I did have problems with certain Web site's with 11. The last time I ran the batch file I did install 10 and have had no problems yet but also I have shut off all updates for now. I have lost all faith in M$. You might trust them but some of the things they have done these last few months leaves a bad taste in my mouth.
-
toughasnails Toughbook Moderator Moderator
-
Spartan@HIDevolution Company Representative
Ethrem and toughasnails like this. -
toughasnails Toughbook Moderator Moderator
Papusan and Spartan@HIDevolution like this. -
I can't seem to find a way to contact the author of GWX Control Panel...if I right click the icon and go to Digital Signatures under Properties, then select the signature which is correct and click details, aside fr0m what he says should be there (and nothing else), there is a countersignature COMODO Time Stamp for Wednesday Nov. 25...does that mean the author has COMODO on his computer and forgot to mention that a reference to it would show up when one followed his instructions to check the integrity of the downloaded file? I did download the file directly from the Ultimate Outsider website.
-
There is a Contacting the Author section at the bottom of his Blog.
Downloads page, click on the Blog tab at the top:
http://ultimateoutsider.com/downloads/
Blog, scroll all the way to the bottom to the Contacting the Author section:
http://blog.ultimateoutsider.com/
Comodo is a service for getting certificates, here is their page for Code signing:
Benefits of Comodo Code Signing Certificates
https://www.comodo.com/business-security/code-signing-certificates/code-signing.php
Video about Code signing certificates
https://www.comodo.com/includes/video.php?f=http://download.comodo.com/comodovision/G22/g22_code_sign_cert.flv&title=Comodo Code Signing Certificate
Comodo are legit, I have used them at a number of client sites over the years.Last edited: Dec 28, 2015stringbuzzzzzz likes this. -
I'll assume Comodo countersignature belongs there.
hmscott likes this. -
Gwx control panel is running. All is good. Now what does DWS do if all the info on Gwx control panel is no, there remain no windows 10 download folders, and the monitor is enabled and running?
-
Click on the "Spoiler" button.
[INFO] Latest version number: 716
[INFO] Add to hosts - statsfe2.update.microsoft.com.akadns.net
[INFO] Add to hosts - fe2.update.microsoft.com.akadns.net
[INFO] Add to hosts - s0.2mdn.net
[INFO] Add to hosts - survey.watson.microsoft.com
[INFO] Add to hosts - view.atdmt.com
[INFO] Add to hosts - watson.microsoft.com
[INFO] Add to hosts - watson.ppe.telemetry.microsoft.com
[INFO] Add to hosts - vortex.data.microsoft.com
[INFO] Add to hosts - vortex-win.data.microsoft.com
[INFO] Add to hosts - telecommand.telemetry.microsoft.com
[INFO] Add to hosts - telecommand.telemetry.microsoft.com.nsatc.net
[INFO] Add to hosts - oca.telemetry.microsoft.com
[INFO] Add to hosts - sqm.telemetry.microsoft.com
[INFO] Add to hosts - sqm.telemetry.microsoft.com.nsatc.net
[INFO] Add to hosts - watson.telemetry.microsoft.com
[INFO] Add to hosts - watson.telemetry.microsoft.com.nsatc.net
[INFO] Add to hosts - redir.metaservices.microsoft.com
[INFO] Add to hosts - choice.microsoft.com
[INFO] Add to hosts - choice.microsoft.com.nsatc.net
[INFO] Add to hosts - wes.df.telemetry.microsoft.com
[INFO] Add to hosts - services.wes.df.telemetry.microsoft.com
[INFO] Add to hosts - sqm.df.telemetry.microsoft.com
[INFO] Add to hosts - telemetry.microsoft.com
[INFO] Add to hosts - telemetry.appex.bing.net
[INFO] Add to hosts - telemetry.urs.microsoft.com
[INFO] Add to hosts - settings-sandbox.data.microsoft.com
[INFO] Add to hosts - watson.live.com
[INFO] Add to hosts - statsfe2.ws.microsoft.com
[INFO] Add to hosts - corpext.msitadfs.glbdns2.microsoft.com
[INFO] Add to hosts - compatexchange.cloudapp.net
[INFO] Add to hosts - a-0001.a-msedge.net
[INFO] Add to hosts - sls.update.microsoft.com.akadns.net
[INFO] Add to hosts - diagnostics.support.microsoft.com
[INFO] Add to hosts - corp.sts.microsoft.com
[INFO] Add to hosts - statsfe1.ws.microsoft.com
[INFO] Add to hosts - feedback.windows.com
[INFO] Add to hosts - feedback.microsoft-hohm.com
[INFO] Add to hosts - feedback.search.microsoft.com
[INFO] Add to hosts - rad.msn.com
[INFO] Add to hosts - preview.msn.com
[INFO] Add to hosts - ad.doubleclick.net
[INFO] Add to hosts - ads.msn.com
[INFO] Add to hosts - ads1.msads.net
[INFO] Add to hosts - ads1.msn.com
[INFO] Add to hosts - a.ads1.msn.com
[INFO] Add to hosts - a.ads2.msn.com
[INFO] Add to hosts - adnexus.net
[INFO] Add to hosts - adnxs.com
[INFO] Add to hosts - az361816.vo.msecnd.net
[INFO] Add to hosts - az512334.vo.msecnd.net
[INFO] Add to hosts - ssw.live.com
[INFO] Add to hosts - ca.telemetry.microsoft.com
[INFO] Add to hosts - i1.services.social.microsoft.com
[INFO] Add to hosts - i1.services.social.microsoft.com.nsatc.net
[INFO] Add to hosts - df.telemetry.microsoft.com
[INFO] Add to hosts - reports.wes.df.telemetry.microsoft.com
[INFO] Add to hosts - cs1.wpc.v0cdn.net
[INFO] Add to hosts - vortex-sandbox.data.microsoft.com
[INFO] Add to hosts - oca.telemetry.microsoft.com.nsatc.net
[INFO] Add to hosts - pre.footprintpredict.com
[INFO] Add to hosts - spynet2.microsoft.com
[INFO] Add to hosts - spynetalt.microsoft.com
[INFO] Add to hosts - fe3.delivery.dsp.mp.microsoft.com.nsatc.net
[INFO] Add to hosts - cache.datamart.windows.com
[INFO] Add to hosts - db3wns2011111.wns.windows.com
[INFO] Add to hosts - settings-win.data.microsoft.com
[INFO] Add to hosts - v10.vortex-win.data.microsoft.com
[INFO] Add to hosts - win10.ipv6.microsoft.com
[INFO] Add to hosts - ca.telemetry.microsoft.com
[INFO] Add to hosts - i1.services.social.microsoft.com.nsatc.net
[INFO] Add hosts MS complete.
