From 5fb84ce044826118d1ddf41ab7f3aedcd30b8b7d Mon Sep 17 00:00:00 2001 From: Alex Hirsch Date: Tue, 4 Aug 2015 00:15:03 +0200 Subject: [PATCH] init commit --- README.md | 35 +++++++++++ ...d-run-with-powershell-as-administrator.reg | 4 ++ scripts/disable-defender.reg | Bin 0 -> 888 bytes scripts/disable-onedrive.reg | Bin 0 -> 312 bytes scripts/disable-services.ps1 | 24 ++++++++ scripts/disable-settingssync.reg | Bin 0 -> 4074 bytes scripts/disable-telemetry.ps1 | 58 ++++++++++++++++++ scripts/disable-telemetry.reg | Bin 0 -> 290 bytes scripts/disable-windows-features.ps1 | 12 ++++ scripts/install-sysinternals.ps1 | 20 ++++++ scripts/remove-default-apps.ps1 | 45 ++++++++++++++ scripts/remove-onedrive.ps1 | 19 ++++++ ...e-run-with-powershell-as-administrator.reg | 3 + 13 files changed, 220 insertions(+) create mode 100644 README.md create mode 100644 scripts/add-run-with-powershell-as-administrator.reg create mode 100644 scripts/disable-defender.reg create mode 100644 scripts/disable-onedrive.reg create mode 100644 scripts/disable-services.ps1 create mode 100644 scripts/disable-settingssync.reg create mode 100644 scripts/disable-telemetry.ps1 create mode 100644 scripts/disable-telemetry.reg create mode 100644 scripts/disable-windows-features.ps1 create mode 100644 scripts/install-sysinternals.ps1 create mode 100644 scripts/remove-default-apps.ps1 create mode 100644 scripts/remove-onedrive.ps1 create mode 100644 scripts/remove-run-with-powershell-as-administrator.reg diff --git a/README.md b/README.md new file mode 100644 index 0000000..0fc9a4b --- /dev/null +++ b/README.md @@ -0,0 +1,35 @@ +# Debloat Windows 10 + +This project is an effort to collect scripts which help *debloating* Windows +10. + +I personally find the state Windows 10 comes in quite shocking / scary and want +to have very slim, scriptable solution to remove and disable Windows 10's +features most people do not need nor want. + +The scripts provided consists of Powershell scripts and Registry keys, you +should have no problems altering and using them to fit your needs. Do not +forget to set the execution policy for Powershell scripts. And of course, how +have to run them with administrative priveledges. + + PS> Set-ExecutionPolicy RemoteSigned + +Look at the scripts most of them are only a couple of lines long and it should +be pretty obvious what they are doing. + +## Contribute + +I would be happy to extend the collection of scripts. Just open an issue or +send me a pull request. + +## License + + "THE BEER-WARE LICENSE" (Revision 42): + + As long as you retain this notice you can do whatever you want with this + stuff. If we meet some day, and you think this stuff is worth it, you can + buy us a beer in return. + + This project is distributed in the hope that it will be useful, but WITHOUT + ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + FITNESS FOR A PARTICULAR PURPOSE. diff --git a/scripts/add-run-with-powershell-as-administrator.reg b/scripts/add-run-with-powershell-as-administrator.reg new file mode 100644 index 0000000..042b936 --- /dev/null +++ b/scripts/add-run-with-powershell-as-administrator.reg @@ -0,0 +1,4 @@ +Windows Registry Editor Version 5.00 + +[HKEY_CLASSES_ROOT\Microsoft.PowerShellScript.1\Shell\RunAs\Command] +@="\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" \"%1\"" \ No newline at end of file diff --git a/scripts/disable-defender.reg b/scripts/disable-defender.reg new file mode 100644 index 0000000000000000000000000000000000000000..8bcf619fa4f272d90efa5a828ba51930872ae43e GIT binary patch literal 888 zcmd6m%SyvQ6o&t`;5&rw74Hkdg|v#IQHiBNjFei_FjyxtsRUnM{mvAzLP3{hILw^e zf3EZSk;}>JNwr!vN|dQog{;v`LGMUT&^ovpKG6VuKKZqc2puN-+6C3(!@KzrKN4pudBODu1AO^G*#N+K6v85fW@ z(1hFyaDLa(!