 db5sch101110510.wns.windows.com 0.0.0.0 db5sch101110518.wns.windows.com 0.0.0.0 db5sch101110527.wns.windows.com 0.0.0.0 db5sch101110533.wns.windows.com 0.0.0.0 db5sch101110618.wns.windows.com 0.0.0.0 db5sch101110621.wns.windows.com 0.0.0.0 db5sch101110622.wns.windows.com 0.0.0.0 db5sch101110624.wns.windows.com 0.0.0.0 db5sch101110626.wns.windows.com 0.0.0.0 db5sch101110634.wns.windows.com 0.0.0.0 db5sch101110705.wns.windows.com 0.0.0.0 db5sch101110713.wns.windows.com 0.0.0.0 db5sch101110724.wns.windows.com 0.0.0.0 db5sch101110729.wns.windows.com 0.0.0.0 db5sch101110740.wns.windows.com 0.0.0.0 db5sch101110810.wns.windows.com 0.0.0.0 db5sch101110816.wns.windows.com 0.0.0.0 db5sch101110821.wns.windows.com 0.0.0.0 db5sch101110822.wns.windows.com 0.0.0.0 db5sch101110825.wns.windows.com 0.0.0.0 db5sch101110828.wns.windows.com 0.0.0.0 db5sch101110829.wns.windows.com 0.0.0.0 db5sch101110831.wns.windows.com 0.0.0.0 db5sch101110835.wns.windows.com 0.0.0.0 db5sch101110919.wns.windows.com 0.0.0.0 db5sch101110921.wns.windows.com 0.0.0.0 db5sch101110923.wns.windows.com 0.0.0.0 db5sch101110929.wns.windows.com 0.0.0.0 db5sch103081814.wns.windows.com 0.0.0.0 db5sch103081913.wns.windows.com 0.0.0.0 db5sch103082011.wns.windows.com 0.0.0.0 db5sch103082111.wns.windows.com 0.0.0.0 db5sch103082308.wns.windows.com 0.0.0.0 db5sch103082406.wns.windows.com 0.0.0.0 db5sch103082409.wns.windows.com 0.0.0.0 db5sch103082609.wns.windows.com 0.0.0.0 db5sch103082611.wns.windows.com 0.0.0.0 db5sch103082709.wns.windows.com 0.0.0.0 db5sch103082712.wns.windows.com 0.0.0.0 db5sch103082806.wns.windows.com 0.0.0.0 db5sch103090115.wns.windows.com 0.0.0.0 db5sch103090210.wns.windows.com 0.0.0.0 db5sch103090414.wns.windows.com 0.0.0.0 db5sch103090415.wns.windows.com 0.0.0.0 db5sch103090513.wns.windows.com 0.0.0.0 db5sch103090515.wns.windows.com 0.0.0.0 db5sch103090608.wns.windows.com 0.0.0.0 db5sch103090806.wns.windows.com 0.0.0.0 db5sch103090814.wns.windows.com 0.0.0.0 db5sch103090906.wns.windows.com 0.0.0.0 db5sch103091011.wns.windows.com 0.0.0.0 db5sch103091012.wns.windows.com 0.0.0.0 db5sch103091106.wns.windows.com 0.0.0.0 db5sch103091108.wns.windows.com 0.0.0.0 db5sch103091212.wns.windows.com 0.0.0.0 db5sch103091311.wns.windows.com 0.0.0.0 db5sch103091313.wns.windows.com 0.0.0.0 db5sch103091414.wns.windows.com 0.0.0.0 db5sch103091511.wns.windows.com 0.0.0.0 db5sch103091609.wns.windows.com 0.0.0.0 db5sch103091617.wns.windows.com 0.0.0.0 db5sch103091715.wns.windows.com 0.0.0.0 db5sch103091817.wns.windows.com 0.0.0.0 db5sch103091908.wns.windows.com 0.0.0.0 db5sch103091911.wns.windows.com 0.0.0.0 db5sch103092010.wns.windows.com 0.0.0.0 db5sch103092108.wns.windows.com 0.0.0.0 db5sch103092109.wns.windows.com 0.0.0.0 db5sch103092209.wns.windows.com 0.0.0.0 db5sch103092210.wns.windows.com 0.0.0.0 db5sch103092509.wns.windows.com 0.0.0.0 db5sch103100117.wns.windows.com 0.0.0.0 db5sch103100121.wns.windows.com 0.0.0.0 db5sch103100221.wns.windows.com 0.0.0.0 db5sch103100313.wns.windows.com 0.0.0.0 db5sch103100314.wns.windows.com 0.0.0.0 db5sch103100412.wns.windows.com 0.0.0.0 db5sch103100510.wns.windows.com 0.0.0.0 db5sch103100511.wns.windows.com 0.0.0.0 db5sch103100611.wns.windows.com 0.0.0.0 db5sch103100712.wns.windows.com 0.0.0.0 db5sch103101105.wns.windows.com 0.0.0.0 db5sch103101208.wns.windows.com 0.0.0.0 db5sch103101212.wns.windows.com 0.0.0.0 db5sch103101314.wns.windows.com 0.0.0.0 db5sch103101411.wns.windows.com 0.0.0.0 db5sch103101413.wns.windows.com 0.0.0.0 db5sch103101513.wns.windows.com 0.0.0.0 db5sch103101610.wns.windows.com 0.0.0.0 db5sch103101611.wns.windows.com 0.0.0.0 db5sch103101705.wns.windows.com 0.0.0.0 db5sch103101711.wns.windows.com 0.0.0.0 db5sch103101813.wns.windows.com 0.0.0.0 db5sch103101909.wns.windows.com 0.0.0.0 db5sch103101914.wns.windows.com 0.0.0.0 db5sch103102009.wns.windows.com 0.0.0.0 db5sch103102112.wns.windows.com 0.0.0.0 db5sch103102203.wns.windows.com 0.0.0.0 db5sch103102209.wns.windows.com 0.0.0.0 db5sch103102310.wns.windows.com 0.0.0.0 db5sch103102404.wns.windows.com 0.0.0.0 db5sch103102410.wns.windows.com 0.0.0.0 db5sch103102516.wns.windows.com 0.0.0.0 db5sch103102609.wns.windows.com 0.0.0.0 db5sch103102610.wns.windows.com 0.0.0.0 db5sch103102710.wns.windows.com 0.0.0.0 db5sch103102711.wns.windows.com 0.0.0.0 db5sch103102805.wns.windows.com 0.0.0.0 db5wns1d.wns.windows.com 0.0.0.0 db6sch102090104.wns.windows.com 0.0.0.0 db6sch102090109.wns.windows.com 0.0.0.0 db6sch102090112.wns.windows.com 0.0.0.0 db6sch102090116.wns.windows.com 0.0.0.0 db6sch102090122.wns.windows.com 0.0.0.0 db6sch102090203.wns.windows.com 0.0.0.0 db6sch102090206.wns.windows.com 0.0.0.0 db6sch102090208.wns.windows.com 0.0.0.0 db6sch102090209.wns.windows.com 0.0.0.0 db6sch102090210.wns.windows.com 0.0.0.0 db6sch102090211.wns.windows.com 0.0.0.0 db6sch102090212.wns.windows.com 0.0.0.0 db6sch102090305.wns.windows.com 0.0.0.0 db6sch102090306.wns.windows.com 0.0.0.0 db6sch102090308.wns.windows.com 0.0.0.0 db6sch102090311.wns.windows.com 0.0.0.0 db6sch102090313.wns.windows.com 0.0.0.0 db6sch102090410.wns.windows.com 0.0.0.0 db6sch102090412.wns.windows.com 0.0.0.0 db6sch102090504.wns.windows.com 0.0.0.0 db6sch102090510.wns.windows.com 0.0.0.0 db6sch102090512.wns.windows.com 0.0.0.0 db6sch102090513.wns.windows.com 0.0.0.0 db6sch102090514.wns.windows.com 0.0.0.0 db6sch102090519.wns.windows.com 0.0.0.0 db6sch102090613.wns.windows.com 0.0.0.0 db6sch102090619.wns.windows.com 0.0.0.0 db6sch102090810.wns.windows.com 0.0.0.0 db6sch102090811.wns.windows.com 0.0.0.0 db6sch102090902.wns.windows.com 0.0.0.0 db6sch102090905.wns.windows.com 0.0.0.0 db6sch102090907.wns.windows.com 0.0.0.0 db6sch102090908.wns.windows.com 0.0.0.0 db6sch102090910.wns.windows.com 0.0.0.0 db6sch102090911.wns.windows.com 0.0.0.0 db6sch102091003.wns.windows.com 0.0.0.0 db6sch102091007.wns.windows.com 0.0.0.0 db6sch102091008.wns.windows.com 0.0.0.0 db6sch102091009.wns.windows.com 0.0.0.0 db6sch102091011.wns.windows.com 0.0.0.0 db6sch102091103.wns.windows.com 0.0.0.0 db6sch102091105.wns.windows.com 0.0.0.0 db6sch102091204.wns.windows.com 0.0.0.0 db6sch102091205.wns.windows.com 0.0.0.0 db6sch102091209.wns.windows.com 0.0.0.0 db6sch102091305.wns.windows.com 0.0.0.0 db6sch102091307.wns.windows.com 0.0.0.0 db6sch102091308.wns.windows.com 0.0.0.0 db6sch102091309.wns.windows.com 0.0.0.0 db6sch102091314.wns.windows.com 0.0.0.0 db6sch102091412.wns.windows.com 0.0.0.0 db6sch102091503.wns.windows.com 0.0.0.0 db6sch102091507.wns.windows.com 0.0.0.0 db6sch102091508.wns.windows.com 0.0.0.0 db6sch102091602.wns.windows.com 0.0.0.0 db6sch102091603.wns.windows.com 0.0.0.0 db6sch102091606.wns.windows.com 0.0.0.0 db6sch102091607.wns.windows.com 0.0.0.0 dcodews.partners.extranet.microsoft.com 0.0.0.0 dcs.ccp.microsoft.com 0.0.0.0 definitionupdates.microsoft.com 0.0.0.0 delivery.pens.microsoft.com 0.0.0.0 delivery.smtp.microsoft.com 0.0.0.0 delivery2.pens.microsoft.com 0.0.0.0 dev.virtualearth.net 0.0.0.0 device.auth.xboxlive.com 0.0.0.0 df.telemetry.microsoft.com 0.0.0.0 dgl.microsoft.com 0.0.0.0 diagnostics.support.microsoft.com 0.0.0.0 directory.microsoft.com 0.0.0.0 directory.netmeeting.microsoft.com 0.0.0.0 directory.partners.extranet.microsoft.com 0.0.0.0 discuss.microsoft.com 0.0.0.0 displaycatalog.mp.microsoft.com 0.0.0.0 dl.delivery.mp.microsoft.com 0.0.0.0 dlbmodigital.microsoft.com 0.0.0.0 dmd.metaservices.microsoft.com 0.0.0.0 dmd.metaservices.microsoft.com.akadns.net 0.0.0.0 dns.msftncsi.com 0.0.0.0 dns2.tk.msft.net 0.0.0.0 dns3.tk.msft.net 0.0.0.0 domains.googlesyndication.com 0.0.0.0 domains.live.com 0.0.0.0 down.saservices.microsoft.com 0.0.0.0 download.windowsupdate.com 0.0.0.0 downloadoffice2010.microsoft.com 0.0.0.0 drm.microsoft.com 0.0.0.0 drmlicense.one.microsoft.com 0.0.0.0 ds.download.windowsupdate.com 0.0.0.0 ds.microsoft.com 0.0.0.0 dynamics-crm.pinpoint.microsoft.com 0.0.0.0 dynamics.microsoft.com 0.0.0.0 e2835.dspb.akamaiedge.net 0.0.0.0 e7341.g.akamaiedge.net 0.0.0.0 e7502.ce.akamaiedge.net 0.0.0.0 e8218.ce.akamaiedge.net 0.0.0.0 ec.atdmt.com 0.0.0.0 ecn.dev.virtualearth.net 0.0.0.0 edgewelcomecdn.microsoft.com 0.0.0.0 email.microsoft.com 0.0.0.0 email2.microsoft.com 0.0.0.0 emdl.ws.microsoft.com 0.0.0.0 emea.microsoftstore.com 0.0.0.0 emeaselling.partners.extranet.microsoft.com 0.0.0.0 empower-isv.one.microsoft.com 0.0.0.0 entimg-origin.msn.com 0.0.0.0 eopen.microsoft.com 0.0.0.0 epg.tvdownload.microsoft.com 0.0.0.0 epp.microsoft.com 0.0.0.0 eu-v10.events.data.microsoft.com 0.0.0.0 eu-v20.events.data.microsoft.com 0.0.0.0 eu.microsoft.com 0.0.0.0 eu.vortex-win.data.microsoft.com 0.0.0.0 eu.vortex.data.microsoft.com 0.0.0.0 europe.smartscreen-prod.microsoft.com 0.0.0.0 events.data.microsoft.com 0.0.0.0 events.microsoft.com 0.0.0.0 events.microsoftvirtualacademy.com 0.0.0.0 evoke-windowsservices-tas.msedge.net 0.0.0.0 example.microsoft.com 0.0.0.0 excel.office.live.com 0.0.0.0 extranet.microsoft-int.com 0.0.0.0 extranet.microsoft.com 0.0.0.0 f.email.microsoft.com 0.0.0.0 f.trafficjunction.com 0.0.0.0 fai.music.metaservices.microsoft.com 0.0.0.0 familysafety.microsoft.com 0.0.0.0 favorites.live.com 0.0.0.0 fd.bingads.microsoft.com 0.0.0.0 fe1.update.microsoft.com 0.0.0.0 fe2.update.microsoft.com 0.0.0.0 fe2.update.microsoft.com.akadns.net 0.0.0.0 fe2.ws.microsoft.com 0.0.0.0 fe2.ws.microsoft.com.nsatc.net 0.0.0.0 fe2cr.update.microsoft.com 0.0.0.0 fe3.delivery.dsp.mp.microsoft.com.nsatc.net 0.0.0.0 fe3.delivery.mp.microsoft.com 0.0.0.0 fe3cr.delivery.mp.microsoft.com 0.0.0.0 feedback.microsoft-hohm.com 0.0.0.0 feedback.search.microsoft.com 0.0.0.0 feedback.windows.com 0.0.0.0 feeds.microsoft.com 0.0.0.0 fg.ds.b1.download.windowsupdate.com 0.0.0.0 fg.v4.download.windowsupdate.com 0.0.0.0 finance.services.appex.bing.com 0.0.0.0 fixitcenter.support.microsoft.com 0.0.0.0 flex.msn.com 0.0.0.0 foodanddrink.tile.appex.bing.com 0.0.0.0 forefrontdl.microsoft.com 0.0.0.0 forinstall.linked-bigstyler.com 0.0.0.0 fr-fr.appex-rf.msn.com 0.0.0.0 freebusy.office.microsoft.com 0.0.0.0 fulfilloffer.microsoft.com 0.0.0.0 fullproduct.download.microsoft.com 0.0.0.0 fuse.microsoft.com 0.0.0.0 g.bing.com 0.0.0.0 g.live.com 0.0.0.0 g.microsoft.com 0.0.0.0 g.microsoftonline.com 0.0.0.0 g.msn.com 0.0.0.0 g.msn.com.nsatc.net 0.0.0.0 g3.microsoft.com 0.0.0.0 genuine.microsoft.com 0.0.0.0 genuinebeta.microsoft.com 0.0.0.0 geo-prod.do.dsp.mp.microsoft.com 0.0.0.0 geo.settings-win.data.microsoft.com.akadns.net 0.0.0.0 geo.settings.data.microsoft.com.akadns.net 0.0.0.0 geo.vortex.data.microsoft.com.akadns.net 0.0.0.0 geover-prod.do.dsp.mp.microsoft.com 0.0.0.0 glbdns.microsoft.com 0.0.0.0 global.msads.net.c.footprint.net 0.0.0.0 global.sam.msn.com 0.0.0.0 go.microsoft.akadns.net 0.0.0.0 h1.msn.com 0.0.0.0 h2.msn.com 0.0.0.0 hdshowcase.microsoft.com 0.0.0.0 help.bingads.microsoft.com 0.0.0.0 hk2.settings.data.microsoft.com.akadns.net 0.0.0.0 hk2.wns.windows.com 0.0.0.0 hk2sch130020721.wns.windows.com 0.0.0.0 hk2sch130020723.wns.windows.com 0.0.0.0 hk2sch130020726.wns.windows.com 0.0.0.0 hk2sch130020729.wns.windows.com 0.0.0.0 hk2sch130020732.wns.windows.com 0.0.0.0 hk2sch130020824.wns.windows.com 0.0.0.0 hk2sch130020843.wns.windows.com 0.0.0.0 hk2sch130020851.wns.windows.com 0.0.0.0 hk2sch130020854.wns.windows.com 0.0.0.0 hk2sch130020855.wns.windows.com 0.0.0.0 hk2sch130020924.wns.windows.com 0.0.0.0 hk2sch130020936.wns.windows.com 0.0.0.0 hk2sch130020940.wns.windows.com 0.0.0.0 hk2sch130020956.wns.windows.com 0.0.0.0 hk2sch130020958.wns.windows.com 