Last active
February 16, 2024 06:06
-
-
Save jumarag/738fd121c8f3a37cc6240993853a6977 to your computer and use it in GitHub Desktop.
Script bat que elimina telemetría y aplicaciones por defecto en Windows 10
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
rem # ################################################################################################################################ | |
rem # Script para eliminar aplicaciones por defecto en Windows 10 y mejorar la privacidad # | |
rem # Se eliminan todas las aplicaciones integradas incluido skype y onedrive # | |
rem # Cortana no se puede eliminar directamente pero si se puede modificar su ubicación para que el sistema no inicie la aplicación # | |
rem # ############################################################################################################################### | |
if not "%cd%"=="%windir%\system32" ( | |
echo Debes ejecutarlo como Administrador. | |
echo Click derecho y "Ejecutar como administrador" | |
@echo. | |
) else ( | |
@echo ############################################################################### | |
@echo ### Mejora la privacidad de Windows 10 y elimina aplicaciones preinstaladas ### | |
@echo ############################################################################### | |
@echo. | |
rem # Elimina las aplicaciones preinstaladas de Windows 10 | |
@echo. | |
@echo Eliminando aplicaciones preinstaladas ... | |
PowerShell -Command "Get-AppxPackage *3DBuilder* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *Cortana* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *Getstarted* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *WindowsAlarms* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *WindowsCamera* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *bing* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *MicrosoftOfficeHub* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *OneNote* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *people* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *WindowsPhone* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *photos* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *SkypeApp* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *solit* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *WindowsSoundRecorder* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *xbox* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *windowscommunicationsapps* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *zune* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *WindowsCalculator* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *WindowsMaps* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *Sway* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *CommsPhone* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *ConnectivityStore* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *Microsoft.Messaging* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *ContentDeliveryManager* | Remove-AppxPackage" | |
PowerShell -Command "Get-AppxPackage *Microsoft.WindowsStore* | Remove-AppxPackage" | |
@echo. | |
@echo Hecho! | |
@echo. | |
rem # Dominios de Microsoft que envían datos del equipo | |
@echo Añadiendo los dominios a bloquear en el fichero hosts ... | |
@echo.>> %windir%\system32\drivers\etc\hosts | |
@echo ### Dominios de Microsoft que envian datos del equipo>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 settings-sandbox.data.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 statsfe1.ws.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 fe2.update.microsoft.com.akadns.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 telemetry.appex.bing.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 cs1.wpc.v0cdn.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 redir.metaservices.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 i1.services.social.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 sls.update.microsoft.com.akadns.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 diagnostics.support.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 choice.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 choice.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 a-0001.a-msedge.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 pre.footprintpredict.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 watson.live.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 survey.watson.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 compatexchange.cloudapp.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 vortex.data.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 vortex-win.data.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 vortex-sandbox.data.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 watson.ppe.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 reports.wes.df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 services.wes.df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 wes.df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 sqm.df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 statsfe2.ws.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 statsfe2.update.microsoft.com.akadns.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 watson.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 watson.telemetry.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 oca.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 oca.telemetry.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 watson.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 telecommand.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 telecommand.telemetry.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 sqm.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 sqm.telemetry.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 corpext.msitadfs.glbdns2.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 corp.sts.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo 127.0.0.1 telemetry.urs.microsoft.com>> %windir%\system32\drivers\etc\hosts | |
@echo.>> %windir%\system32\drivers\etc\hosts | |
@echo. | |
@echo Hecho! | |
@echo. | |