*&8$ZI$3E48-B1JaI;@M^&h+=sC~t8sp| zmm+0YzeOw$!W6VVXwNaLia6t_v!4A2-MYD|om`xV?MF(T9;z1lyxRHOj*pnp1~YPc iflJsj+ou`tpGhs>nQw2~8}m)^^StLj#I~^dbH-nAcb8-U literal 0 HcmV?d00001 diff --git a/scripts/disable-onedrive.reg b/scripts/disable-onedrive.reg new file mode 100644 index 0000000000000000000000000000000000000000..1fff12af39e8f43f197a1f2ebc19762acf2b777d GIT binary patch literal 312 zcmYk1UrPc}5XFDbLEl0A0FsqH2tCBwKQs#!mvBY2wzv?xuq%mQ-umtJB`(9voHO^# zncrhdpx}d&JvA++7rt}OVk~)N7i4BAFEY#*A{7R+ptwL*FlJR=B0(26CQMy(B{VNd(|uRAYRy9d3s&`021Ie AkN^Mx literal 0 HcmV?d00001 diff --git a/scripts/disable-services.ps1 b/scripts/disable-services.ps1 new file mode 100644 index 0000000..a93cf0a --- /dev/null +++ b/scripts/disable-services.ps1 @@ -0,0 +1,24 @@ +# Description: +# This script disables unwanted Windows services. If you do not want to disable +# certain services comment out the corresponding lines below. + +$services = @( + "HomeGroupListener" + "HomeGroupProvider" + "MapsBroker" + "NetTcpPortSharing" + "RemoteAccess" + "RemoteRegistry" + "SharedAccess" + "WbioSrvc" + "XblAuthManager" + "XblGameSave" + "XboxNetApiSvc" + "dmwappushservice" + "lfsvc" + #"wscsvc" +) + +foreach ($service in $services) { + Get-Service -Name $service | Set-Service -StartupType Disabled +} \ No newline at end of file diff --git a/scripts/disable-settingssync.reg b/scripts/disable-settingssync.reg new file mode 100644 index 0000000000000000000000000000000000000000..277e57a016120bcbf00f0b9bcbbbeef0c14c1727 GIT binary patch literal 4074 zcmeH~T}$IY6o%hxVgG~lIxLC`yMh;f3%a|dT1AXVtT6^_Qj&JH`{P%iGilUDFp4({ zVVERmCUfS@nfH9%|36Z!L>EeRt6a0{C{)B)uAwrG8QEkuhDxDlb;x|iYz&=1FX_AH zXx}vB`iXY5%bH`IXM_P6BzJ9^62j>*tsV>>iXZE>l zKKw@fks(3C{In#-Gh}q=)^4Af?azT0oCmR305Eh8E4Wp@@k zkF^C>*tuHTfcIawB1BT#C*beEy}NMiv))ER`fD6ZO|>f0=9SaD&SQQeRU4V@9y0Cm zjOYp4d&^oo)n~gYU)!7{bvKkx?(Or->4V@NEkyHX73Xxr))4%a*qcV?`|f&Sa@U*O zZ2;vF>_13`5fYojU4)Czs=^S|X; zPgrZBLm4lt-mQ(6EH}42&^%kLe@=HruHM*c9r6mSWuVQhcI4wiRXt|y Q*<+R>m7-;~4-)mUy#N3J literal 0 HcmV?d00001 diff --git a/scripts/disable-telemetry.ps1 b/scripts/disable-telemetry.ps1 new file mode 100644 index 0000000..17a13b4 --- /dev/null +++ b/scripts/disable-telemetry.ps1 @@ -0,0 +1,58 @@ +# Description: +# This script redirects telemetry related domains to your nowhere using the +# hosts file. + +$hosts = "0.0.0.0 vortex.data.microsoft.com +0.0.0.0 vortex-win.data.microsoft.com +0.0.0.0 telecommand.telemetry.microsoft.com +0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net +0.0.0.0 oca.telemetry.microsoft.com +0.0.0.0 oca.telemetry.microsoft.com.nsatc.net +0.0.0.0 sqm.telemetry.microsoft.com +0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net +0.0.0.0 watson.telemetry.microsoft.com +0.0.0.0 watson.telemetry.microsoft.com.nsatc.net +0.0.0.0 redir.metaservices.microsoft.com +0.0.0.0 choice.microsoft.com +0.0.0.0 choice.microsoft.com.nsatc.net +0.0.0.0 df.telemetry.microsoft.com +0.0.0.0 reports.wes.df.telemetry.microsoft.com +0.0.0.0 wes.df.telemetry.microsoft.com +0.0.0.0 services.wes.df.telemetry.microsoft.com +0.0.0.0 sqm.df.telemetry.microsoft.com +0.0.0.0 telemetry.microsoft.com +0.0.0.0 watson.ppe.telemetry.microsoft.com +0.0.0.0 telemetry.appex.bing.net +0.0.0.0 telemetry.urs.microsoft.com +0.0.0.0 telemetry.appex.bing.net:443 +0.0.0.0 settings-sandbox.data.microsoft.com +0.0.0.0 vortex-sandbox.data.microsoft.com +0.0.0.0 survey.watson.microsoft.com +0.0.0.0 watson.live.com +0.0.0.0 watson.microsoft.com +0.0.0.0 statsfe2.ws.microsoft.com +0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com +0.0.0.0 compatexchange.cloudapp.net +0.0.0.0 cs1.wpc.v0cdn.net +0.0.0.0 a-0001.a-msedge.net +0.0.0.0 statsfe2.update.microsoft.com.akadns.net +0.0.0.0 sls.update.microsoft.com.akadns.net +0.0.0.0 fe2.update.microsoft.com.akadns.net +0.0.0.0 65.55.108.23 +0.0.0.0 65.39.117.230 +0.0.0.0 23.218.212.69 +0.0.0.0 134.170.30.202 +0.0.0.0 137.116.81.24 +0.0.0.0 diagnostics.support.microsoft.com +0.0.0.0 corp.sts.microsoft.com +0.0.0.0 statsfe1.ws.microsoft.com +0.0.0.0 pre.footprintpredict.com +0.0.0.0 204.79.197.200 +0.0.0.0 23.218.212.69 +0.0.0.0 i1.services.social.microsoft.com +0.0.0.0 i1.services.social.microsoft.com.nsatc.net +0.0.0.0 feedback.windows.com +0.0.0.0 feedback.microsoft-hohm.com +0.0.0.0 feedback.search.microsoft.com" + +echo $hosts >> "$env:systemroot\System32\drivers\etc\hosts" \ No newline at end of file diff --git a/scripts/disable-telemetry.reg b/scripts/disable-telemetry.reg new file mode 100644 index 0000000000000000000000000000000000000000..b33e1ea9662d599ade591ff43a872136c9943f56 GIT binary patch literal 290 zcmYk1+X{kU5QOJC=pDodh;F(Gx(F+Zj+i8oAz~InDf|Y~%U9p81hFj3%Nl##&Q7 zw1qaPk@jda1q$K)hS{<4&fb*FxDYX8k%6zsD?dc^|Nk3lq69u+x1GK-nS$Hz&do