0.0.0.0 hk2sch130020961.wns.windows.com 0.0.0.0 hk2sch130021017.wns.windows.com 0.0.0.0 hk2sch130021029.wns.windows.com 0.0.0.0 hk2sch130021035.wns.windows.com 0.0.0.0 hk2sch130021137.wns.windows.com 0.0.0.0 hk2sch130021142.wns.windows.com 0.0.0.0 hk2sch130021153.wns.windows.com 0.0.0.0 hk2sch130021217.wns.windows.com 0.0.0.0 hk2sch130021246.wns.windows.com 0.0.0.0 hk2sch130021249.wns.windows.com 0.0.0.0 hk2sch130021260.wns.windows.com 0.0.0.0 hk2sch130021264.wns.windows.com 0.0.0.0 hk2sch130021322.wns.windows.com 0.0.0.0 hk2sch130021323.wns.windows.com 0.0.0.0 hk2sch130021329.wns.windows.com 0.0.0.0 hk2sch130021334.wns.windows.com 0.0.0.0 hk2sch130021360.wns.windows.com 0.0.0.0 hk2sch130021432.wns.windows.com 0.0.0.0 hk2sch130021433.wns.windows.com 0.0.0.0 hk2sch130021435.wns.windows.com 0.0.0.0 hk2sch130021437.wns.windows.com 0.0.0.0 hk2sch130021440.wns.windows.com 0.0.0.0 hk2sch130021450.wns.windows.com 0.0.0.0 hk2sch130021518.wns.windows.com 0.0.0.0 hk2sch130021523.wns.windows.com 0.0.0.0 hk2sch130021526.wns.windows.com 0.0.0.0 hk2sch130021527.wns.windows.com 0.0.0.0 hk2sch130021544.wns.windows.com 0.0.0.0 hk2sch130021554.wns.windows.com 0.0.0.0 hk2sch130021618.wns.windows.com 0.0.0.0 hk2sch130021634.wns.windows.com 0.0.0.0 hk2sch130021638.wns.windows.com 0.0.0.0 hk2sch130021646.wns.windows.com 0.0.0.0 hk2sch130021652.wns.windows.com 0.0.0.0 hk2sch130021654.wns.windows.com 0.0.0.0 hk2sch130021657.wns.windows.com 0.0.0.0 hk2sch130021723.wns.windows.com 0.0.0.0 hk2sch130021726.wns.windows.com 0.0.0.0 hk2sch130021727.wns.windows.com 0.0.0.0 hk2sch130021730.wns.windows.com 0.0.0.0 hk2sch130021731.wns.windows.com 0.0.0.0 hk2sch130021754.wns.windows.com 0.0.0.0 hk2sch130021829.wns.windows.com 0.0.0.0 hk2sch130021830.wns.windows.com 0.0.0.0 hk2sch130021833.wns.windows.com 0.0.0.0 hk2sch130021840.wns.windows.com 0.0.0.0 hk2sch130021842.wns.windows.com 0.0.0.0 hk2sch130021851.wns.windows.com 0.0.0.0 hk2sch130021852.wns.windows.com 0.0.0.0 hk2sch130021927.wns.windows.com 0.0.0.0 hk2sch130021928.wns.windows.com 0.0.0.0 hk2sch130021929.wns.windows.com 0.0.0.0 hk2sch130021958.wns.windows.com 0.0.0.0 hk2sch130022035.wns.windows.com 0.0.0.0 hk2sch130022041.wns.windows.com 0.0.0.0 hk2sch130022049.wns.windows.com 0.0.0.0 hk2sch130022135.wns.windows.com 0.0.0.0 hk2wns1.wns.windows.com 0.0.0.0 hk2wns1b.wns.windows.com 0.0.0.0 holiday.microsoftstore.com 0.0.0.0 home.microsoft.com 0.0.0.0 hostedocsp.globalsign.com 0.0.0.0 hp.windowsmedia.com 0.0.0.0 hs.windows.microsoft.com 0.0.0.0 hup.microsoft.com 0.0.0.0 i-bl6p-cor001.api.p001.1drv.com 0.0.0.0 i-bl6p-cor002.api.p001.1drv.com 0.0.0.0 i-bn3p-cor001.api.p001.1drv.com 0.0.0.0 i-by3p-cor001.api.p001.1drv.com 0.0.0.0 i-by3p-cor002.api.p001.1drv.com 0.0.0.0 i-ch1-cor001.api.p001.1drv.com 0.0.0.0 i-ch1-cor002.api.p001.1drv.com 0.0.0.0 i-sn2-cor001.api.p001.1drv.com 0.0.0.0 i-sn2-cor002.api.p001.1drv.com 0.0.0.0 i-sn3p-cor001.api.p001.1drv.com 0.0.0.0 i.microsoft.com 0.0.0.0 i.msdn.microsoft.com 0.0.0.0 i.office.microsoft.com 0.0.0.0 i.s-microsoft.com 0.0.0.0 i.technet.microsoft.com 0.0.0.0 i1.services.social.microsoft.com 0.0.0.0 i1.services.social.microsoft.com.nsatc.net 0.0.0.0 i2.microsoft.com 0.0.0.0 i2.msdn.microsoft.com 0.0.0.0 i2.services.social.microsoft.com 0.0.0.0 i2.technet.microsoft.com 0.0.0.0 i3.microsoft.com 0.0.0.0 i3.services.social.microsoft.com 0.0.0.0 i4.services.social.microsoft.com 0.0.0.0 ia.microsoft.com 0.0.0.0 icassp98.microsoft.com 0.0.0.0 ice.microsoft.com 0.0.0.0 icmods.microsoft.com 0.0.0.0 ics.one.microsoft.com 0.0.0.0 ie.components.microsoft.com 0.0.0.0 ie8.msn.com 0.0.0.0 ieak.microsoft.com 0.0.0.0 iecvlist.microsoft.com 0.0.0.0 ieonline.microsoft.com 0.0.0.0 ilabdc.directtaps.net 0.0.0.0 img-prod-cms-rt-microsoft-com.akamaized.net 0.0.0.0 inference.location.live.net 0.0.0.0 info.music.metaservices.microsoft.com 0.0.0.0 insider.windows.com 0.0.0.0 insiderservice.microsoft.com 0.0.0.0 int.whiteboard.microsoft.com 0.0.0.0 invoice.microsoft.com 0.0.0.0 ipv4.login.live.com 0.0.0.0 iso.esd.microsoft.com 0.0.0.0 ispreferral.microsoft.com 0.0.0.0 isvmex.team.partners.extranet.microsoft.com 0.0.0.0 iterror0x03.azurewebsites.net 0.0.0.0 iwsolve.partners.extranet.microsoft.com 0.0.0.0 jdp.microsoft.com 0.0.0.0 js.microsoft.com 0.0.0.0 js.monitor.azure.com 0.0.0.0 kcenter.partners.extranet.microsoft.com 0.0.0.0 lb1.www.ms.akadns.net 0.0.0.0 learningcenter.partners.extranet.microsoft.com 0.0.0.0 lg.home.microsoft.com 0.0.0.0 lgincdnmsftuswe2.azureedge.net 0.0.0.0 lgincdnvzeuno.azureedge.net 0.0.0.0 li581-132.members.linode.com 0.0.0.0 licensecode.one.microsoft.com 0.0.0.0 licenseserver.windowsmedia.com 0.0.0.0 licensing.microsoft.com 0.0.0.0 licensing.mp.microsoft.com 0.0.0.0 live-int.com 0.0.0.0 live.rads.msn.com 0.0.0.0 lobby.microsoftstore.com 0.0.0.0 location-inference-westus.cloudapp.net 0.0.0.0 locator.metadata.windowsmedia.com 0.0.0.0 login.domains.live.com 0.0.0.0 login.live-int.com 0.0.0.0 login.microsoft-int.com 0.0.0.0 login.microsoftonline.com 0.0.0.0 login.msa.akadns6.net 0.0.0.0 login.windows.net 0.0.0.0 logincdn.msauth.net 0.0.0.0 lync.microsoft.com 0.0.0.0 lynconline.pinpoint.microsoft.com 0.0.0.0 m.adnxs.com 0.0.0.0 m.hotmail.com 0.0.0.0 m.microsoft.com 0.0.0.0 m.microsoftstore.com 0.0.0.0 mac2.microsoft.com 0.0.0.0 mail3.microsoft.com 0.0.0.0 mail3.mssupport.microsoft.com 0.0.0.0 manage.devcenter.microsoft.com 0.0.0.0 maps.microsoft.com 0.0.0.0 maps.windows.com 0.0.0.0 marketing.microsoft.com 0.0.0.0 mbs.microsoft.com 0.0.0.0 mc1.maps.live.com 0.0.0.0 mcp.microsoft.com 0.0.0.0 mcsp.microsoft.com 0.0.0.0 mcspreferral.microsoft.com 0.0.0.0 mediadl.microsoft.com 0.0.0.0 mediaredirect.microsoft.com 0.0.0.0 medtronics.team.partners.extranet.microsoft.com 0.0.0.0 membercenter.office.microsoft.com 0.0.0.0 members.microsoft.com 0.0.0.0 memberstest2.microsoft.com 0.0.0.0 mert.microsoft.com 0.0.0.0 messaging.office.microsoft.com 0.0.0.0 messenger.live.com 0.0.0.0 messenger.microsoft.com 0.0.0.0 metadata.windowsmedia.com 0.0.0.0 metaservices.microsoft.com 0.0.0.0 metaservices.windowsmedia.com 0.0.0.0 mgn.microsoft.com 0.0.0.0 microsoft-careers.com 0.0.0.0 microsoft-int.com 0.0.0.0 microsoft.microsoftedge 0.0.0.0 microsoft.software.net 0.0.0.0 microsoftadvertising.com 0.0.0.0 microsoftedgewelcome.microsoft.com 0.0.0.0 microsoftelearning.com 0.0.0.0 microsoftlawportal.net 0.0.0.0 microsoftlicense.com 0.0.0.0 microsoftlicensereview.com 0.0.0.0 microsoftonline.com 0.0.0.0 microsoftportal.net 0.0.0.0 microsoftstore.com 0.0.0.0 microsoftstore.it 0.0.0.0 microsoftstore.me 0.0.0.0 microsofttouch.fr 0.0.0.0 microsoftupdate.com 0.0.0.0 microsoftupdate.microsoft.com 0.0.0.0 microsoftupdates.eu 0.0.0.0 microsoftvolumelicensing.com 0.0.0.0 mla.microsoft.com 0.0.0.0 mobile.events.data.microsoft.com 0.0.0.0 mobile.pipe.aria.microsoft.com 0.0.0.0 mobileconfig.net 0.0.0.0 mocl.one.microsoft.com 0.0.0.0 modern.watson.data.microsoft.com.akadns.net 0.0.0.0 moet.microsoft.com 0.0.0.0 monitor.azure.com 0.0.0.0 movie.metadata.windowsmedia.com 0.0.0.0 mpa.one.microsoft.com 0.0.0.0 mpan.microsoft.com 0.0.0.0 mpanbeta.microsoft.com 0.0.0.0 mppe.partners.extranet.microsoft.com 0.0.0.0 mrodevicemgr.officeapps.live.com 0.0.0.0 ms.a.microsoft.com 0.0.0.0 msa.one.microsoft.com 0.0.0.0 msagfx.live.com 0.0.0.0 mscrl.microsoft.com 0.0.0.0 msdl.microsoft.com 0.0.0.0 msdn.one.microsoft.com 0.0.0.0 msdnisv.microsoft.com 0.0.0.0 msedge.net 0.0.0.0 msevents-as.microsoft.com 0.0.0.0 msevents-eu.microsoft.com 0.0.0.0 msevents.microsoft.com 0.0.0.0 mseventsppe.microsoft.com 0.0.0.0 msftconnecttest.com 0.0.0.0 msftncsi.com 0.0.0.0 msftopenus.partners.extranet.microsoft.com 0.0.0.0 mshome.net 0.0.0.0 msnbot-65-55-108-23.search.msn.com 0.0.0.0 msnews.microsoft.com 0.0.0.0 msntest.serving-sys.com 0.0.0.0 msops.microsoft.com 0.0.0.0 mspartner.microsoft.com 0.0.0.0 mspress.microsoft.com 0.0.0.0 msrcmt.research.microsoft.com 0.0.0.0 mt.saservices.microsoft.com 0.0.0.0 mtcppoc.directtaps.net 0.0.0.0 murl.microsoft.com 0.0.0.0 music.metaservices.microsoft.com 0.0.0.0 music.submissions.metaservices.microsoft.com 0.0.0.0 mvp.microsoft.com 0.0.0.0 mvp.support.microsoft.com 0.0.0.0 mvp.support.ppe.microsoft.com 0.0.0.0 mymfe.microsoft.com 0.0.0.0 mywindowsmobile.co.uk 0.0.0.0 mywindowsmobile.com 0.0.0.0 mywindowsmobile.de 0.0.0.0 na.msdn.microsoft.com 0.0.0.0 nav.smartscreen.microsoft.com 0.0.0.0 ncsi.glbdns.microsoft.com 0.0.0.0 netc.members.microsoft.com 0.0.0.0 netmeeting.microsoft.com 0.0.0.0 netscan.research.microsoft.com 0.0.0.0 netservforextranet.microsoft.com 0.0.0.0 newsletters.microsoft.com 0.0.0.0 next-services.apps.microsoft.com 0.0.0.0 nexus.officeapps.live.com 0.0.0.0 nexusrules.officeapps.live.com 0.0.0.0 ns.microsoft.com 0.0.0.0 ntp.msn.com 0.0.0.0 ntservicepack.microsoft.com 0.0.0.0 nz.partners.retail.microsoft.com 0.0.0.0 nz.xbox.partners.retail.microsoft.com 0.0.0.0 o15.officeredir.microsoft.com 0.0.0.0 oca.telemetry.microsoft.com 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net 0.0.0.0 ocos-office365-s2s.msedge.net 0.0.0.0 odc.officeapps.live.com 0.0.0.0 office.live.com 0.0.0.0 office.microsoft.com 0.0.0.0 office.net 0.0.0.0 office2010.microsoft.com 0.0.0.0 office365.microsoft.com 0.0.0.0 office365.pinpoint.microsoft.com 0.0.0.0 officeapps.live.com 0.0.0.0 officebeta.microsoft.com 0.0.0.0 officecdn.microsoft.com 0.0.0.0 officecdn.microsoft.com.edgesuite.net 0.0.0.0 officeclient.microsoft.com 0.0.0.0 officeimages.microsoft.com 0.0.0.0 officeint.microsoft.com 0.0.0.0 officelive.microsoft.com 0.0.0.0 officeoffer.one.microsoft.com 0.0.0.0 officeredir.microsoft.com 0.0.0.0 officesas.microsoft.com 0.0.0.0 officeupdate.microsoft.com 0.0.0.0 offline.officeapps.live.com 0.0.0.0 om.one.microsoft.com 0.0.0.0 oms.one.microsoft.com 0.0.0.0 oms2.one.microsoft.com 0.0.0.0 onboarding.data.tvdownload.microsoft.com 0.0.0.0 onboarding.epg.tvdownload.microsoft.com 0.0.0.0 one.microsoft.com 0.0.0.0 oneclient.sfx.ms 0.0.0.0 onecollector.cloudapp.aria.akadns.net 0.0.0.0 onedrive.com 0.0.0.0 onedrive.live.com 0.0.0.0 onlinehelp.microsoft.com 0.0.0.0 onlinestores.metaservices.microsoft.com 0.0.0.0 origin-codecs.microsoft.com 0.0.0.0 origin-images.windowsmedia.com 0.0.0.0 osi.office.net 0.0.0.0 osizpcusmagenta001.blob.core.windows.net 0.0.0.0 osl.microsoft.com 0.0.0.0 otf.msn.com 0.0.0.0 outlook.live.com 0.0.0.0 outlook.microsoft.com 0.0.0.0 outlook.office365.com 0.0.0.0 p.email.microsoft.com 0.0.0.0 partner.microsoft.com 0.0.0.0 partnerconnect.microsoft.com 0.0.0.0 partnering.one.microsoft.com 0.0.0.0 partners.extranet.microsoft-int.com 0.0.0.0 partners.extranet.microsoft.com 0.0.0.0 partners.microsoft.com 0.0.0.0 partners.retail.microsoft.com 0.0.0.0 partners.sts.microsoft.com 0.0.0.0 partnerstraining.microsoft.com 0.0.0.0 partnersupport.microsoft.com 0.0.0.0 pens.microsoft.com 0.0.0.0 personaluselicense.windows.com 0.0.0.0 phishingfilter.microsoft.com 0.0.0.0 phoenixbillingtest.partners.extranet.microsoft-int.com 0.0.0.0 phones.microsoftstore.com 0.0.0.0 pilot.premier.microsoft.com 0.0.0.0 pingdom.com 0.0.0.0 pinpoint.microsoft-ppe.com 0.0.0.0 pinpoint.microsoft.com 0.0.0.0 planningservices.partners.extranet.microsoft.com 0.0.0.0 portal.microsoftonline.com 0.0.0.0 powerapps.microsoft.com 0.0.0.0 powerplatform.microsoft.com 0.0.0.0 powerpoint.office.live.com 0.0.0.0 ppe.microsoft.com 0.0.0.0 pre.footprintpredict.com 0.0.0.0 premier.microsoft.com 0.0.0.0 premierdownload.microsoft.com 0.0.0.0 