[INFO] Add Windows Firewall rule: "104.96.147.3_Block"
[INFO] Add Windows Firewall rule: "111.221.29.177_Block"
[INFO] Add Windows Firewall rule: "111.221.29.253_Block"
[INFO] Add Windows Firewall rule: "111.221.64.0-111.221.127.255_Block"
[INFO] Add Windows Firewall rule: "131.253.40.37_Block"
[INFO] Add Windows Firewall rule: "134.170.115.60_Block"
[INFO] Add Windows Firewall rule: "134.170.165.248_Block"
[INFO] Add Windows Firewall rule: "134.170.165.253_Block"
[INFO] Add Windows Firewall rule: "134.170.185.70_Block"
[INFO] Add Windows Firewall rule: "134.170.30.202_Block"
[INFO] Add Windows Firewall rule: "137.116.81.24_Block"
[INFO] Add Windows Firewall rule: "137.117.235.16_Block"
[INFO] Add Windows Firewall rule: "157.55.129.21_Block"
[INFO] Add Windows Firewall rule: "157.55.130.0-157.55.130.255_Block"
[INFO] Add Windows Firewall rule: "157.55.133.204_Block"
[INFO] Add Windows Firewall rule: "157.55.235.0-157.55.235.255_Block"
[INFO] Add Windows Firewall rule: "157.55.236.0-157.55.236.255_Block"
[INFO] Add Windows Firewall rule: "157.55.52.0-157.55.52.255_Block"
[INFO] Add Windows Firewall rule: "157.55.56.0-157.55.56.255_Block"
[INFO] Add Windows Firewall rule: "157.56.106.189_Block"
[INFO] Add Windows Firewall rule: "157.56.121.89_Block"
[INFO] Add Windows Firewall rule: "157.56.124.87_Block"
[INFO] Add Windows Firewall rule: "157.56.91.77_Block"
[INFO] Add Windows Firewall rule: "168.63.108.233_Block"
[INFO] Add Windows Firewall rule: "191.232.139.2_Block"
[INFO] Add Windows Firewall rule: "191.232.139.254_Block"
[INFO] Add Windows Firewall rule: "191.232.80.58_Block"
[INFO] Add Windows Firewall rule: "191.232.80.62_Block"
[INFO] Add Windows Firewall rule: "191.237.208.126_Block"
[INFO] Add Windows Firewall rule: "195.138.255.0-195.138.255.255_Block"
[INFO] Add Windows Firewall rule: "2.22.61.43_Block"
[INFO] Add Windows Firewall rule: "2.22.61.66_Block"
[INFO] Add Windows Firewall rule: "204.79.197.200_Block"
[INFO] Add Windows Firewall rule: "207.46.101.29_Block"
[INFO] Add Windows Firewall rule: "207.46.114.58_Block"
[INFO] Add Windows Firewall rule: "207.46.223.94_Block"
[INFO] Add Windows Firewall rule: "207.68.166.254_Block"
[INFO] Add Windows Firewall rule: "212.30.134.204_Block"
[INFO] Add Windows Firewall rule: "212.30.134.205_Block"
[INFO] Add Windows Firewall rule: "213.199.179.0-213.199.179.255_Block"
[INFO] Add Windows Firewall rule: "23.102.21.4_Block"
[INFO] Add Windows Firewall rule: "23.218.212.69_Block"
[INFO] Add Windows Firewall rule: "23.223.20.82_Block"
[INFO] Add Windows Firewall rule: "23.57.101.163_Block"
[INFO] Add Windows Firewall rule: "23.57.107.163_Block"
[INFO] Add Windows Firewall rule: "23.57.107.27_Block"
[INFO] Add Windows Firewall rule: "23.99.10.11_Block"
[INFO] Add Windows Firewall rule: "64.4.23.0-64.4.23.255_Block"
[INFO] Add Windows Firewall rule: "64.4.54.22_Block"
[INFO] Add Windows Firewall rule: "64.4.54.32_Block"
[INFO] Add Windows Firewall rule: "64.4.6.100_Block"
[INFO] Add Windows Firewall rule: "65.39.117.230_Block"
[INFO] Add Windows Firewall rule: "65.39.117.230_Block"
[INFO] Add Windows Firewall rule: "65.52.100.11_Block"
[INFO] Add Windows Firewall rule: "65.52.100.7_Block"
[INFO] Add Windows Firewall rule: "65.52.100.9_Block"
[INFO] Add Windows Firewall rule: "65.52.100.91_Block"
[INFO] Add Windows Firewall rule: "65.52.100.92_Block"
[INFO] Add Windows Firewall rule: "65.52.100.93_Block"
[INFO] Add Windows Firewall rule: "65.52.100.94_Block"
[INFO] Add Windows Firewall rule: "65.52.108.29_Block"
[INFO] Add Windows Firewall rule: "65.52.108.33_Block"
[INFO] Add Windows Firewall rule: "65.55.108.23_Block"
[INFO] Add Windows Firewall rule: "65.55.138.114_Block"
[INFO] Add Windows Firewall rule: "65.55.138.126_Block"
[INFO] Add Windows Firewall rule: "65.55.138.186_Block"
[INFO] Add Windows Firewall rule: "65.55.223.0-65.55.223.255_Block"
[INFO] Add Windows Firewall rule: "65.55.252.63_Block"
[INFO] Add Windows Firewall rule: "65.55.252.71_Block"
[INFO] Add Windows Firewall rule: "65.55.252.92_Block"
[INFO] Add Windows Firewall rule: "65.55.252.93_Block"
[INFO] Add Windows Firewall rule: "65.55.29.238_Block"
[INFO] Add Windows Firewall rule: "65.55.39.10_Block"
[INFO] Add Windows Firewall rule: "77.67.29.176_Block"
[INFO] Add Windows Firewall rule: "WSearch_Block"
[INFO] Ip list blocked
[INFO] Disabled task: Microsoft\Office\Office ClickToRun Service Monitor
[INFO] Disabled task: Microsoft\Office\OfficeTelemetryAgentFallBack2016
[INFO] Disabled task: Microsoft\Office\OfficeTelemetryAgentLogOn2016
[INFO] Disabled task: Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask
[INFO] Disabled task: Microsoft\Windows\Customer Experience Improvement Program\UsbCeip
[INFO] Disabled task: Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeSystem
[INFO] Disabled task: Microsoft\Windows\Shell\FamilySafetyMonitor
[INFO] Disabled task: Microsoft\Windows\Shell\FamilySafetyRefresh
[INFO] Disabled task: Microsoft\Windows\Application Experience\AitAgent
[INFO] Disabled task: Microsoft\Windows\Application Experience\ProgramDataUpdater
[INFO] Disabled task: Microsoft\Windows\Application Experience\StartupAppTask
[INFO] Disabled task: Microsoft\Windows\Autochk\Proxy
[INFO] Disabled task: Microsoft\Windows\Customer Experience Improvement Program\BthSQM
[INFO] Disabled task: Microsoft\Windows\Customer Experience Improvement Program\Consolidator
[INFO] Disabled task: Microsoft\Office\OfficeTelemetry\AgentFallBack2016
[INFO] Disabled task: Microsoft\Office\OfficeTelemetry\OfficeTelemetryAgentLogOn2016
[INFO] Disabled task: Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser
[INFO] Disabled task: Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector
[INFO] Disabled task: Microsoft\Windows\Maintenance\WinSAT
[INFO] Disabled task: Microsoft\Windows\Media Center\ActivateWindowsSearch
[INFO] Disabled task: Microsoft\Windows\Media Center\ConfigureInternetTimeService
[INFO] Disabled task: Microsoft\Windows\Media Center\DispatchRecoveryTasks
[INFO] Disabled task: Microsoft\Windows\Media Center\ehDRMInit
[INFO] Disabled task: Microsoft\Windows\Media Center\InstallPlayReady
[INFO] Disabled task: Microsoft\Windows\Media Center\mcupdate
[INFO] Disabled task: Microsoft\Windows\Media Center\MediaCenterRecoveryTask
[INFO] Disabled task: Microsoft\Windows\Media Center\ObjectStoreRecoveryTask