rem # Añadir direcciones IP al cortafuegos de Windows. En el anexo están todas las direcciones para añadirlas también al router | |
rem # La IP 204.79.197.200 es la que se utiliza entre otras cosas para acceder a www.bing.com | |
@echo Añadiendo reglas al firewall de Windows ... | |
netsh advfirewall set allprofiles state on | |
rem # Si se quiere tener acceso al buscador bing, comentar éstas líneas | |
netsh advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_a-0001.a-msedge.net" dir=out action=block remoteip=204.79.197.200 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes | |
rem ##################################################################################################################################### | |
netsh advfirewall firewall add rule name="telemetry_vortex.data.microsoft.com" dir=out action=block remoteip=191.232.139.254 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_telecommand.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.92 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.63 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_sqm.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.93 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_redir.metaservices.microsoft.com" dir=out action=block remoteip=194.44.4.200,194.44.4.208 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_choice.microsoft.com" dir=out action=block remoteip=157.56.91.77 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.93 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_services.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.92 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_sqm.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.94 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.9 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_watson.ppe.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.11 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_telemetry.appex.bing.net" dir=out action=block remoteip=168.63.108.233 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_telemetry.urs.microsoft.com" dir=out action=block remoteip=157.56.74.250 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_settings-sandbox.data.microsoft.com" dir=out action=block remoteip=111.221.29.177 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_survey.watson.microsoft.com" dir=out action=block remoteip=207.68.166.254 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_watson.live.com" dir=out action=block remoteip=207.46.223.94 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_watson.microsoft.com" dir=out action=block remoteip=65.55.252.71 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_statsfe2.ws.microsoft.com" dir=out action=block remoteip=64.4.54.22 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_corpext.msitadfs.glbdns2.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_compatexchange.cloudapp.net" dir=out action=block remoteip=23.99.10.11 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_statsfe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=64.4.54.22 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_sls.update.microsoft.com.akadns.net" dir=out action=block remoteip=157.56.77.139 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_fe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=134.170.58.121,134.170.58.123,134.170.53.29,66.119.144.190,134.170.58.189,134.170.58.118,134.170.53.30,134.170.51.190 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_diagnostics.support.microsoft.com" dir=out action=block remoteip=157.56.121.89 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_corp.sts.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_feedback.windows.com" dir=out action=block remoteip=134.170.185.70 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_feedback.microsoft-hohm.com" dir=out action=block remoteip=64.4.6.100,65.55.39.10 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_feedback.search.microsoft.com" dir=out action=block remoteip=157.55.129.21 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_rad.msn.com" dir=out action=block remoteip=207.46.194.25 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_preview.msn.com" dir=out action=block remoteip=23.102.21.4 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_dart.l.doubleclick.net" dir=out action=block remoteip=173.194.113.220,173.194.113.219,216.58.209.166 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_ads.msn.com" dir=out action=block remoteip=157.56.91.82,157.56.23.91,104.82.14.146,207.123.56.252,185.13.160.61,8.254.209.254 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_a.ads1.msn.com" dir=out action=block remoteip=198.78.208.254,185.13.160.61 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_global.msads.net.c.footprint.net" dir=out action=block remoteip=185.13.160.61,8.254.209.254,207.123.56.252 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_az361816.vo.msecnd.net" dir=out action=block remoteip=68.232.34.200 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com.nsatc.net" dir=out action=block remoteip=65.55.252.63 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_ssw.live.com" dir=out action=block remoteip=207.46.101.29 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_msnbot-65-55-108-23.search.msn.com" dir=out action=block remoteip=65.55.108.23 enable=yes | |
netsh advfirewall firewall add rule name="telemetry_a23-218-212-69.deploy.static.akamaitechnologies.com" dir=out action=block remoteip=23.218.212.69 enable=yes | |
@echo. | |
@echo Hecho! | |
@echo. | |
rem # Deshabilitar servicios | |
@echo Deshabilitando servicios ... | |
sc stop DiagTrack | |
sc stop diagnosticshub.standardcollector.service | |
sc stop dmwappushservice | |
rem sc stop dmwappushsvc ::comprobar | |
sc stop WMPNetworkSvc | |
sc stop WSearch | |
rem # Deshabilitamos los servicios | |
sc config DiagTrack start= disabled | |
sc config diagnosticshub.standardcollector.service start= disabled | |
sc config dmwappushservice start= disabled | |
rem sc config dmwappusvc start= disabled ::comprobar | |
REM sc config RemoteRegistry start= disabled | |
REM sc config TrkWks start= disabled | |
sc config WMPNetworkSvc start= disabled | |
sc config WSearch start= disabled | |