premieritaly.eteam.partners.extranet.microsoft.com 0.0.0.0 preview.data.tvdownload.microsoft.com 0.0.0.0 preview.info.music.metaservices.microsoft.com 0.0.0.0 preview.msn.com 0.0.0.0 preview.music.submissions.metaservices.microsoft.com 0.0.0.0 preview.services.wmdrm.windowsmedia.com 0.0.0.0 preview.serviceswitching.metadata.windowsmedia.com 0.0.0.0 preview.vcs.metaservices.microsoft.com 0.0.0.0 preview.video.metaservices.microsoft.com 0.0.0.0 preview.windows.com 0.0.0.0 previewa.locator.metadata.windowsmedia.com 0.0.0.0 previewa.movie.metadata.windowsmedia.com 0.0.0.0 pricelist.skype.com 0.0.0.0 privacy.microsoft.com 0.0.0.0 privatenews.microsoft.com 0.0.0.0 prodreg.microsoft.com 0.0.0.0 production.store-web.dynamics.com 0.0.0.0 products.office.com 0.0.0.0 productstudio.partners.extranet.microsoft.com 0.0.0.0 profile.live.com 0.0.0.0 profile.microsoft.com 0.0.0.0 profileppe.microsoft.com 0.0.0.0 profiletest2.microsoft.com 0.0.0.0 protect.microsoft.com 0.0.0.0 pti.store.microsoft.com 0.0.0.0 purchase.mp.microsoft.com 0.0.0.0 quarantine.messaging.microsoft.com 0.0.0.0 query.prod.cms.rt.microsoft.com 0.0.0.0 r.email.microsoft.com 0.0.0.0 r.office.microsoft.com 0.0.0.0 r.officeint.microsoft.com 0.0.0.0 r20swj13mr.microsoft.com 0.0.0.0 ra.microsoft.com 0.0.0.0 rad.live.com 0.0.0.0 rad.microsoft.com 0.0.0.0 rad.msn.com 0.0.0.0 ragnarok.msft.net 0.0.0.0 rbeta2.officebeta.microsoft.com 0.0.0.0 rdns1.msft.net 0.0.0.0 rdns2.msft.net 0.0.0.0 redir.metaservices.microsoft.com 0.0.0.0 redir.windows.microsoft.com 0.0.0.0 redir.windowsmedia.com 0.0.0.0 redmond3.download.microsoft.com 0.0.0.0 register.cdpcs.microsoft.com 0.0.0.0 register.microsoft.com 0.0.0.0 register.one.microsoft.com 0.0.0.0 registermsdn.one.microsoft.com 0.0.0.0 reply.microsoft.com 0.0.0.0 reports.membercenter.office.microsoft.com 0.0.0.0 reports.wes.df.telemetry.microsoft.com 0.0.0.0 resourcelink.mspress.microsoft.com 0.0.0.0 resources.whymicrosoft.com 0.0.0.0 retail.microsoft.com 0.0.0.0 ris.api.iris.microsoft.com 0.0.0.0 rmads.eu.msn.com 0.0.0.0 roadmap.dynamics.com 0.0.0.0 rrtytrutyhffsafdshgfi.azurewebsites.net 0.0.0.0 rs.update.microsoft.com 0.0.0.0 rs.windowsupdate.microsoft.com 0.0.0.0 rss.servicehealth.microsoftonline.com 0.0.0.0 rssgov.windows.microsoft.com 0.0.0.0 rtc.webresponse.one.microsoft.com 0.0.0.0 rto.microsoft.com 0.0.0.0 s.gateway.messenger.live.com 0.0.0.0 s.microsoft.com 0.0.0.0 s0.2mdn.net 0.0.0.0 s2s.config.skype.com 0.0.0.0 sO.2mdn.net 0.0.0.0 sa.windows.com 0.0.0.0 saservices.microsoft.com 0.0.0.0 sba.microsoft.com 0.0.0.0 sc.imp.live.com 0.0.0.0 schemas.microsoft.akadns.net 0.0.0.0 se.windows.com 0.0.0.0 search-ppe.microsoft.com 0.0.0.0 search.msn.com 0.0.0.0 search.officeupdate.microsoft.com 0.0.0.0 searchorigin4.microsoft.com 0.0.0.0 searchservice.support.microsoft.com 0.0.0.0 searchservice32.support.microsoft.com 0.0.0.0 secure.adnxs.com 0.0.0.0 secure.download.windowsupdate.com 0.0.0.0 secure.flashtalking.com 0.0.0.0 self.events.data.microsoft.com 0.0.0.0 service.weather.microsoft.com 0.0.0.0 services.apps.microsoft.com 0.0.0.0 services.learningbeta.microsoft.com 0.0.0.0 services.msn.com 0.0.0.0 services.social.microsoft.com 0.0.0.0 services.wes.df.telemetry.microsoft.com 0.0.0.0 services.windowsmedia.com 0.0.0.0 services.wmdrm.windowsmedia.com 0.0.0.0 services1.windowsmedia.com 0.0.0.0 serviceswitching.metadata.windowsmedia.com 0.0.0.0 serviceswitching.metaservices.microsoft.com 0.0.0.0 settings-sandbox.data.microsoft.com 0.0.0.0 settings-ssl.xboxlive.com 0.0.0.0 settings-win-ppe.data.microsoft.com 0.0.0.0 settings-win.data.microsoft.com 0.0.0.0 settings.data.glbdns2.microsoft.com 0.0.0.0 settings.data.microsoft.com 0.0.0.0 settings.messenger.live.com 0.0.0.0 sfdataservice.microsoft.com 0.0.0.0 sg2p.wns.windows.com 0.0.0.0 share.microsoft.com 0.0.0.0 sharepoint.microsoft.com 0.0.0.0 shell.windows.com 0.0.0.0 shopformusic.microsoft.com 0.0.0.0 signup.live.com 0.0.0.0 sipfed.microsoft.com 0.0.0.0 skydrive.live.com 0.0.0.0 skydrive.wns.windows.com 0.0.0.0 skydrivesync.policies.live.net 0.0.0.0 skypeecs-prod-usw-0-b.cloudapp.net 0.0.0.0 slg.msgamedev.com 0.0.0.0 sls.microsoft.com 0.0.0.0 sls.update.microsoft.com 0.0.0.0 sls.update.microsoft.com.akadns.net 0.0.0.0 slscr.update.microsoft.com 0.0.0.0 smallbusiness.support.microsoft.com 0.0.0.0 smartscreen-sn3p.smartscreen.microsoft.com 0.0.0.0 smtp.microsoft.com 0.0.0.0 sn3301-c.1drv.com 0.0.0.0 sn3301-e.1drv.com 0.0.0.0 sn3301-g.1drv.com 0.0.0.0 snackbox.microsoft.com 0.0.0.0 solutionfinder.microsoft.com 0.0.0.0 solutionfinderbeta.microsoft.com 0.0.0.0 solutionmarketplace.partners.extranet.microsoft.com 0.0.0.0 solutionprofiler.microsoft.com 0.0.0.0 solutionprofilerbeta.microsoft.com 0.0.0.0 spar.msteams.com 0.0.0.0 specserver.microsoft.com 0.0.0.0 spo-ring.msedge.net 0.0.0.0 spynet.microsoft.com 0.0.0.0 spynet2.microsoft.com 0.0.0.0 spynetalt.microsoft.com 0.0.0.0 spyneteurope.microsoft.akadns.net 0.0.0.0 sqm.df.telemetry.microsoft.com 0.0.0.0 sqm.microsoft.com 0.0.0.0 sqm.telemetry.microsoft.com 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net 0.0.0.0 sqmtest.microsoft.com 0.0.0.0 srd.ds.microsoft.com 0.0.0.0 ssl.bing.com 0.0.0.0 ssw.live.com 0.0.0.0 staging.services.wmdrm.windowsmedia.com 0.0.0.0 static.2mdn.net 0.0.0.0 statics-eas.onestore.ms 0.0.0.0 statics-eus.onestore.ms 0.0.0.0 statics-marketingsites-eus-ms-com.akamaized.net 0.0.0.0 statics-neu.onestore.ms 0.0.0.0 statics-uhf-eus.akamaized.net 0.0.0.0 statics-uhf-wus.akamaized.net 0.0.0.0 statics-wcus.onestore.ms 0.0.0.0 stats.microsoft.com 0.0.0.0 stats.update.microsoft.com 0.0.0.0 statsfe1.ws.microsoft.com 0.0.0.0 statsfe2.update.microsoft.com 0.0.0.0 statsfe2.update.microsoft.com.akadns.net 0.0.0.0 statsfe2.ws.microsoft.com 0.0.0.0 storage.live.com 0.0.0.0 store-images.microsoft.com 0.0.0.0 store-images.s-microsoft.com 0.0.0.0 store-web.dynamics.com 0.0.0.0 store.microsoft.com 0.0.0.0 storecatalogrevocation.storequality.microsoft.com 0.0.0.0 storeedgefd.dsx.mp.microsoft.com 0.0.0.0 stores.office.com 0.0.0.0 sts.microsoft.com 0.0.0.0 submissions.metaservices.microsoft.com 0.0.0.0 subscriptions.downloads.msdn.microsoft.com 0.0.0.0 subscriptions.downloads.technet.microsoft.com 0.0.0.0 support.office.com 0.0.0.0 support.ppe.microsoft.com 0.0.0.0 support.tie.microsoft.com 0.0.0.0 supportorigin3.microsoft.com 0.0.0.0 surface.microsoftstore.com 0.0.0.0 survey.watson.microsoft.com 0.0.0.0 svcs.microsoft.com 0.0.0.0 sxp.microsoft.com 0.0.0.0 sysdev.microsoft.com 0.0.0.0 systemcenter.pinpoint.microsoft.com 0.0.0.0 t.urs.microsoft.com 0.0.0.0 t0.ssl.ak.dynamic.tiles.virtualearth.net 0.0.0.0 t0.ssl.ak.tiles.virtualearth.net 0.0.0.0 tag.microsoft.com 0.0.0.0 target.microsoft.com 0.0.0.0 tele.trafficmanager.net 0.0.0.0 telecommand.telemetry.microsoft.com 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net 0.0.0.0 telemetry.appex.bing.net 0.0.0.0 telemetry.microsoft.com 0.0.0.0 telemetry.remoteapp.windowsazure.com 0.0.0.0 telemetry.urs.microsoft.com 0.0.0.0 telesales360.partners.extranet.microsoft.com 0.0.0.0 teredo.ipv6.microsoft.com 0.0.0.0 test.activity.windows.com 0.0.0.0 test.newsletters.microsoft.com 0.0.0.0 test.uddi.microsoft.com 0.0.0.0 test.update.microsoft.com 0.0.0.0 testservices.windowsmedia.com 0.0.0.0 tide004.microsoft.com 0.0.0.0 tide005.microsoft.com 0.0.0.0 tide134.microsoft.com 0.0.0.0 tide137.microsoft.com 0.0.0.0 tide143.microsoft.com 0.0.0.0 tide42.microsoft.com 0.0.0.0 tie.microsoft.com 0.0.0.0 tile-service.weather.microsoft.com 0.0.0.0 time.windows.com 0.0.0.0 tk.downloads.microsoft.com 0.0.0.0 tk2.plt.msn.com 0.0.0.0 tkbpnbip01.one.microsoft.com 0.0.0.0 tkxtbip01.one.microsoft.com 0.0.0.0 tkxtbip02.one.microsoft.com 0.0.0.0 tkxtbip03.one.microsoft.com 0.0.0.0 tkxtbip04.one.microsoft.com 0.0.0.0 tkxtbip05.one.microsoft.com 0.0.0.0 tkxtbip06.one.microsoft.com 0.0.0.0 tkxtbip07.one.microsoft.com 0.0.0.0 tlu.dl.delivery.mp.microsoft.com 0.0.0.0 to-do.microsoft.com 0.0.0.0 toc.music.metaservices.microsoft.com 0.0.0.0 training.partner.microsoft.com 0.0.0.0 training.retail.microsoft.com 0.0.0.0 transfer.microsoft.com 0.0.0.0 transfers.ds.microsoft.com 0.0.0.0 transfers.one.microsoft.com 0.0.0.0 trial.trymicrosoftoffice.com 0.0.0.0 tripoli.microsoft.com 0.0.0.0 trymicrosoftoffice.com 0.0.0.0 tsfe.trafficshaping.dsp.mp.microsoft.com 0.0.0.0 tv.metadata.windowsmedia.com 0.0.0.0 uat.mywindowsmobile.de 0.0.0.0 uat.startwindowsmobile.com 0.0.0.0 uatpremier.microsoft.com 0.0.0.0 uddi.microsoft.com 0.0.0.0 uddiv3.microsoft.com 0.0.0.0 uhf.microsoft.com 0.0.0.0 ui.skype.com 0.0.0.0 umwatsonc.events.data.microsoft.com 0.0.0.0 unitedstates.smartscreen-prod.microsoft.com 0.0.0.0 update.microsoft.com 0.0.0.0 urs.microsoft.com 0.0.0.0 urs.smartscreen.microsoft.com 0.0.0.0 us-v10.events.data.microsoft.com 0.0.0.0 us-v20.events.data.microsoft.com 0.0.0.0 us.configsvc1.live.com.akadns.net 0.0.0.0 us.vortex-win.data.microsoft.com 0.0.0.0 us1.trymicrosoftoffice.com 0.0.0.0 us20.trymicrosoftoffice.com 0.0.0.0 v10-win.vortex.data.microsoft.com.akadns.net 0.0.0.0 v10.events.data.microsoft.com 0.0.0.0 v10.vortex-win.data.microsoft.com 0.0.0.0 v10c.events.data.microsoft.com 0.0.0.0 v20.events.data.microsoft.com 0.0.0.0 v20.vortex-win.data.microsoft.com 0.0.0.0 v4-ori.windowsupdate.microsoft.com 0.0.0.0 v4.download.windowsupdate.com 0.0.0.0 v4.windowsupdate.microsoft.com 0.0.0.0 v5.windowsupdate.microsoft.com 0.0.0.0 v5stats.windowsupdate.microsoft.com 0.0.0.0 validation-v2.sls.microsoft.com 0.0.0.0 validation.sls.microsoft.com 0.0.0.0 vcs.metaservices.microsoft.com 0.0.0.0 version.hybrid.api.here.com 0.0.0.0 video.metaservices.microsoft.com 0.0.0.0 videoplayercdn.osi.office.net 0.0.0.0 view.atdmt.com 0.0.0.0 view.email.microsoftonline.com 0.0.0.0 view.officeapps.live.com 0.0.0.0 virtualchat.support.microsoft.com 0.0.0.0 vistatechbeta.microsoft.com 0.0.0.0 visualstudiogallery.msdn.microsoft.com 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net 0.0.0.0 vortex-sandbox.data.microsoft.com 0.0.0.0 vortex-win-sandbox.data.microsoft.com 0.0.0.0 vortex-win.data.microsoft.com 0.0.0.0 vortex.data.glbdns2.microsoft.com 0.0.0.0 vortex.data.microsoft.com 0.0.0.0 w.apprep.smartscreen.microsoft.com 0.0.0.0 wallet.microsoft.com 0.0.0.0 watson.live.com 0.0.0.0 watson.microsoft.com 0.0.0.0 watson.ppe.telemetry.microsoft.com 0.0.0.0 watson.telemetry.microsoft.com 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net 0.0.0.0 wb01.nz.partners.retail.microsoft.com 0.0.0.0 wb01.nz.xbox.partners.retail.microsoft.com 0.0.0.0 wb02.nz.partners.retail.microsoft.com 0.0.0.0 wb02.nz.xbox.partners.retail.microsoft.com 0.0.0.0 wbd.ms 0.0.0.0 wcpstatic.microsoft.com 0.0.0.0 wdcp.microsoft.com 0.0.0.0 wdcpalt.microsoft.com 0.0.0.0 web-ngram.research.microsoft.com 0.0.0.0 web.esd.microsoft.com 0.0.0.0 web.vortex.data.microsoft.com 0.0.0.0 webevents.microsoft.com 0.0.0.0 webfolders.metaservices.microsoft.com 0.0.0.0 webnews.microsoft.com 0.0.0.0 webresponse.one.microsoft.com 0.0.0.0 wer.microsoft.com 0.0.0.0 wes.df.telemetry.microsoft.com 0.0.0.0 wfp.microsoft.com 0.0.0.0 wfp.vistatechbeta.microsoft.com 0.0.0.0 whidbey.msdn.microsoft.com 0.0.0.0 whiteboard.microsoft.com 0.0.0.0 whiteboard.ms 0.0.0.0 win10-trt.msedge.net 0.0.0.0 win10.ipv6.microsoft.com 0.0.0.0 win1710.ipv6.microsoft.com 0.0.0.0 win8.ipv6.microsoft.com 0.0.0.0 windowsbetatest.rte.microsoft.com 0.0.0.0 windowslive.com 0.0.0.0 windowslive.es.msn.com 0.0.0.0 windowslive.jp.msn.com 0.0.0.0 windowslive.msn.com 0.0.0.0 