[INFO] Disabled task: Microsoft\Windows\Media Center\OCURActivate
[INFO] Disabled task: Microsoft\Windows\Media Center\OCURDiscovery
[INFO] Disabled task: Microsoft\Windows\Media Center\PBDADiscovery
[INFO] Disabled task: Microsoft\Windows\Media Center\PBDADiscoveryW1
[INFO] Disabled task: Microsoft\Windows\Media Center\PBDADiscoveryW2
[INFO] Disabled task: Microsoft\Windows\Media Center\PvrRecoveryTask
[INFO] Disabled task: Microsoft\Windows\Media Center\PvrScheduleTask
[INFO] Disabled task: Microsoft\Windows\Media Center\RegisterSearch
[INFO] Disabled task: Microsoft\Windows\Media Center\ReindexSearchRoot
[INFO] Disabled task: Microsoft\Windows\Media Center\SqlLiteRecoveryTask
[INFO] Disabled task: Microsoft\Windows\Media Center\UpdateRecordPath
[INFO] Remove and Hide update KB3080149
[INFO] Remove and Hide update KB3075249
[INFO] Remove and Hide update KB3068708
[INFO] Remove and Hide update KB3044374
[INFO] Remove and Hide update KB3035583
[INFO] Remove and Hide update KB3022345
[INFO] Remove and Hide update KB3021917
[INFO] Remove and Hide update KB3015249
[INFO] Remove and Hide update KB3012973
[INFO] Remove and Hide update KB2990214
[INFO] Remove and Hide update KB2977759
[INFO] Remove and Hide update KB2976978
[INFO] Remove and Hide update KB2952664
[INFO] Remove and Hide update KB2922324
[INFO] Remove and Hide update KB971033
[INFO] Remove and Hide update KB3083324
[INFO] Remove and Hide update KB3083325
[INFO] Remove and Hide update KB3088195
[INFO] Remove and Hide update KB3093983
[INFO] Remove and Hide update KB3093513
[INFO] Remove and Hide update KB3042058
[INFO] Remove and Hide update KB3083710
[INFO] Remove and Hide update KB3050265
[INFO] Remove and Hide update KB3112336
[WARNING] GWX NOT FOUND <== GWX control panel already fixed this -
Because of the discussion about Comodo I want to add this link:
Comodo free eMail certificate .
So if you want, you can create your own network where only people in it can read the mails of others, and if you want, you can also sign all your eMails digitally to confirm that the eMail really came from you.
I was interested in this, because I thought, that I could prevent my ISP and Google from reading my mails, something that I actually regard as a basic right, but seems encryption technology is not refined enough yet, because: Everybody that would want to read an encrypted eMail from you, would need your certificate (and the other way round when answering) . For me, this just isn't worth it, but being able to digitally sign my Mails I take gratefully.
-
So if I install DWS do they both run all the time? At the moment I assume not for DWS. So in what order do you run them and does Gwx control panel just keep running while you manually run DWS if you have monitor turned on? Then do you have to go back into Gwx control panel and turn monitor back on, or other settings? I'm not clear how the two programs interact. Btw I did have one instance of the monitor flashing and I had to reset one of the buttons in the Gwx control again and reboot, but it only happened once (so far). How often do you run DWS, hmscott?
-
Spartan@HIDevolution Company Representative
hmscott, Seraiel and toughasnails like this. -
Clear, thanks.
-
Normally I would restore from a Macrium Reflect image of a new Windows 8.1 install patched and modded to current levels, to reduce startup time from a restore - the DWS run would already have been done in that image.
For normal use running it once per new revision is enough. I check DWS's home/GIT pages the Saturday/Sunday following a new Patch Tuesday - he seems to get them out regularly around that time.toughasnails likes this. -
Glad to see the batch script is being maintained by @Matrix Leader and everyone has benefited from it. I'm going to run Windows Update today and then run the script actually, it's been a few weeks without updates.
toughasnails, hmscott and Spartan@HIDevolution like this. -
toughasnails Toughbook Moderator Moderator
hmscott, Ethrem and Spartan@HIDevolution like this. -
Thanks for the compliment. It took me a bit to figure out how to use the update manager but I'd say it was worth it
By the way, your auto correct messed up Matrix lolSpartan@HIDevolution likes this. -
Spartan@HIDevolution Company Representative
toughasnails, hmscott and Ethrem like this. -
stringbuzzzzzz Notebook Consultant
They had the best system tools/reg cleaner, IMO.Last edited: Jan 3, 2016hmscott likes this. -
Updates from last tuesday all seem to be clean.
KB3124275
KB3108664
KB3109560
KB3110329
KB3121212
KB3121918
KB3123479
KB3124000
KB3124001
All around the same security whole, descriptions available at Microsoft.
1 optional update from yesterday that is Windows 10 related again
KB2952664 needs to be added to the list of updates to avoid and hide.
This is really a joke. I have "turn off the upgrade to the latest version of Windows" on enabled in gpedit.msc, still I'm getting offered those updates.inm8#2, Todd Shipley, toughasnails and 1 other person like this. -
I very much appreciate your review, Seraiel! One thing I do after being notified of the new month's Windows updates, I review my list of hidden updates. Sure enough, update KB2952664 was no longer listed as a hidden update this month. I found KB2952664 was re-issued this month as a recommended update by Microsoft. As you suggested, Seraiel, I re-hid update KB2952664.
Hopefully, all Windows 7 users who read this thread have Windows Update set to "Check for updates but let me choose whether to download and install them"; also, you should uncheck the box to "Give me recommended updates the same way I receive important updates".Papusan, toughasnails, Seraiel and 1 other person like this. -
Here's a weblink to a good article on Microsoft's Get Windows 10 (GWX) program and how "Get Windows 10" sets its hooks into Windows 7 and 8.1. In particular, the article details "what those those Microsoft-sanctioned registry settings actually do - and don't do".
http://www.infoworld.com/article/30...ts-hooks-into-windows-7-and-81.html?nsdr=truehmscott, toughasnails, Hidef1080 and 1 other person like this. -
Spartan@HIDevolution Company Representative
For those of you who missed it, Here is how to block updates to Windows 10 using one of the Microsoft updates/ Group Policy Management:
https://support.microsoft.com/en-us/kb/3080351inm8#2 likes this. -
Time to watch out again guys!
