Skip to content

Instantly share code, notes, and snippets.

@jumarag
Last active February 16, 2024 06:06
Show Gist options
  • Star 7 You must be signed in to star a gist
  • Fork 4 You must be signed in to fork a gist
  • Save jumarag/738fd121c8f3a37cc6240993853a6977 to your computer and use it in GitHub Desktop.
Save jumarag/738fd121c8f3a37cc6240993853a6977 to your computer and use it in GitHub Desktop.
Script bat que elimina telemetría y aplicaciones por defecto en Windows 10
@echo off
rem # ################################################################################################################################
rem # Script para eliminar aplicaciones por defecto en Windows 10 y mejorar la privacidad #
rem # Se eliminan todas las aplicaciones integradas incluido skype y onedrive #
rem # Cortana no se puede eliminar directamente pero si se puede modificar su ubicación para que el sistema no inicie la aplicación #
rem # ###############################################################################################################################
if not "%cd%"=="%windir%\system32" (
echo Debes ejecutarlo como Administrador.
echo Click derecho y "Ejecutar como administrador"
@echo.
) else (
@echo ###############################################################################
@echo ### Mejora la privacidad de Windows 10 y elimina aplicaciones preinstaladas ###
@echo ###############################################################################
@echo.
rem # Elimina las aplicaciones preinstaladas de Windows 10
@echo.
@echo Eliminando aplicaciones preinstaladas ...
PowerShell -Command "Get-AppxPackage *3DBuilder* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *Cortana* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *Getstarted* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *WindowsAlarms* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *WindowsCamera* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *bing* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *MicrosoftOfficeHub* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *OneNote* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *people* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *WindowsPhone* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *photos* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *SkypeApp* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *solit* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *WindowsSoundRecorder* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *xbox* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *windowscommunicationsapps* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *zune* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *WindowsCalculator* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *WindowsMaps* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *Sway* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *CommsPhone* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *ConnectivityStore* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *Microsoft.Messaging* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *ContentDeliveryManager* | Remove-AppxPackage"
PowerShell -Command "Get-AppxPackage *Microsoft.WindowsStore* | Remove-AppxPackage"
@echo.
@echo Hecho!
@echo.
rem # Dominios de Microsoft que envían datos del equipo
@echo Añadiendo los dominios a bloquear en el fichero hosts ...
@echo.>> %windir%\system32\drivers\etc\hosts
@echo ### Dominios de Microsoft que envian datos del equipo>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 settings-sandbox.data.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 statsfe1.ws.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 fe2.update.microsoft.com.akadns.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 telemetry.appex.bing.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 cs1.wpc.v0cdn.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 redir.metaservices.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 i1.services.social.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 sls.update.microsoft.com.akadns.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 diagnostics.support.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 choice.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 choice.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 a-0001.a-msedge.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 pre.footprintpredict.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 watson.live.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 survey.watson.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 compatexchange.cloudapp.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 vortex.data.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 vortex-win.data.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 vortex-sandbox.data.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 watson.ppe.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 reports.wes.df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 services.wes.df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 wes.df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 sqm.df.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 statsfe2.ws.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 statsfe2.update.microsoft.com.akadns.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 watson.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 watson.telemetry.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 oca.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 oca.telemetry.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 watson.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 telecommand.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 telecommand.telemetry.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 sqm.telemetry.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 sqm.telemetry.microsoft.com.nsatc.net>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 corpext.msitadfs.glbdns2.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 corp.sts.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo 127.0.0.1 telemetry.urs.microsoft.com>> %windir%\system32\drivers\etc\hosts
@echo.>> %windir%\system32\drivers\etc\hosts
@echo.
@echo Hecho!
@echo.
rem # Añadir direcciones IP al cortafuegos de Windows. En el anexo están todas las direcciones para añadirlas también al router
rem # La IP 204.79.197.200 es la que se utiliza entre otras cosas para acceder a www.bing.com
@echo Añadiendo reglas al firewall de Windows ...