windowslivegadgets.com 0.0.0.0 windowslivehelp.com 0.0.0.0 windowsmarketplace.com 0.0.0.0 windowsmedia.microsoft.com 0.0.0.0 windowsmedia1.com 0.0.0.0 windowsmediaguide.com 0.0.0.0 windowsonecare.com 0.0.0.0 windowsonecarelive.com 0.0.0.0 windowssdk.msdn.microsoft.com 0.0.0.0 windowsserverfeedback.com 0.0.0.0 windowsupdate.com 0.0.0.0 windowsupdate.microsoft.com 0.0.0.0 winfo.microsoft.com 0.0.0.0 winfx.msdn.microsoft.com 0.0.0.0 winqual.microsoft.com 0.0.0.0 winse.microsoft.com 0.0.0.0 wm.microsoft.com 0.0.0.0 wmdrm.windowsmedia.com 0.0.0.0 wns.windows.com 0.0.0.0 word.office.live.com 0.0.0.0 workspace.office.live.com 0.0.0.0 wpa.one.microsoft.com 0.0.0.0 ws.microsoft.com 0.0.0.0 ws03sp1.update.microsoft.com 0.0.0.0 wscont.apps.microsoft.com 0.0.0.0 wscont.apps.microsoft.com.edgesuite.net 0.0.0.0 wscont1.apps.microsoft.com 0.0.0.0 wscont2.apps.microsoft.com 0.0.0.0 wsus.ds.download.windowsupdate.com 0.0.0.0 wu-ori.microsoft.com 0.0.0.0 wustat.windows.com 0.0.0.0 wustats.microsoft.com 0.0.0.0 wutrack.windows.com 0.0.0.0 wwetrain.microsoft.com 0.0.0.0 wwevents.microsoft.com 0.0.0.0 wweventstest.one.microsoft.com 0.0.0.0 www.aka.ms 0.0.0.0 www.azure.com 0.0.0.0 www.azurewebsites.net 0.0.0.0 www.betaone.partners.extranet.microsoft.com 0.0.0.0 www.billing.microsoft.com 0.0.0.0 www.commerce.microsoft.com 0.0.0.0 www.domains.live.com 0.0.0.0 www.download.windowsupdate.com 0.0.0.0 www.email.microsoft.com 0.0.0.0 www.empresas.microsoft.com 0.0.0.0 www.eu.microsoft.com 0.0.0.0 www.favorites.live.com 0.0.0.0 www.go.microsoft.akadns.net 0.0.0.0 www.licencje-microsoft.pl 0.0.0.0 www.licencjemicrosoft.eu 0.0.0.0 www.live-int.com 0.0.0.0 www.mar.partners.extranet.microsoft.com 0.0.0.0 www.microsoft-certification.co.uk 0.0.0.0 www.microsoft-int.com 0.0.0.0 www.microsoft-office.fr 0.0.0.0 www.microsoftadvertising.com 0.0.0.0 www.microsoftbusinesshub.com 0.0.0.0 www.microsoftcloudpartner.com 0.0.0.0 www.microsoftelearning.com 0.0.0.0 www.microsoftfrontpage.com 0.0.0.0 www.microsoftlicense.com 0.0.0.0 www.microsoftoffice365now.com 0.0.0.0 www.microsoftonline.com 0.0.0.0 www.microsoftstore.com 0.0.0.0 www.microsoftstore.com.cn 0.0.0.0 www.microsoftstore.it 0.0.0.0 www.microsoftupdate.com 0.0.0.0 www.microsoftvolumelicensing.com 0.0.0.0 www.msedge.net 0.0.0.0 www.msevents.microsoft.com 0.0.0.0 www.msftconnecttest.com 0.0.0.0 www.msftncsi.com 0.0.0.0 www.msgamedev.com 0.0.0.0 www.mshome.net 0.0.0.0 www.msnusers.com 0.0.0.0 www.msus.windowsupdate.com 0.0.0.0 www.ntservicepack.microsoft.com 0.0.0.0 www.office.microsoft.com 0.0.0.0 www.office.net 0.0.0.0 www.officesas.microsoft.com 0.0.0.0 www.officeupdate.microsoft.com 0.0.0.0 www.onedrive.com 0.0.0.0 www.partners.extranet.microsoft.com 0.0.0.0 www.pmi.microsoft.com 0.0.0.0 www.store-web.dynamics.com 0.0.0.0 www.trymicrosoftoffice.com 0.0.0.0 www.update.microsoft.com 0.0.0.0 www.windowslive.com 0.0.0.0 www.windowslive.de 0.0.0.0 www.windowslive.fr 0.0.0.0 www.windowslive.nl 0.0.0.0 www.windowslivehelp.com 0.0.0.0 www.windowsmarketplace.com 0.0.0.0 www.windowsmedia.microsoft.com 0.0.0.0 www.windowsmedia1.com 0.0.0.0 www.windowsmediacenter.com 0.0.0.0 www.windowsonecare.com 0.0.0.0 www.windowsphone.live.com 0.0.0.0 www.windowssearch.com 0.0.0.0 www.windowsupdate.com 0.0.0.0 www.windowsupdate.microsoft.com 0.0.0.0 www.ws.microsoft.com 0.0.0.0 www.wustat.windows.com 0.0.0.0 www2.buyoffice.microsoft.com 0.0.0.0 www20.buyoffice.microsoft.com 0.0.0.0 www20.downloadoffice2010.microsoft.com 0.0.0.0 www7.buyoffice.microsoft.com 0.0.0.0 www7.downloadoffice2010.microsoft.com 0.0.0.0 wwwbeta.microsoft.com 0.0.0.0 wwwppe.microsoft.com 0.0.0.0 wxpsp2.windowsupdate.microsoft.com 0.0.0.0 x.urs.microsoft.com 0.0.0.0 xbox.microsoftstore.com 0.0.0.0 xbox.retail.microsoft.com 0.0.0.0 xml.login.live.com 0.0.0.0 xpsp1.microsoft.com 0.0.0.0 yannerwan8.spaces.live.com ------End cut & paste here------ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ |
@ECHO OFF IF NOT "%OS%"=="Windows_NT" GOTO END :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: @ MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10/2016 @ :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Must see 10_BLOCK.TXT (included) for guidelines! :: http://www.mdgx.com/10BLK/10_BLOCK.php :: Or: :: http://www.mdgx.com/10BLK/10_BLOCK.TXT COLOR 17 ECHO. ECHO. ECHO. Wait! This will take a while... ECHO. ECHO. :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Run all 10_BLOCK.* files (.CMD + .EXE) as Administrator: :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IF NOT EXIST "%TEMP%\10_BLOCK.CMD" GOTO ADMt %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%TEMP%\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%TEMP%\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 :ADMt IF NOT EXIST "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" GOTO ADMp %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%ProgramFiles%\AXCEL216\10_BLOCK\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 :ADMp IF NOT EXIST "%USERPROFILE%\Downloads\10_BLOCK.CMD" GOTO ADMu %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_SZ /d "RUNASADMIN" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\E10BLOK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\10_BLOCK.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STOP!DNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\STARTDNS.CMD" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVATE.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted" /v "%USERPROFILE%\Downloads\ELEVAT64.EXE" /t REG_DWORD /d 1 /f >NUL 2>&1 :ADMu :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Verify if logged on user is Administrator: :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: %windir%\SYSTEM32\openfiles.exe 1 >NUL 2>&1 :: IF NOT %errorlevel% equ 0 ( :: ECHO You are not logged in as Administrator! :: ECHO You MUST: Open Explorer -> right-click this file -> Run as Administrator. :: PAUSE :: EXIT 1 :: ) else ( SETLOCAL :: User Account Control (UAC) check + Auto-Elevate Permissions 2 Admin level :: Check for permissions... >NUL 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system" :: If error flag already set we do not have admin. :-( IF '%errorlevel%' NEQ '0' ( ECHO: ECHO Requesting Administrative Privileges... ECHO When UAC prompt opens press YES to Continue ECHO: GOTO UACPrompt ) else (GOTO gotAdmin) :UACPrompt ECHO SET UAC=CreateObject^("Shell.Application"^)>"%temp%\GetAdm!.vbs" ECHO UAC.ShellExecute "%~s0","","","runas",1>>"%temp%\GetAdm!.vbs" "%temp%\GetAdm!.vbs" EXIT /B :gotAdmin IF EXIST "%temp%\GetAdm!.vbs" (DEL "%temp%\GetAdm!.vbs") PUSHD "%CD%" CD /D "%~dp0" :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers": :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO NT0 IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO NT0 :: Disable Diagnostics Tracking (DiagTrack) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagtrack %windir%\SYSTEM32\SC.EXE config diagtrack START= disabled :: Disable Diagnostics Hub Standard Collector (diagnosticshub.standardcollector.service) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP diagnosticshub.standardcollector.service %windir%\SYSTEM32\SC.EXE config diagnosticshub.standardcollector.service START= disabled :: Disable WAP Push Message Routing (DmWAPPush) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP dmwappushservice %windir%\SYSTEM32\SC.EXE config dmwappushservice START= disabled :: Disable Retail Demo (RetailDemo) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RetailDemo %windir%\SYSTEM32\SC.EXE config RetailDemo START= disabled :: Disable Windows Event Collector (WECSvc) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP Wecsvc %windir%\SYSTEM32\SC.EXE CONFIG Wecsvc START= disabled :: Disable Remote Registry (RemoteRegistry) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP RemoteRegistry %windir%\SYSTEM32\SC.EXE CONFIG RemoteRegistry START= disabled :: Disable One Drive (OneSyncSvc) service: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP OneSyncSvc %windir%\SYSTEM32\SC.EXE CONFIG OneSyncSvc START= disabled %windir%\SYSTEM32\REG.EXE add"HKLM\SYSTEM\CurrentControlSet\Services\OneSyncSvc_Session1" /v "Start" /t REG_DWORD /d 4 /f >NUL 2>&1 :NT0 ECHO "" > %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl ECHO Y|%windir%\SYSTEM32\CACLS.EXE %ProgramData%\Microsoft\Diagnosis\ETLLogs\AutoLogger\AutoLogger-Diagtrack-Listener.etl /d SYSTEM %windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "AutoLogger-Diagtrack-Listener" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger" /v "SQMLogger" /f >NUL 2>&1 :: Disable automatic/pushed (without permission) installation + display of ads/suggested apps from Start menu: %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SilentInstalledAppsEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SystemPaneSuggestionsEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SoftLandingEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "RotatingLockScreenOverlayEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager" /v "SubscribedContent-310093Enabled" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Disable spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" policies: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v DontOfferThroughWUAU /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows" /v "CEIPEnable" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "AITEnable" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "DisableUAR" /t REG_DWORD /d 1 /f >NUL 2>&1 :: Disable WiFi Sense, AutoUpdate, Defender SpyNet, Office + Diagnostics logging + reporting: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseCredShared" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\WcmSvc\WifiNetworkManager" /v "WifiSenseOpen" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "AUOptions" /t REG_DWORD /d 2 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "IncludeRecommendedUpdates" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update" /v "EnableFeaturedSoftware" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SpyNetReporting" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\15.