Here in the UK today, 15th January, Windows has decided to 'unhide' all the telemetry and 'W10 downgrade' rubbish that I had hidden; seeing our friend KB3035583 set all those alarm bells ringing - it does pee me off that 'they' think that we are stupid enough to not realise that 'they' are trying to force these zombie updates upon us.....toughasnails, Todd Shipley and hmscott like this. -
And, use Destroy Windows Spying to stop Telemetry on Windows 7/8/8.1/10
Doing it by hand seems to be problematic, thanks @Todd Shipley :
How 'Get Windows 10' sets its hooks into Windows 7 and 8.1
http://www.infoworld.com/article/30...ts-hooks-into-windows-7-and-81.html?nsdr=trueLast edited: Jan 15, 2016Todd Shipley likes this. -
I appreciate the "heads up" notification, Trabant Dave, regarding Microsoft reissuing the telemetry and Get Windows 10 (GWX) updates in the UK! Regarding the telemetry updates, I assume the following specific updates have been reissued: KB3068708, KB3075249, and KB3080149.
-
hmscott and Phoenix, the following article does a good job of explaining what Microsoft's Group Policy Management changes do and don't do regarding the Windows 10 upgrade program. I believe it explains why several people have said it doesn't work for them.
http://www.infoworld.com/article/30...ts-hooks-into-windows-7-and-81.html?nsdr=true -
How 'Get Windows 10' sets its hooks into Windows 7 and 8.1
http://www.infoworld.com/article/30...ts-hooks-into-windows-7-and-81.html?nsdr=true
That's a different problem than I was discussing - I updated my post now that I realize Phoenix was talking about the Windows 10 Upgrade problem.
I can see where the confusion came in...
That is referring to Windows 7/8/8.1 users trying to stop GWX Windows 10 upgrades.
The GWX Control Panel does work, as does Destroy Windows Spying to stop GWX from working.
GWX Control Panel will also remove the downloaded Windows 10 Upgrade files and folder if they are found.
And, GWX Control Panel can be run in Monitoring mode looking for Windows Update to try to reenable Windows 10 Upgrade and stop it.
The Group Policy entries I am refering to have to do with running Windows 10, and trying to change the Update policies for automatic updates of drivers.
Those can't be stopped, at least so far, by doing the Group Policy edits.Last edited: Jan 15, 2016 -
Yes Todd, certainly those three, (KB3068708, KB3075249, and KB3080149) as well as our old 'friend' KB3035583, KB2882822, and many, many more! It seems like all the telemetry stuff - and other crud too - it even 'offered' me all the supplementary languages again, so some index file that holds info on the hidden updates is being fritzed; I've hidden all those language files too, and when they showed up again it was a red alert, and sure enough, the 'Usual Suspects' had been unhidden too....... SO; can anyone identify the file that's being nuked that holds the hidden update data - which could perhaps be backed up and copied back if W7 Update attempts this nonsense again?
Regards
Dave -
hmscott likes this.
-
You can use that list to add to your hosts file and to add to block through your firewall.
You can also get the list of processes/tasks to disable, and perhaps additional KB's to uninstall/hide.
If you have already sync'd all that up into the script, then nevermindEthrem likes this. -
toughasnails and hmscott like this.
-
It's not all done just through uninstalling the KB's...
If you don't trust the implementation, binary, etc. You can still read the source code, or even just the dws.log file from one of my runs to get the elements to disable and blockEthrem likes this. -
I can see the appeal for the super paranoid among us but when it comes down to it, my machine has all sketchy updates removed so I don't see the point in worrying about it.Spartan@HIDevolution likes this. -
Why not block the hostname's /IP's / IP Ranges / Tasks that are known to be used for the sending/receiving of Telemetry?
It's not like we need those IP's/hostname's to connect to them normally, and the tasks don't need to run if they aren't doing anything - if they exist they need to be disabled.
An ounce of prevention is worth a pound of cureLast edited: Jan 16, 2016Spartan@HIDevolution and toughasnails like this. -
I thought I read a while back that blocking the IPs through the host file didn't even work?
Sent from my iPhone using Tapatalkhmscott likes this. -
[INFO] Add to hosts - statsfe2.update.microsoft.com.akadns.net
[INFO] Add to hosts - fe2.update.microsoft.com.akadns.net
[INFO] Add to hosts - s0.2mdn.net
[INFO] Add to hosts - survey.watson.microsoft.com
[INFO] Add to hosts - view.atdmt.com
[INFO] Add to hosts - watson.microsoft.com
[INFO] Add to hosts - watson.ppe.telemetry.microsoft.com
[INFO] Add to hosts - vortex.data.microsoft.com
[INFO] Add to hosts - vortex-win.data.microsoft.com
[INFO] Add to hosts - telecommand.telemetry.microsoft.com
[INFO] Add to hosts - telecommand.telemetry.microsoft.com.nsatc.net
[INFO] Add to hosts - oca.telemetry.microsoft.com
[INFO] Add to hosts - sqm.telemetry.microsoft.com
[INFO] Add to hosts - sqm.telemetry.microsoft.com.nsatc.net
[INFO] Add to hosts - watson.telemetry.microsoft.com
[INFO] Add to hosts - watson.telemetry.microsoft.com.nsatc.net
[INFO] Add to hosts - redir.metaservices.microsoft.com
[INFO] Add to hosts - choice.microsoft.com
[INFO] Add to hosts - choice.microsoft.com.nsatc.net
