scusi / disableTelemetry.ps1
0 Kedvelések
0 forkok
1 fájlok
Utoljára aktív 6 months ago
powershell script to disable telemetry in win10
| 1 | # powershell script to disable telemetry in win10 |
| 2 | # |
| 3 | # Source: |
| 4 | # https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Cyber-Sicherheit/SiSyPHus/Analyse_Telemetriekomponente.pdf?__blob=publicationFile&v=3 |
| 5 | |
| 6 | # run as admin |
| 7 | if (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Start-Process powershell.exe "-NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" -Verb RunAs; exit } |
| 8 | |
| 9 | # Step 1: deactivate DiagTrack service |
| 10 | Set-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack\ -name Start -Value 4 |
scusi / enableTelemetry.ps1
0 Kedvelések
0 forkok
1 fájlok
Utoljára aktív 6 months ago
powershell script to (re-)enable telemetry in win10
| 1 | # powershell script to (re-)enable telemetry in win10 |
| 2 | # |
| 3 | # flw@posteo.de |
| 4 | # |
| 5 | |
| 6 | # run as admin |
| 7 | if (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Start-Process powershell.exe "-NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" -Verb RunAs; exit } |
| 8 | |
| 9 | # Step 1: deactivate DiagTrack service |
| 10 | Set-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack\ -name Start -Value 2 |
Újabb
Régebbi