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableFileObfuscation" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Policies\Microsoft\Office\16.0\OSM" /v "EnableUpload" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\ScriptedDiagnosticsProvider\Policy" /v "EnableQueryRemoteServer" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance" /v "DisableDiagnosticTracing" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\Diagnostics\Performance" /v "Disable Performance Counters" /t REG_DWORD /d 1 /f >NUL 2>&1 :: Remove spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" folders from My PC: %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{088e3905-0323-4b02-9826-5d99428e115f}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{1CF1260C-4DD0-4ebb-811F-33C572699FDE}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{24ad3ad4-a569-4530-98e1-ab02f9417aa8}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{374DE290-123F-4565-9164-39C4925E467B}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{3dfdf296-dbec-4fb4-81d1-6a3438bcf4de}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A0953C92-50DC-43bf-BE83-3742FED03C9C}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{d3162b92-9365-467a-956b-92703aca08af}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{f86fa3ab-70d2-4fc7-9c99-fcbf05467f3a}" /f >NUL 2>&1 :: Disable Automatic Computer Maintenance tasks: :: http://www.winaero.com/blog/disable-computer-maintenance-windows-10/ %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\ScheduledDiagnostics" /v "EnabledExecution" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Disable Edge (Spartan) web browser ads: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxCacheTtl" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Services\DnsCache\Parameters" /v "MaxNegativeCacheTtl" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Enable Advanced Explorer View tweaks: %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "LaunchTo" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSuperHidden" /t REG_DWORD /d 1 /f >NUL 2>&1 :: Disable Advanced Explorer View automatic/pushed (without permission) of ads/suggested apps: %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSyncProviderNotifications" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Disable Windows Update P2P: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v "DODownloadMode" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Disable Cortana + Bing in Search: %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "CortanaConsent" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "AllowSearchToUseLocation" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Search" /v "BingSearchEnabled" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "ConnectedSearchUseWebOverMeteredConnections" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "DisableWebSearch" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "ConnectedSearchUseWeb" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "" /t REG_DWORD /d 0 /f >NUL 2>&1 :: Remove "Is Shortcut": %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "link" /t REG_BINARY /d 0 /f >NUL 2>&1 :: Explorer remove OneDrive icon: %windir%\SYSTEM32\REG.EXE ADD "HKCR\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCR\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /v "System.IsPinnedToNameSpaceTree" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL 2>&1 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Disable "Get Windows 10" (GWX) update + spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers" tasks: :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IF NOT EXIST %windir%\SYSTEM32\SCHTASKS.EXE GOTO SCH %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\AitAgent" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Autochk\Proxy" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Maintenance\WinSAT" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ActivateWindowsSearch" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ConfigureInternetTimeService" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\DispatchRecoveryTasks" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ehDRMInit" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\InstallPlayReady" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\mcupdate" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\MediaCenterRecoveryTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ObjectStoreRecoveryTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURActivate" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\OCURDiscovery" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscovery" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW1" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PBDADiscoveryW2" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrRecoveryTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\PvrScheduleTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\RegisterSearch" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\ReindexSearchRoot" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\SqlLiteRecoveryTask" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Media Center\UpdateRecordPath" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\launchtrayprocess" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfig" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\gwx\refreshgwxconfigandcontent" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Logon-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\MachineUnlock-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfIdle-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\OutOfSleep-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\refreshgwxconfig-B" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Telemetry-4xd" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Setup\GWXTriggers\Time-5d" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\PI\Sqm-Tasks" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem" /DISABLE %windir%\SYSTEM32\SCHTASKS.EXE /change /TN "\Microsoft\Windows\Windows Error Reporting\QueueReporting" /DISABLE :SCH :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Block Windows 8.1/10 Automatic (Forced) Upgrade > 1-1-2016: :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Gwx" /v "DisableGwx" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gwx.exe" /v "Debugger" /t REG_SZ /d "systray.exe" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "ElevateNonAdmins" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" /v "DisableOSUpgrade" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "AllowOSUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade" /v "ReservationsAllowed" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeState" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\OSUpgrade\State" /v "OSUpgradeStateTimeStamp" /t REG_SZ /d "2015-09-09 09:09:09" /f >NUL 2>&1 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: OPTIONAL: Disable Automatic (Forced) Windows Update (WUA) [NoAutoUpdate]: :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "AutoInstallMinorUpdates" /t REG_DWORD /d 0 /f >NUL 2>&1 :: %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAutoRebootWithLoggedOnUsers" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v "NoAUAsDefaultShutdownOption" /t REG_DWORD /d 1 /f >NUL 2>&1 :: %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoWindowsUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1 :: Disable reinstall (of undesired) Windows Updates + Drivers: %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "DontSearchWindowsUpdate" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\DriverSearching" /v "SearchOrderConfig" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Device Metadata" /v "PreventDeviceMetadataFromNetwork" /t REG_DWORD /d 1 /f >NUL 2>&1 :: @@@@@@@@@@@@@@@@@@@ :: Uninstall OneDrive: :: @@@@@@@@@@@@@@@@@@@ %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSync" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive" /v "DisableFileSyncNGSC" /t REG_DWORD /d 1 /f >NUL 2>&1 SET x86="%SYSTEMROOT%\System32\OneDriveSetup.exe" SET x64="%SYSTEMROOT%\SysWOW64\OneDriveSetup.exe" %windir%\SYSTEM32\TASKKILL.EXE /IM OneDrive.exe /T /F >NUL 2>&1 %windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL 2>&1 IF EXIST %x64% ( %x64% /uninstall ) else ( %x86% /uninstall ) %windir%\SYSTEM32\PING.EXE 127.0.0.1 -n 5 >NUL 2>&1 RD "%USERPROFILE%\OneDrive" /Q /S >NUL 2>&1 RD "C:\OneDriveTemp" /Q /S >NUL 2>&1 RD "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S >NUL 2>&1 RD "%ProgramData%\Microsoft OneDrive" /Q /S >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE delete "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}" /f >NUL 2>&1 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Internet Explorer (IE) 9/10/11 Block Tracking (Geolocation Detection) + Automatic (Forced) Upgrade: :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Internet Explorer\Geolocation" /v "BlockAllWebsites" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SOFTWARE\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "EnableAutoUpgrade" /t REG_DWORD /d 0 /f >NUL 2>&1 :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: OPTIONAL: DNS Client Service caches Domain Name System names (DNS Cache) which slows down processing of large HOSTS with many IPs: :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Open STOP!DNS.CMD + STARTDNS.CMD (included) in Notepad for details: :: http://www.mdgx.com/10BLK/10_BLOCK.ZIP :: More info: :: http://www.mdgx.com/hosts.php#N2 IF NOT EXIST %windir%\SYSTEM32\NET.EXE GOTO DN$ IF NOT EXIST %windir%\SYSTEM32\SC.EXE GOTO DN$ :: ECHO Y|%windir%\SYSTEM32\NET.EXE STOP DNSCache :: %windir%\SYSTEM32\SC.EXE CONFIG DNSCache START= disabled :DN$ :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Block Spyware, Tracking + Telemetry using Windows Firewall: :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IF NOT EXIST %windir%\SYSTEM32\NETSH.EXE GOTO NS0 %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_134.170.30.202" dir=out action=block remoteip=134.170.30.202 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_137.116.81.24" dir=out action=block remoteip=137.116.81.24 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_157.56.106.189" dir=out action=block remoteip=157.56.106.189 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_184.86.53.99" dir=out action=block remoteip=184.86.53.99 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.43" dir=out action=block remoteip=2.22.61.43 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_2.22.61.66" dir=out action=block remoteip=2.22.61.66 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.39.117.230" dir=out action=block remoteip=65.39.117.230 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_65.52.108.33" dir=out action=block remoteip=65.52.108.33 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_64.4.54.254" dir=out action=block remoteip=64.4.54.254 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex.data.microsoft.com" dir=out action=block remoteip=191.232.139.254 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telecommand.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.92 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.63 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.93 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_redir.metaservices.microsoft.com" dir=out action=block remoteip=194.44.4.200,194.44.4.208 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_choice.microsoft.com" dir=out action=block remoteip=157.56.91.77 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.93 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_services.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.92 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sqm.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.94 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.9 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.ppe.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.11 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.appex.bing.net" dir=out action=block remoteip=168.63.108.233 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_telemetry.urs.microsoft.com" dir=out action=block remoteip=157.56.74.250 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_settings-sandbox.data.microsoft.com" dir=out action=block remoteip=111.221.29.177 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_survey.watson.microsoft.com" dir=out action=block remoteip=207.68.166.254 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.live.com" dir=out action=block remoteip=207.46.223.94 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_watson.microsoft.com" dir=out action=block remoteip=65.55.252.71 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.ws.microsoft.com" dir=out action=block remoteip=64.4.54.22 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corpext.msitadfs.glbdns2.