[INFO] Add to hosts - wes.df.telemetry.microsoft.com
[INFO] Add to hosts - services.wes.df.telemetry.microsoft.com
[INFO] Add to hosts - sqm.df.telemetry.microsoft.com
[INFO] Add to hosts - telemetry.microsoft.com
[INFO] Add to hosts - telemetry.appex.bing.net
[INFO] Add to hosts - telemetry.urs.microsoft.com
[INFO] Add to hosts - settings-sandbox.data.microsoft.com
[INFO] Add to hosts - watson.live.com
[INFO] Add to hosts - statsfe2.ws.microsoft.com
[INFO] Add to hosts - corpext.msitadfs.glbdns2.microsoft.com
[INFO] Add to hosts - compatexchange.cloudapp.net
[INFO] Add to hosts - a-0001.a-msedge.net
[INFO] Add to hosts - sls.update.microsoft.com.akadns.net
[INFO] Add to hosts - diagnostics.support.microsoft.com
[INFO] Add to hosts - corp.sts.microsoft.com
[INFO] Add to hosts - statsfe1.ws.microsoft.com
[INFO] Add to hosts - feedback.windows.com
[INFO] Add to hosts - feedback.microsoft-hohm.com
[INFO] Add to hosts - feedback.search.microsoft.com
[INFO] Add to hosts - rad.msn.com
[INFO] Add to hosts - preview.msn.com
[INFO] Add to hosts - ad.doubleclick.net
[INFO] Add to hosts - ads.msn.com
[INFO] Add to hosts - ads1.msads.net
[INFO] Add to hosts - ads1.msn.com
[INFO] Add to hosts - a.ads1.msn.com
[INFO] Add to hosts - a.ads2.msn.com
[INFO] Add to hosts - adnexus.net
[INFO] Add to hosts - adnxs.com
[INFO] Add to hosts - az361816.vo.msecnd.net
[INFO] Add to hosts - az512334.vo.msecnd.net
[INFO] Add to hosts - ssw.live.com
[INFO] Add to hosts - ca.telemetry.microsoft.com
[INFO] Add to hosts - i1.services.social.microsoft.com
[INFO] Add to hosts - df.telemetry.microsoft.com
[INFO] Add to hosts - reports.wes.df.telemetry.microsoft.com
[INFO] Add to hosts - cs1.wpc.v0cdn.net
[INFO] Add to hosts - vortex-sandbox.data.microsoft.com
[INFO] Add to hosts - oca.telemetry.microsoft.com.nsatc.net
[INFO] Add to hosts - pre.footprintpredict.com
[INFO] Add to hosts - spynet2.microsoft.com
[INFO] Add to hosts - spynetalt.microsoft.com
[INFO] Add to hosts - fe3.delivery.dsp.mp.microsoft.com.nsatc.net
[INFO] Add to hosts - cache.datamart.windows.com
[INFO] Add to hosts - db3wns2011111.wns.windows.com
[INFO] Add to hosts - settings-win.data.microsoft.com
[INFO] Add to hosts - v10.vortex-win.data.microsoft.com
[INFO] Add to hosts - win10.ipv6.microsoft.com
[INFO] Add to hosts - ca.telemetry.microsoft.com
[INFO] Add to hosts - i1.services.social.microsoft.com.nsatc.net
[INFO] Add to hosts - msnbot-207-46-194-33.search.msn.com
[INFO] Add to hosts - settings.data.microsof.com
[INFO] Add to hosts - telecommand.telemetry.microsoft.com.nsatc.net
[INFO] Add hosts MS complete.
# Destroy Windows Spying hostnames list - copy/paste into hosts file
0.0.0.0 statsfe2.update.microsoft.com.akadns.net
0.0.0.0 fe2.update.microsoft.com.akadns.net
0.0.0.0 s0.2mdn.net
0.0.0.0 survey.watson.microsoft.com
0.0.0.0 view.atdmt.com
0.0.0.0 watson.microsoft.com
0.0.0.0 watson.ppe.telemetry.microsoft.com
0.0.0.0 vortex.data.microsoft.com
0.0.0.0 vortex-win.data.microsoft.com
0.0.0.0 telecommand.telemetry.microsoft.com
0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net
0.0.0.0 oca.telemetry.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com
0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net
0.0.0.0 watson.telemetry.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com.nsatc.net
0.0.0.0 redir.metaservices.microsoft.com
0.0.0.0 choice.microsoft.com
0.0.0.0 choice.microsoft.com.nsatc.net
0.0.0.0 wes.df.telemetry.microsoft.com
0.0.0.0 services.wes.df.telemetry.microsoft.com
0.0.0.0 sqm.df.telemetry.microsoft.com
0.0.0.0 telemetry.microsoft.com
0.0.0.0 telemetry.appex.bing.net
0.0.0.0 telemetry.urs.microsoft.com
0.0.0.0 settings-sandbox.data.microsoft.com
0.0.0.0 watson.live.com
0.0.0.0 statsfe2.ws.microsoft.com
0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com
0.0.0.0 compatexchange.cloudapp.net
0.0.0.0 a-0001.a-msedge.net
0.0.0.0 sls.update.microsoft.com.akadns.net
0.0.0.0 diagnostics.support.microsoft.com
0.0.0.0 corp.sts.microsoft.com
0.0.0.0 statsfe1.ws.microsoft.com
0.0.0.0 feedback.windows.com
0.0.0.0 feedback.microsoft-hohm.com
0.0.0.0 feedback.search.microsoft.com
0.0.0.0 rad.msn.com
0.0.0.0 preview.msn.com
0.0.0.0 ad.doubleclick.net
0.0.0.0 ads.msn.com
0.0.0.0 ads1.msads.net
0.0.0.0 ads1.msn.com
0.0.0.0 a.ads1.msn.com
0.0.0.0 a.ads2.msn.com
0.0.0.0 adnexus.net
0.0.0.0 adnxs.com
0.0.0.0 az361816.vo.msecnd.net
0.0.0.0 az512334.vo.msecnd.net
0.0.0.0 ssw.live.com
0.0.0.0 ca.telemetry.microsoft.com
0.0.0.0 i1.services.social.microsoft.com
0.0.0.0 df.telemetry.microsoft.com
0.0.0.0 reports.wes.df.telemetry.microsoft.com
0.0.0.0 cs1.wpc.v0cdn.net
0.0.0.0 vortex-sandbox.data.microsoft.com
0.0.0.0 oca.telemetry.microsoft.com.nsatc.net
0.0.0.0 pre.footprintpredict.com
0.0.0.0 spynet2.microsoft.com
0.0.0.0 spynetalt.microsoft.com
0.0.0.0 fe3.delivery.dsp.mp.microsoft.com.nsatc.net
0.0.0.0 cache.datamart.windows.com
0.0.0.0 db3wns2011111.wns.windows.com
0.0.0.0 settings-win.data.microsoft.com
0.0.0.0 v10.vortex-win.data.microsoft.com
0.0.0.0 win10.ipv6.microsoft.com
0.0.0.0 ca.telemetry.microsoft.com
0.0.0.0 i1.services.social.microsoft.com.nsatc.net
0.0.0.0 msnbot-207-46-194-33.search.msn.com
0.0.0.0 settings.data.microsof.com
0.0.0.0 telecommand.telemetry.microsoft.com.nsat-c.net
These go into the Windows Firewall, but if you have a 3rd party Firewall like Norton Security, you need to manually add them to that 3rd party firewall.