@echo. | |
@echo Hecho! | |
@echo. | |
REM *** SCHEDULED TASKS tweaks *** | |
REM schtasks /Change /TN "Microsoft\Windows\AppID\SmartScreenSpecific" /Disable | |
schtasks /Change /TN "Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /Disable | |
schtasks /Change /TN "Microsoft\Windows\Application Experience\ProgramDataUpdater" /Disable | |
schtasks /Change /TN "Microsoft\Windows\Application Experience\StartupAppTask" /Disable | |
schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /Disable | |
schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /Disable | |
schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /Disable | |
schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader" /Disable | |
schtasks /Change /TN "Microsoft\Windows\Shell\FamilySafetyUpload" /Disable | |
schtasks /Change /TN "Microsoft\Office\OfficeTelemetryAgentLogOn" /Disable | |
schtasks /Change /TN "Microsoft\Office\OfficeTelemetryAgentFallBack" /Disable | |
schtasks /Change /TN "Microsoft\Office\Office 15 Subscription Heartbeat" /Disable | |
rem # Eliminar telemetría y recolección de datos | |
@echo Eliminando telemetría ... | |
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Metadata" /v PreventDeviceMetadataFromNetwork /t REG_DWORD /d 1 /f | |
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f | |
reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v DontOfferThroughWUAU /t REG_DWORD /d 1 /f | |
reg add "HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows" /v "CEIPEnable" /t REG_DWORD /d 0 /f | |
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "AITEnable" /t REG_DWORD /d 0 /f | |
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "DisableUAR" /t REG_DWORD /d 1 /f | |
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f | |
reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\AutoLogger-Diagtrack-Listener" /v "Start" /t REG_DWORD /d 0 /f | |
reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\SQMLogger" /v "Start" /t REG_DWORD /d 0 /f | |
@REM Settings -> Privacy -> General -> Let apps use my advertising ID... | |
reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /v Enabled /t REG_DWORD /d 0 /f | |
REM - SmartScreen Filter for Store Apps: Disable | |
reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v EnableWebContentEvaluation /t REG_DWORD /d 0 /f | |
REM - Let websites provide locally... | |
reg add "HKCU\Control Panel\International\User Profile" /v HttpAcceptLanguageOptOut /t REG_DWORD /d 1 /f | |
@REM WiFi Sense: HotSpot Sharing: Disable | |
reg add "HKLM\Software\Microsoft\PolicyManager\default\WiFi\AllowWiFiHotSpotReporting" /v value /t REG_DWORD /d 0 /f | |
@REM WiFi Sense: Shared HotSpot Auto-Connect: Disable | |
reg add "HKLM\Software\Microsoft\PolicyManager\default\WiFi\AllowAutoConnectToWiFiSenseHotspots" /v value /t REG_DWORD /d 0 /f | |
@REM Change Windows Updates to "Notify to schedule restart" | |
reg add "HKLM\SOFTWARE\Microsoft\WindowsUpdate\UX\Settings" /v UxOption /t REG_DWORD /d 1 /f | |
@REM Disable P2P Update downlods outside of local network | |
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v DODownloadMode /t REG_DWORD /d 0 /f | |
@REM *** Disable Cortana & Telemetry *** | |
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0 | |
REM *** Hide the search box from taskbar. You can still search by pressing the Win key and start typing what you're looking for *** | |
REM 0 = hide completely, 1 = show only icon, 2 = show long search box | |
reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "SearchboxTaskbarMode" /t REG_DWORD /d 0 /f | |
REM *** Disable MRU lists (jump lists) of XAML apps in Start Menu *** | |
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Start_TrackDocs" /t REG_DWORD /d 0 /f | |
REM *** Set Windows Explorer to start on This PC instead of Quick Access *** | |
REM 1 = This PC, 2 = Quick access | |
REM reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "LaunchTo" /t REG_DWORD /d 1 /f | |
@echo. | |
@echo Hecho! | |
@echo. | |
rem # Mejoras en el Explorador de Windows | |
@echo Habilitando opciones avanzadas en el Explorador de Windows ... | |
rem * Mostrar archivos ocultos | |
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d 1 /f | |
rem * Mostrar archivos ocultos de sistema | |
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSuperHidden" /t REG_DWORD /d 1 /f | |
rem * Mostrar extensión de los archivos | |
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d 0 /f | |
@echo. | |
@echo Hecho! | |
@echo. | |
rem # Deshabilitar Cortana | |
@echo Deshabilitando completamente cortana ... | |
taskkill /F /IM SearchUI.exe | |
move "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy.bak" | |
@echo. | |
@echo Hecho! | |
@echo. | |
REM # Eliminar/deshabilitar OneDrive | |
start /wait "" "%SYSTEMROOT%\SYSWOW64\ONEDRIVESETUP.EXE" /UNINSTALL | |
rd C:\OneDriveTemp /Q /S >NUL 2>&1 | |
rd "%USERPROFILE%\OneDrive" /Q /S >NUL 2>&1 | |
rd "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S >NUL 2>&1 | |
rd "%PROGRAMDATA%\Microsoft OneDrive" /Q /S >NUL 2>&1 | |
reg add "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder" /f /v Attributes /t REG_DWORD /d 0 >NUL 2>&1 | |
reg add "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder" /f /v Attributes /t REG_DWORD /d 0 >NUL 2>&1 | |
@echo OneDrive eliminado. Se va a reiniciar el Explorador de Windows para aplicar los cambios ... | |
start /wait TASKKILL /F /IM explorer.exe | |
start explorer.exe | |
@echo. | |
@echo Hecho! | |
@echo. | |
@echo Terminado! | |
@echo. | |
@echo Reinicie manualmente el equipo | |
) | |
pause | |
exit |
hi, can u post the inverse action of this Sript? Unfortunately for me, i used it but some functions of my pc goes down or broken. I apreciate if you can do that.
When you use a Script, you have to make a system restore point before. If you don't understand the script don't excecute then.
Debes leer el código antes de armarlos, elimina no que no necesitas y lo conviertes de hecho hay líneas de códigos que te dicen que hace cada segmento.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
hi, can u post the inverse action of this Sript? Unfortunately for me, i used it but some functions of my pc goes down or broken. I apreciate if you can do that.