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_compatexchange.cloudapp.net" dir=out action=block remoteip=23.99.10.11 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a-0001.a-msedge.net" dir=out action=block remoteip=204.79.197.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=64.4.54.22 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_sls.update.microsoft.com.akadns.net" dir=out action=block remoteip=157.56.77.139 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_fe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=134.170.58.121,134.170.58.123,134.170.53.29,66.119.144.190,134.170.58.189,134.170.58.118,134.170.53.30,134.170.51.190 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_diagnostics.support.microsoft.com" dir=out action=block remoteip=157.56.121.89 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_corp.sts.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.windows.com" dir=out action=block remoteip=134.170.185.70 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.microsoft-hohm.com" dir=out action=block remoteip=64.4.6.100,65.55.39.10 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_feedback.search.microsoft.com" dir=out action=block remoteip=157.55.129.21 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_rad.msn.com" dir=out action=block remoteip=207.46.194.25 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_preview.msn.com" dir=out action=block remoteip=23.102.21.4 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_dart.l.doubleclick.net" dir=out action=block remoteip=173.194.113.220,173.194.113.219,216.58.209.166 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ads.msn.com" dir=out action=block remoteip=157.56.91.82,157.56.23.91,104.82.14.146,207.123.56.252,185.13.160.61,8.254.209.254 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a.ads1.msn.com" dir=out action=block remoteip=198.78.208.254,185.13.160.61 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_global.msads.net.c.footprint.net" dir=out action=block remoteip=185.13.160.61,8.254.209.254,207.123.56.252 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_az361816.vo.msecnd.net" dir=out action=block remoteip=68.232.34.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com.nsatc.net" dir=out action=block remoteip=65.55.252.63 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_ssw.live.com" dir=out action=block remoteip=207.46.101.29 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_msnbot-65-55-108-23.search.msn.com" dir=out action=block remoteip=65.55.108.23 enable=yes %windir%\SYSTEM32\NETSH.EXE advfirewall firewall add rule name="telemetry_a23-218-212-69.deploy.static.akamaitechnologies.com" dir=out action=block remoteip=23.218.212.69 enable=yes :NS0 :: @@@@@@@@@@@@@@ :: NTFS Long Path :: @@@@@@@@@@@@@@ :: Enable NTFS long path (> 260 characters) option: :: http://www.superuser.com/questions/1119883/ :: http://www.howtogeek.com/266621/ :: http://www.winaero.com/blog/how-to-enable-ntfs-long-paths-in-windows-10/ :: NFR 4.6.2 and long paths in Windows 10: :: http://blogs.msdn.microsoft.com/jeremykuhne/2016/07/30/net-4-6-2-and-long-paths-on-windows-10/ %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Policies" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKLM\SYSTEM\CurrentControlSet\Control\FileSystem" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1 %windir%\SYSTEM32\REG.EXE ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{48981759-12F2-42A6-A048-028B3973495F}Machine\System\CurrentControlSet\Policies" /v "LongPathsEnabled" /t REG_DWORD /d 1 /f >NUL 2>&1 :: @@@@@ :: HOSTS :: @@@@@ :: If 0.0.0.0 redirects do not work properly on your computer(s) you can substitute all null strings below with default localhost: :: 127.0.0.1 :: BONUS: :: List below contains all known Microsoft servers one may wish to disable, but some will deactivate :: Windows Update (WU) and/or other Microsoft programs/features/services/etc you may need or care about. :: View your specific programs/features/services/etc documentation to learn how to allow/enable/use them properly. :: Use with CAUTION! :: Open 10_BLOCK.TXT (included) in Notepad for details: :: http://www.mdgx.com/10BLK/10_BLOCK.php IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\TAKEOWN.EXE /f "%windir%\SYSTEM32\DRIVERS\ETC" /r /d y >NUL 2>&1 IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ICACLS.EXE "%windir%\SYSTEM32\DRIVERS\ETC" /grant:r %UserName%:F Administrators:F SYSTEM:F "Authenticated Users":F /t /c /q >NUL 2>&1 IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /D /S -A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL 2>&1 IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /S +A -H -R -S -I "%windir%\SYSTEM32\DRIVERS\ETC\*.*" >NUL 2>&1 IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\TAKEOWN.EXE /f "%windir%\SysWOW64\DRIVERS\ETC" /r /d y >NUL 2>&1 IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ICACLS.EXE "%windir%\SysWOW64\DRIVERS\ETC" /grant:r %UserName%:F Administrators:F SYSTEM:F "Authenticated Users":F /t /c /q >NUL 2>&1 IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /D /S -A -H -R -S -I "%windir%\SysWOW64\DRIVERS\ETC\*.*" >NUL 2>&1 IF EXIST "%windir%\SysWOW64\DRIVERS\ETC" %windir%\SYSTEM32\ATTRIB.EXE /S +A -H -R -S -I "%windir%\SysWOW64\DRIVERS\ETC\*.*" >NUL 2>&1 IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS.ORI" GOTO NXT IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" COPY /Y "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" HOSTS.ORI IF EXIST "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" DEL /F /Q "%windir%\SYSTEM32\DRIVERS\ETC\HOSTS" IF EXIST "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" COPY /Y "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" HOSTS.ORI IF EXIST "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" DEL /F /Q "%windir%\SysWOW64\DRIVERS\ETC\HOSTS" :NXT IF EXIST %windir%\SYSTEM32\DRIVERS\ETC\HOSTS GOTO HOST1 ECHO # @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # MDGx Win10 Block Tools (10_BLOCK) for Windows 7/7 SP1/8/8.1/2012/10>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # THIS FILE IS OBSOLETE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # All necessary tasks are executed by running E10BLOK.CMD (included)!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Must see 10_BLOCK.TXT (included) for guidelines!>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/10BLK/10_BLOCK.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Or:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/10BLK/10_BLOCK.TXT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # MDGx HOSTS (plain text/ASCII file):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Used in TCP/IP for mapping IP addresses (1st column) to corresponding host names (2nd column):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://en.wikipedia.org/wiki/Hosts_(file)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Each entry must be on a separate line. Columns must be separated by at least 1 space or tab.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # All lines starting with # are comments/remarks and are not processed.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # DNS itself handles localhost name resolution.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Next lines MUST be listed FIRST in this EXACT order [IPv4 (1st) + IPv6 (2nd)]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 127.0.0.1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 127.0.0.1 localhost.localdomain>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 255.255.255.255 broadcasthost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 127.0.0.1 local>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://en.wikipedia.org/wiki/Localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Next lines recommended for IPv6 protocol:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO fe80::1 localhost>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO fe00::0 ip6-localnet>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ff00::0 ip6-mcastprefix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ff02::1 ip6-allnodes>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ff02::2 ip6-allrouters>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO ff02::3 ip6-allhosts>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://en.wikipedia.org/wiki/Multicast_address>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # ENABLE/DISABLE:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # All servers below are disabled = redirected to 0.0.0.0 (null).>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # To (re)enable: comment/remark (precede with #) or delete desired line(s) below.>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Add these 0.0.0.0 (redirected to null) IPs to your %%windir%%\SYSTEM32\DRIVERS\ETC\HOSTS file:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.pastebin.com/gebp8edd>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Edit HOSTS in Windows 7/8/8.1/10:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.petri.com/easily-edit-hosts-file-windows-10/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.petri.com/edit-hosts-file-windows-8/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.petri.com/edit-hosts-file-windows-7/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # MDGx HOSTS Guide + Tools:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/hosts.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Take Ownership of files + folders right-click Explorer option:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # MDGx Tweaked + Customized File Manager (FM) installs a better Take Ownership tool (FixNT6) to the right-click Explorer menus:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/xptoy.htm#FMNT>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # FM ReadMe Guide:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/fmnt32/fmnt32.php>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # FM [2.2 MB, free]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.mdgx.com/fmnt32/FMNT32.EXE>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # FixNT6 Take Ownership tool (freeware):>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.jsware.net/jsware/nt6fix.php5#restfix>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # FixNT6 [36 KB, freeware]:>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # http://www.jsware.net/jsware/zips/fix6r.zip>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # Lines below disable Windows 8/8.1/10 spyware: telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers":>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0001.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0002.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0003.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0004.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0005.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0006.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0007.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0008.