[INFO] Add Windows Firewall rule: "104.96.147.3_Block"
[INFO] Add Windows Firewall rule: "111.221.29.177_Block"
[INFO] Add Windows Firewall rule: "111.221.29.253_Block"
[INFO] Add Windows Firewall rule: "111.221.64.0-111.221.127.255_Block"
[INFO] Add Windows Firewall rule: "131.253.40.37_Block"
[INFO] Add Windows Firewall rule: "134.170.115.60_Block"
[INFO] Add Windows Firewall rule: "134.170.165.248_Block"
[INFO] Add Windows Firewall rule: "134.170.165.253_Block"
[INFO] Add Windows Firewall rule: "134.170.185.70_Block"
[INFO] Add Windows Firewall rule: "134.170.30.202_Block"
[INFO] Add Windows Firewall rule: "137.116.81.24_Block"
[INFO] Add Windows Firewall rule: "137.117.235.16_Block"
[INFO] Add Windows Firewall rule: "157.55.129.21_Block"
[INFO] Add Windows Firewall rule: "157.55.130.0-157.55.130.255_Block"
[INFO] Add Windows Firewall rule: "157.55.133.204_Block"
[INFO] Add Windows Firewall rule: "157.55.235.0-157.55.235.255_Block"
[INFO] Add Windows Firewall rule: "157.55.236.0-157.55.236.255_Block"
[INFO] Add Windows Firewall rule: "157.55.240.220_Block"
[INFO] Add Windows Firewall rule: "157.55.52.0-157.55.52.255_Block"
[INFO] Add Windows Firewall rule: "157.55.56.0-157.55.56.255_Block"
[INFO] Add Windows Firewall rule: "157.56.106.189_Block"
[INFO] Add Windows Firewall rule: "157.56.121.89_Block"
[INFO] Add Windows Firewall rule: "157.56.124.87_Block"
[INFO] Add Windows Firewall rule: "157.56.91.77_Block"
[INFO] Add Windows Firewall rule: "157.56.96.54_Block"
[INFO] Add Windows Firewall rule: "168.63.108.233_Block"
[INFO] Add Windows Firewall rule: "191.232.139.2_Block"
[INFO] Add Windows Firewall rule: "191.232.139.254_Block"
[INFO] Add Windows Firewall rule: "191.232.80.58_Block"
[INFO] Add Windows Firewall rule: "191.232.80.62_Block"
[INFO] Add Windows Firewall rule: "191.237.208.126_Block"
[INFO] Add Windows Firewall rule: "195.138.255.0-195.138.255.255_Block"
[INFO] Add Windows Firewall rule: "2.22.61.43_Block"
[INFO] Add Windows Firewall rule: "2.22.61.66_Block"
[INFO] Add Windows Firewall rule: "204.79.197.200_Block"
[INFO] Add Windows Firewall rule: "207.46.101.29_Block"
[INFO] Add Windows Firewall rule: "207.46.114.58_Block"
[INFO] Add Windows Firewall rule: "207.46.223.94_Block"
[INFO] Add Windows Firewall rule: "207.68.166.254_Block"
[INFO] Add Windows Firewall rule: "212.30.134.204_Block"
[INFO] Add Windows Firewall rule: "212.30.134.205_Block"
[INFO] Add Windows Firewall rule: "213.199.179.0-213.199.179.255_Block"
[INFO] Add Windows Firewall rule: "23.102.21.4_Block"
[INFO] Add Windows Firewall rule: "23.218.212.69_Block"
[INFO] Add Windows Firewall rule: "23.223.20.82_Block"
[INFO] Add Windows Firewall rule: "23.57.101.163_Block"
[INFO] Add Windows Firewall rule: "23.57.107.163_Block"
[INFO] Add Windows Firewall rule: "23.57.107.27_Block"
[INFO] Add Windows Firewall rule: "23.99.10.11_Block"
[INFO] Add Windows Firewall rule: "64.4.23.0-64.4.23.255_Block"
[INFO] Add Windows Firewall rule: "64.4.54.22_Block"
[INFO] Add Windows Firewall rule: "64.4.54.32_Block"
[INFO] Add Windows Firewall rule: "64.4.6.100_Block"
[INFO] Add Windows Firewall rule: "65.39.117.230_Block"
[INFO] Add Windows Firewall rule: "65.39.117.230_Block"
[INFO] Add Windows Firewall rule: "65.52.100.11_Block"
[INFO] Add Windows Firewall rule: "65.52.100.7_Block"
[INFO] Add Windows Firewall rule: "65.52.100.9_Block"
[INFO] Add Windows Firewall rule: "65.52.100.91_Block"
[INFO] Add Windows Firewall rule: "65.52.100.92_Block"
[INFO] Add Windows Firewall rule: "65.52.100.93_Block"
[INFO] Add Windows Firewall rule: "65.52.100.94_Block"
[INFO] Add Windows Firewall rule: "65.52.108.29_Block"
[INFO] Add Windows Firewall rule: "65.52.108.33_Block"
[INFO] Add Windows Firewall rule: "65.55.108.23_Block"
[INFO] Add Windows Firewall rule: "65.55.138.114_Block"
[INFO] Add Windows Firewall rule: "65.55.138.126_Block"
[INFO] Add Windows Firewall rule: "65.55.138.186_Block"
[INFO] Add Windows Firewall rule: "65.55.223.0-65.55.223.255_Block"
[INFO] Add Windows Firewall rule: "65.55.252.63_Block"
[INFO] Add Windows Firewall rule: "65.55.252.71_Block"
[INFO] Add Windows Firewall rule: "65.55.252.92_Block"
[INFO] Add Windows Firewall rule: "65.55.252.93_Block"
[INFO] Add Windows Firewall rule: "65.55.29.238_Block"
[INFO] Add Windows Firewall rule: "65.55.39.10_Block"
[INFO] Add Windows Firewall rule: "77.67.29.176_Block"
[INFO] Add Windows Firewall rule: "WSearch_Block"
[INFO] Ip list blocked
It's also not a bad idea to take one more step, and add these blockings to your perimeter firewall.Last edited: Jan 17, 2016Riley Martin, iunlock and alexhawker like this. -
Excellent thread. OP is there anyway to PM you mate? I wanted to share something with you to go toward this cause, but didn't want to post anything here, because I know someone will bark, "hijacking thread."
Thanks for your contribution. This is awesome.toughasnails likes this. -
toughasnails Toughbook Moderator Moderator
-
NotebookReview - Error
This member limits who may view their full profile.
OP are you okay with me asking some questions here on this thread? (All privacy/security related of course) I can always remove the post if need be... -
toughasnails Toughbook Moderator Moderator
-
Attached Files:
-
-
toughasnails Toughbook Moderator Moderator
Spartan@HIDevolution likes this. -
OP, I believe this will compliment the blocking the telemetry for Windows 10 as it is constantly getting updated to include the new updates that roll out. I'm curious to hear your thoughts about it and I wouldn't be surprised if there are things you can see that would enhance it to make it more refined?
Cheers -
toughasnails Toughbook Moderator Moderator
Well it sounds good but I really don't know anyone on that forum. Here I know and trust the members so I don't mind downloading a file. Don't get me wrong here. I am not saying there is something wrong with there script, just don't know the writer of the script. Maybe others here know that forum. Thanks for the link.