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a-0009.a-msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a.ads2.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 a.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ac3.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ad.doubleclick.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ads1.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 adnexus.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 aidps.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 aka-cdn-ns.adtech.de>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 apps.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 az361816.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 az512334.vo.msecnd.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 b.ads1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 b.ads2.msads.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 b.rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 bs.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 c.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 c.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cdn.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cds26.ams9.msecn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 choice.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 choice.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 compatexchange.cloudapp.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cs1.wpc.v0cdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 cdp1.public-trust.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 corp.sts.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 db3aqu.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 diagnostics.support.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 e2835.dspb.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 e8218.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 e7341.g.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 e7502.ce.akamaiedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ec.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 feedback.windows.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 feedback.microsoft-hohm.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 feedback.search.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 fe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 fe2.ws.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 flex.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 g.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 h1.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 hostedocsp.globalsign.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 i1.services.social.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 i1.services.social.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 li581-132.members.linode.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 lb1.www.ms.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 live.rads.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 m.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 m.hotmail.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 msedge.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 msnbot-65-55-108-23.search.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 msntest.serving-sys.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 oca.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 pre.footprintpredict.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 preview.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 pricelist.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 rad.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 rad.msn.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 redir.metaservices.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 reports.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 s.gateway.messenger.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 schemas.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 secure.adnxs.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 secure.flashtalking.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 services.wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 settings-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 settings-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sls.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sO.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sqm.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sqm.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 static.2mdn.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 statsfe2.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 statsfe1.ws.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 statsfe2.update.microsoft.com.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 survey.watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telecommand.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telemetry.appex.bing.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telemetry.appex.bing.net:443>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telemetry.urs.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 ui.skype.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 view.atdmt.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex-win.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 vortex-sandbox.data.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 wes.df.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.ppe.telemetry.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.live.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 watson.microsoft.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 www.go.microsoft.akadns.net>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO 0.0.0.0 www.msftncsi.com>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS ECHO # @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS :HOST1 SET NEWLINE=.^& ECHO %windir%\SYSTEM32\FIND.EXE /C /I "a-0001.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0001.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0002.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0002.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0003.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0003.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0004.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0004.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0005.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0005.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0006.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0006.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0007.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0007.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0008.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0008.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a-0009.a-msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a-0009.a-msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "a.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 a.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ac3.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ac3.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ad.doubleclick.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ad.doubleclick.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ads1.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ads1.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "adnexus.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnexus.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "aidps.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aidps.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "aka-cdn-ns.adtech.de" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 aka-cdn-ns.adtech.de)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "apps.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 apps.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "az361816.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az361816.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "az512334.vo.msecnd.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 az512334.vo.msecnd.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "b.ads1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "b.ads2.msads.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.ads2.msads.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "b.rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 b.rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "bs.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 bs.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "c.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "c.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 c.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cdn.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdn.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cds26.ams9.msecn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cds26.ams9.msecn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "choice.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 choice.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "compatexchange.cloudapp.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 compatexchange.cloudapp.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "corpext.msitadfs.glbdns2.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cdnjs.cloudflare.com.cdn.cloudflare.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdnjs.cloudflare.com.cdn.cloudflare.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cs1.wpc.v0cdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cs1.wpc.v0cdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "cdp1.public-trust.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 cdp1.public-trust.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "corp.sts.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 corp.sts.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "db3aqu.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 db3aqu.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "diagnostics.support.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 diagnostics.support.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "e2835.dspb.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e2835.dspb.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "e8218.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e8218.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "e7341.g.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7341.g.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "e7502.ce.akamaiedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 e7502.ce.akamaiedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ec.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ec.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "feedback.windows.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.windows.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "feedback.microsoft-hohm.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.microsoft-hohm.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "feedback.search.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 feedback.search.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "fe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "fe2.ws.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 fe2.ws.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "flex.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 flex.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "g.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 g.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "h1.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 h1.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "hostedocsp.globalsign.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 hostedocsp.globalsign.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "i1.services.social.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 i1.services.social.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "li581-132.members.linode.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 li581-132.members.linode.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "lb1.www.ms.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 lb1.www.ms.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "live.rads.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 live.rads.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "m.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "m.hotmail.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 m.hotmail.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "msedge.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msedge.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "msnbot-65-55-108-23.search.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msnbot-65-55-108-23.search.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "msntest.serving-sys.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 msntest.serving-sys.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "oca.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "pre.footprintpredict.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pre.footprintpredict.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "preview.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 preview.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "pricelist.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 pricelist.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "rad.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "rad.msn.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 rad.msn.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "redir.metaservices.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 redir.metaservices.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "reports.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 reports.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "s.gateway.messenger.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 s.gateway.messenger.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "schemas.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 schemas.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "secure.adnxs.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.adnxs.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "secure.flashtalking.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 secure.flashtalking.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "services.wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 services.wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "settings-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "settings-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 settings-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sls.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sls.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sO.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sO.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sqm.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "sqm.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "static.2mdn.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 static.2mdn.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "statsfe1.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe1.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.ws.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.ws.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "statsfe2.update.microsoft.com.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 statsfe2.update.microsoft.com.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "survey.watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 survey.watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telecommand.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telemetry.appex.bing.net:443" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.appex.bing.net:443)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telemetry.urs.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.urs.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "ui.skype.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 ui.skype.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "view.atdmt.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 view.atdmt.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex-bn2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex-cy2.metron.live.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex-win.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-win.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "vortex-sandbox.data.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 vortex-sandbox.data.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.telemetry.microsoft.com.nsatc.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "wes.df.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 wes.df.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.ppe.telemetry.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.ppe.telemetry.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.live.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.live.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "watson.microsoft.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 watson.microsoft.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "www.go.microsoft.akadns.net" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.go.microsoft.akadns.net)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS %windir%\SYSTEM32\FIND.EXE /C /I "www.msftncsi.com" %windir%\SYSTEM32\DRIVERS\ETC\HOSTS >NUL 2>&1 IF %ERRORLEVEL% NEQ 0 (ECHO%NEWLINE% 0.0.0.0 www.msftncsi.com)>>%windir%\SYSTEM32\DRIVERS\ETC\HOSTS :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Stop + Uninstall Get Windows 10 (GWX), unwanted mandatory updates + spyware: :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :: Stop + Uninstall Get Windows 10 (GWX), spyware, telemetry ("phone home"), data collection/logging, customer experience + unwanted "offers": %windir%\SYSTEM32\TASKKILL.EXE /IM GWX.exe /T /F >NUL 2>&1 %windir%\SYSTEM32\TASKKILL.EXE /IM GWXUXWorker.exe /T /F >NUL 2>&1 %windir%\SYSTEM32\TASKKILL.EXE /IM GWXConfigManager.exe /T /F >NUL 2>&1 %windir%\SYSTEM32\TASKKILL.EXE /IM consent.exe /T /F >NUL 2>&1 :: Stop customer experience + cortana search: %windir%\SYSTEM32\TAKEOWN.EXE /f "%WinDir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" /r /d y %windir%\SYSTEM32\ICACLS.EXE "%WinDir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" /grant:r Administrators:F /t /c /q %windir%\SYSTEM32\TASKKILL.EXE /IM ShellExperienceHost.exe /T /F >NUL 2>&1 MOVE /Y "%windir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy" "%windir%\SystemApps\ShellExperienceHost_cw5n1h2txyewy.000" %windir%\SYSTEM32\TAKEOWN.EXE /f "%WinDir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" /r /d y %windir%\SYSTEM32\ICACLS.EXE "%WinDir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" /grant:r Administrators:F /t /c /q %windir%\SYSTEM32\TASKKILL.EXE /IM SearchUI.exe /T /F >NUL 2>&1 MOVE /Y "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy.000" IF NOT EXIST %windir%\SYSTEM32\WUSA.EXE GOTO END :: KB971033: Windows Activation Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:971033 /quiet /norestart >NUL 2>&1 :: KB2952664: Get Windows 10 (GWX) Assistant: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2952664 /quiet /norestart >NUL 2>&1 :: KB2990214: Get Windows 10 (GWX): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2990214 /quiet /norestart >NUL 2>&1 :: KB3012973: Upgrade to Windows 10 Pro: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3012973 /quiet /norestart >NUL 2>&1 :: KB3021917: Performance Improvements Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3021917 /quiet /norestart >NUL 2>&1 :: KB3022345: Customer Experience and Diagnostic Telemetry Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3022345 /quiet /norestart >NUL 2>&1 :: KB3035583: Get Windows 10 (GWX) App: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3035583 /quiet /norestart >NUL 2>&1 :: KB3044374: Get Windows 10 (GWX) Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3044374 /quiet /norestart >NUL 2>&1 :: KB3068708: Customer Experience and Diagnostic Telemetry Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3068708 /quiet /norestart >NUL 2>&1 :: KB3075249: Telemetry Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075249 /quiet /norestart >NUL 2>&1 :: KB3080149: Customer Experience and Diagnostic Telemetry Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3080149 /quiet /norestart >NUL 2>&1 :: KB3112343: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3112343 /quiet /norestart >NUL 2>&1 :: KB3083711: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083711 /quiet /norestart >NUL 2>&1 :: KB3083325: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3083325 /quiet /norestart >NUL 2>&1 :: KB3075853: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3075853 /quiet /norestart >NUL 2>&1 :: KB3072318: OOBE Update to upgrade to Windows 10: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3072318 /quiet /norestart >NUL 2>&1 :: KB3065988: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3065988 /quiet /norestart >NUL 2>&1 :: KB3064683: OOBE Update to upgrade to Windows 10: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3064683 /quiet /norestart >NUL 2>&1 :: KB3058168: Activate Windows 10 from Hosts Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3058168 /quiet /norestart >NUL 2>&1 :: KB3050267: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3050267 /quiet /norestart >NUL 2>&1 :: KB2976978: Compatibility Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2976978 /quiet /norestart >NUL 2>&1 :: KB2977759: Compatibility Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:2977759 /quiet /norestart >NUL 2>&1 :: KB3081954: Work Folders Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3081954 /quiet /norestart >NUL 2>&1 :: KB3123862: Upgrade Capability Update: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3123862 /quiet /norestart >NUL 2>&1 :: KB3138612: Windows Update Client (WUC): START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3138612 /quiet /norestart >NUL 2>&1 :: KB3172605: July 2016 Update Rollup: START "Uninstalling..." /B /WAIT %windir%\SYSTEM32\WUSA.EXE /uninstall /KB:3172605 /quiet /norestart >NUL 2>&1 TIMEOUT /T 5 /NOBREAK :: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ :END :: EXIT |
![]() |
---|