Spartan@HIDevolution likes this. -
Spartan@HIDevolution Company Representative
No offense meant and thank you for the contribution but I cannot add anything else to the thread. It's great and clean as is.toughasnails likes this. -
Sent from my SM-N910T using Tapatalkhmscott and toughasnails like this. -
For what it's worth, I went through the scripts and everything and that tool doesn't seem to do anything malicious unless there is some sort of malware embedded in setacl.exe which if you want to make certain there isn't, you can get a clean copy from http://helgeklein.com
That said, DWS seems a lot more comprehensive albeit irreversible.hmscott and Spartan@HIDevolution like this. -
Script for Win 7/8 to block all telemetry updates and Windows 10 upgrade components
https://voat.co/v/technology/comments/459263
After reading the .cmd scripts, and checking out the .exe, I decided to run it and see what it did on my Windows 8.1 install (I have image backups), and it's pretty nice - it has items not included in DWS.
And, that is the point of checking out other works in this area, not everyone (group) will think of or find all the related items - MS counts on that I am sure.
The only way to tighten up the perimeter security - find all the holes MS is using - on our PC's is to continue to share and merge findings - eventually in 1 runable tool for Windows 7, 8, 8.1, 10 - or several tools - which is what I do now.
Aegis is now 1 of those tools, but I / you will want to edit the block.cmd / unblock.cmd scripts to fine tune them for our personal web access needs.
Aegis is a bit too tight in the host/IP blocking - it blocks outlook.com, microsoft.com, msn.com, etc, which I still use. And, it blocks bing.com - which I don't use.
The block.cmd also has counterpart undo script, unblock.com which is nice.
If you want to use Aegis, I would save a copy of the .cmds, and edit at least the block.cmd to comment out the hosts you know you want to use before running it.
Here is the aegis.cmd output captured from the cmd window, I ran it without editing the cmd scripts to be able to show you all that it does "out of the box":
-/- aegis v1.9 by https://voat.co/u/thepower ( https://tiny.cc/aegis-voat)
press ctrl-c to cancel, enter to continue
step 1/8: disable gwx/skydrive/spynet/telemetry/wifisense ...
step 2/8: disable/hide windows 10 download directory ...
step 3/8: uninstall updates ...
01/31 - uninstall kb 971033 ( https://support.microsoft.com/en-us/kb/971033)
02/31 - uninstall kb 2902907 ( https://support.microsoft.com/en-us/kb/2902907)
03/31 - uninstall kb 2922324 ( https://support.microsoft.com/en-us/kb/2922324)
04/31 - uninstall kb 2952664 ( https://support.microsoft.com/en-us/kb/2952664)
05/31 - uninstall kb 2976978 ( https://support.microsoft.com/en-us/kb/2976978)
06/31 - uninstall kb 2977759 ( https://support.microsoft.com/en-us/kb/2977759)
07/31 - uninstall kb 2990214 ( https://support.microsoft.com/en-us/kb/2990214)
08/31 - uninstall kb 2999226 ( https://support.microsoft.com/en-us/kb/2999226)
09/31 - uninstall kb 3012973 ( https://support.microsoft.com/en-us/kb/3012973)
10/31 - uninstall kb 3014460 ( https://support.microsoft.com/en-us/kb/3014460)
11/31 - uninstall kb 3015249 ( https://support.microsoft.com/en-us/kb/3015249)
12/31 - uninstall kb 3021917 ( https://support.microsoft.com/en-us/kb/3021917)
13/31 - uninstall kb 3022345 ( https://support.microsoft.com/en-us/kb/3022345)
14/31 - uninstall kb 3035583 ( https://support.microsoft.com/en-us/kb/3035583)
15/31 - uninstall kb 3044374 ( https://support.microsoft.com/en-us/kb/3044374)
16/31 - uninstall kb 3046480 ( https://support.microsoft.com/en-us/kb/3046480)
17/31 - uninstall kb 3050265 ( https://support.microsoft.com/en-us/kb/3050265)
18/31 - uninstall kb 3050267 ( https://support.microsoft.com/en-us/kb/3050267)
19/31 - uninstall kb 3065987 ( https://support.microsoft.com/en-us/kb/3065987)
20/31 - uninstall kb 3065988 ( https://support.microsoft.com/en-us/kb/3065988)
21/31 - uninstall kb 3068708 ( https://support.microsoft.com/en-us/kb/3068708)
22/31 - uninstall kb 3075249 ( https://support.microsoft.com/en-us/kb/3075249)
23/31 - uninstall kb 3075851 ( https://support.microsoft.com/en-us/kb/3075851)
24/31 - uninstall kb 3075853 ( https://support.microsoft.com/en-us/kb/3075853)
25/31 - uninstall kb 3080149 ( https://support.microsoft.com/en-us/kb/3080149)
26/31 - uninstall kb 3083324 ( https://support.microsoft.com/en-us/kb/3083324)
27/31 - uninstall kb 3083325 ( https://support.microsoft.com/en-us/kb/3083325)
28/31 - uninstall kb 3083710 ( https://support.microsoft.com/en-us/kb/3083710)
29/31 - uninstall kb 3083711 ( https://support.microsoft.com/en-us/kb/3083711)
30/31 - uninstall kb 3112343 ( https://support.microsoft.com/en-us/kb/3112343)
31/31 - uninstall kb 3112336 ( https://support.microsoft.com/en-us/kb/3112336)
step 4/8: hide updates (this may take a while, be patient) ...
Microsoft (R) Windows Script Host Version 5.8
Copyright (C) Microsoft Corporation. All rights reserved.
Searching for updates ...13 found.
Hiding update: Update for Windows 8.1 for x64-based Systems (KB3046480)
Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3044374)
Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3075249)
Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3080149)
Hiding update: Update for Windows 8.1 for x64-based Systems (KB2999226)
Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3112336)
Update already hidden: Update for Windows 8.1 for x64-based Systems (KB3035583)
Update already hidden: Update for Windows 8.1 for x64-based Systems (KB2976978)
step 5/8: disable scheduled tasks ...
step 6/8: uninstall diagtrack ...
step 7/8: disable remote registry ...
step 8/8: block hosts ...
block a-0001.a-msedge.net
block a-0002.a-msedge.net
block a-0003.a-msedge.net
block a-0004.a-msedge.net
block a-0005.a-msedge.net
block a-0006.a-msedge.net
block a-0007.a-msedge.net
block a-0008.a-msedge.net
block a-0009.a-msedge.net
block a23-218-212-69.deploy.static.akamaitechnologies.com
block a.ads1.msn.com
block a.ads2.msads.net
block a.ads2.msn.com
block ac3.msn.com
block activation.playready.microsoft.com
block ad.doubleclick.net
block ads1.msads.net
block ads1.msn.com
block adsmockarc.azurewebsites.net
block ads.msn.com
block adsyndication.msn.com
block aidps.atdmt.com
block ajax.aspnetcdn.com
block aka-cdn-ns.adtech.de
block a-msedge.net
block api.bing.com
block appexmapsappupdate.blob.core.windows.net
block apps.skype.com
block a.rad.msn.com
block au.au-msedge.net
block auth.gfx.ms
block az361816.vo.msecnd.net
block az512334.vo.msecnd.net
block b.ads1.msn.com
block b.ads2.msads.net
block bingads.microsoft.com
block bing.com
block b.rad.msn.com
block bs.serving-sys.com
block c1.microsoft.com
block c.atdmt.com
block cdn.atdmt.com
block cdn.content.prod.cms.msn.com
block cdp1.public-trust.com
block cds26.ams9.msecn.net
block choice.microsoft.com
block choice.microsoft.com.nsatc.net
block c.microsoft.com
block c.msn.com
block cmsresources.windowsphone.com
block compatexchange.cloudapp.net
block content.windows.microsoft.com
block corpext.msitadfs.glbdns2.microsoft.com
block corp.sts.microsoft.com
block cs1.wpc.v0cdn.net
block c.s-microsoft.com
block db3aqu.atdmt.com
block dc.services.visualstudio.com
block dev.virtualearth.net
block df.telemetry.microsoft.com
block diagnostics.support.microsoft.com
block displaycatalog.md.mp.microsoft.com
block dl.delivery.mp.microsoft.com
block dmd.metaservices.microsoft.com
block download.microsoft.com
block download-ssl.msgamestudios.com
block ec.atdmt.com
block ecn.dev.virtualearth.net
block en-us.appex-rf.msn.com
block fe2.update.microsoft.com.akadns.net
block fe3.delivery.mp.microsoft.com
block feedback.microsoft-hohm.com
block feedback.search.microsoft.com
block feedback.windows.com
block ff4a487e56259f4bd5831e9e30470e83.azr.msnetworkanalytics.testanalytics.net
block flex.msn.com
block geo-prod.do.dsp.mp.microsoft.com
block g.live.com
block g.msn.com
block go.microsoft.com
block go.skype.com
block h1.msn.com
block h2.msn.com
block help.bingads.microsoft.com
block hotmail.com
block i1.services.social.microsoft.com
block i1.services.social.microsoft.com.nsatc.net
block iecvlist.microsoft.com
block ieonline.microsoft.com
block img-s-msn-com.akamaized.net
block inference.location.live.net
block js.microsoft.com
block lb1. www.ms.akadns.net
block licensing.md.mp.microsoft.com
block live.rads.msn.com
block livetileedge.dsx.mp.microsoft.com
block logging.windows.microsoft.com
block login.live.com
block login.live.com.nsatc.net
block m.adnxs.com
block mediadiscovery.microsoft.com
block m.hotmail.com
block microsoft.com
block msedge.net
block msftncsi.com
block msnbc.com
block msnbot-65-55-108-23.search.msn.com
block msn.com
block msnportal.112.2o7.net
block msntest.serving-sys.com
block nexus.officeapps.live.com
block oca.telemetry.microsoft.com
block oca.telemetry.microsoft.com.nsatc.net
block ocsp.msocsp.com
block ocsp.omniroot.com
block ocsp.startssl.com
block officeclient.microsoft.com
block outlook.com
block pipe.skype.com
block platform.bing.com
block pre.footprintpredict.com
block preview.msn.com
block pricelist.skype.com
block r20swj13mr.microsoft.com
block rad.live.com
block rad.msn.com
block redir.metaservices.microsoft.com
block reports.wes.df.telemetry.microsoft.com
block sb.scorecardresearch.com
block schemas.microsoft.akadns.net
block secure.adnxs.com
block secure.flashtalking.com
block services.wes.df.telemetry.microsoft.com
block settings.data.microsoft.com
block settings-sandbox.data.microsoft.com
block settings-ssl.xboxlive.com
block settings-win.data.microsoft.com
block s.gateway.messenger.live.com
block sgmetrics.cloudapp.net
block shell.windows.com
block sls.update.microsoft.com
block sls.update.microsoft.com.akadns.net
block sls.update.microsoft.com.nsatc.net
block sO.2mdn.net
block social.answers.microsoft.com
block spynet2.microsoft.com
block spynetalt.microsoft.com
block sqm.df.telemetry.microsoft.com
block sqm.microsoft.com
block sqm.telemetry.microsoft.com
block sqm.telemetry.microsoft.com.nsatc.net
block ssw.live.com
block static.2mdn.net
block statsfe1.ws.microsoft.com
block statsfe2.update.microsoft.com.akadns.net
block statsfe2.ws.microsoft.com
block storeedgefd.dsx.mp.microsoft.com
block store-images.microsoft.com
block survey.watson.microsoft.com
block t0.ssl.ak.dynamic.tiles.virtualearth.net
block t0.ssl.ak.tiles.virtualearth.net
block telecommand.telemetry.microsoft.com
block telecommand.telemetry.microsoft.com.nsatc.net
block telemetry.appex.bing.net
block telemetry.microsoft.com
block telemetry.urs.microsoft.com
block tile-service.weather.microsoft.com
block tlu.dl.delivery.mp.microsoft.com
block ui.skype.com
block urs.microsoft.com
block vassg141.ocsp.omniroot.com
block version.hybrid.api.here.com
block view.atdmt.com
block vortex-bn2.metron.live.com.nsatc.net
block vortex-cy2.metron.live.com.nsatc.net
block vortex.data.microsoft.com
block vortex-sandbox.data.microsoft.com
block vortex-win.data.microsoft.com
block watson.live.com
block watson.microsoft.com
block watson.ppe.telemetry.microsoft.com
block watson.telemetry.microsoft.com
block watson.telemetry.microsoft.com.nsatc.net
block wes.df.telemetry.microsoft.com
block www.microsoft.com
block www.modern.ie
block www.msftncsi.com
block www.msn.com
done
Thanks again to @iunlock !!Last edited: Jan 18, 2016 -
You don't need to @tag someone if you reply to them, and you only need to do it once per posting, I was breaking those rules to alert you to pay attention to all the @'s.iunlock likes this. -
Couldn't have said it any better, " The only way to tighten up the perimeter security - find all the holes MS is using - on our PC's is to continue to share and merge findings - eventually in 1 runable tool for Windows 7, 8, 8.1, 10 - or several tools - which is what I do now." - hmscott
This was and still is my intent all along. The greatness that comes out of all of this is having the ability to have choices for those like us who, "care" about security/privacy.
Thanks for verifying the cleanliness, which is one of the things I wanted to put to rest by someone like you thoroughly examining it.
Based on your knowledge, would you say that by combining the great works of the OP with similar tools like Aegis, be a pretty solid start to fight communism? (MS and alike)...
It's my pleasure for being an OCD, maticulius and '2nd place isn't good enough,' observing student. Although obvious, I firmly believe that the only way to progress in this fight is to combine resources to strengthen the cause by winning with numbers. There's more of us than there are them.
Thanks OP and thanks to this awesome community.
Sent from my SM-N910T using Tapatalkhmscott likes this.
Windows7/8 - Updates to hide to prevent Windows 10 Upgrade / Disable Telemetry
Discussion in 'Windows OS and Software' started by Spartan@HIDevolution, Aug 23, 2015.