netsh advfirewall set allprofiles state on
rem # Si se quiere tener acceso al buscador bing, comentar éstas líneas
netsh advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes
netsh advfirewall firewall add rule name="telemetry_a-0001.a-msedge.net" dir=out action=block remoteip=204.79.197.200 enable=yes
netsh advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes
rem #####################################################################################################################################
netsh advfirewall firewall add rule name="telemetry_vortex.data.microsoft.com" dir=out action=block remoteip=191.232.139.254 enable=yes
netsh advfirewall firewall add rule name="telemetry_telecommand.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.92 enable=yes
netsh advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.63 enable=yes
netsh advfirewall firewall add rule name="telemetry_sqm.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.93 enable=yes
netsh advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes
netsh advfirewall firewall add rule name="telemetry_redir.metaservices.microsoft.com" dir=out action=block remoteip=194.44.4.200,194.44.4.208 enable=yes
netsh advfirewall firewall add rule name="telemetry_choice.microsoft.com" dir=out action=block remoteip=157.56.91.77 enable=yes
netsh advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes
netsh advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes
netsh advfirewall firewall add rule name="telemetry_wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.93 enable=yes
netsh advfirewall firewall add rule name="telemetry_services.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.92 enable=yes
netsh advfirewall firewall add rule name="telemetry_sqm.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.94 enable=yes
netsh advfirewall firewall add rule name="telemetry_telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.9 enable=yes
netsh advfirewall firewall add rule name="telemetry_watson.ppe.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.11 enable=yes
netsh advfirewall firewall add rule name="telemetry_telemetry.appex.bing.net" dir=out action=block remoteip=168.63.108.233 enable=yes
netsh advfirewall firewall add rule name="telemetry_telemetry.urs.microsoft.com" dir=out action=block remoteip=157.56.74.250 enable=yes
netsh advfirewall firewall add rule name="telemetry_settings-sandbox.data.microsoft.com" dir=out action=block remoteip=111.221.29.177 enable=yes
netsh advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes
netsh advfirewall firewall add rule name="telemetry_survey.watson.microsoft.com" dir=out action=block remoteip=207.68.166.254 enable=yes
netsh advfirewall firewall add rule name="telemetry_watson.live.com" dir=out action=block remoteip=207.46.223.94 enable=yes
netsh advfirewall firewall add rule name="telemetry_watson.microsoft.com" dir=out action=block remoteip=65.55.252.71 enable=yes
netsh advfirewall firewall add rule name="telemetry_statsfe2.ws.microsoft.com" dir=out action=block remoteip=64.4.54.22 enable=yes
netsh advfirewall firewall add rule name="telemetry_corpext.msitadfs.glbdns2.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes
netsh advfirewall firewall add rule name="telemetry_compatexchange.cloudapp.net" dir=out action=block remoteip=23.99.10.11 enable=yes
netsh advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes
netsh advfirewall firewall add rule name="telemetry_statsfe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=64.4.54.22 enable=yes
netsh advfirewall firewall add rule name="telemetry_sls.update.microsoft.com.akadns.net" dir=out action=block remoteip=157.56.77.139 enable=yes
netsh advfirewall firewall add rule name="telemetry_fe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=134.170.58.121,134.170.58.123,134.170.53.29,66.119.144.190,134.170.58.189,134.170.58.118,134.170.53.30,134.170.51.190 enable=yes
netsh advfirewall firewall add rule name="telemetry_diagnostics.support.microsoft.com" dir=out action=block remoteip=157.56.121.89 enable=yes
netsh advfirewall firewall add rule name="telemetry_corp.sts.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes
netsh advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes
netsh advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes
netsh advfirewall firewall add rule name="telemetry_feedback.windows.com" dir=out action=block remoteip=134.170.185.70 enable=yes
netsh advfirewall firewall add rule name="telemetry_feedback.microsoft-hohm.com" dir=out action=block remoteip=64.4.6.100,65.55.39.10 enable=yes
netsh advfirewall firewall add rule name="telemetry_feedback.search.microsoft.com" dir=out action=block remoteip=157.55.129.21 enable=yes
netsh advfirewall firewall add rule name="telemetry_rad.msn.com" dir=out action=block remoteip=207.46.194.25 enable=yes
netsh advfirewall firewall add rule name="telemetry_preview.msn.com" dir=out action=block remoteip=23.102.21.4 enable=yes
netsh advfirewall firewall add rule name="telemetry_dart.l.doubleclick.net" dir=out action=block remoteip=173.194.113.220,173.194.113.219,216.58.209.166 enable=yes
netsh advfirewall firewall add rule name="telemetry_ads.msn.com" dir=out action=block remoteip=157.56.91.82,157.56.23.91,104.82.14.146,207.123.56.252,185.13.160.61,8.254.209.254 enable=yes
netsh advfirewall firewall add rule name="telemetry_a.ads1.msn.com" dir=out action=block remoteip=198.78.208.254,185.13.160.61 enable=yes
netsh advfirewall firewall add rule name="telemetry_global.msads.net.c.footprint.net" dir=out action=block remoteip=185.13.160.61,8.254.209.254,207.123.56.252 enable=yes
netsh advfirewall firewall add rule name="telemetry_az361816.vo.msecnd.net" dir=out action=block remoteip=68.232.34.200 enable=yes
netsh advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com.nsatc.net" dir=out action=block remoteip=65.55.252.63 enable=yes
netsh advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes
netsh advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes
netsh advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes
netsh advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes
netsh advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes
netsh advfirewall firewall add rule name="telemetry_ssw.live.com" dir=out action=block remoteip=207.46.101.29 enable=yes
netsh advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes
netsh advfirewall firewall add rule name="telemetry_msnbot-65-55-108-23.search.msn.com" dir=out action=block remoteip=65.55.108.23 enable=yes
netsh advfirewall firewall add rule name="telemetry_a23-218-212-69.deploy.static.akamaitechnologies.com" dir=out action=block remoteip=23.218.212.69 enable=yes
@echo.
@echo Hecho!
@echo.
rem # Deshabilitar servicios
@echo Deshabilitando servicios ...
sc stop DiagTrack
sc stop diagnosticshub.standardcollector.service
sc stop dmwappushservice
rem sc stop dmwappushsvc ::comprobar
sc stop WMPNetworkSvc
sc stop WSearch
rem # Deshabilitamos los servicios
sc config DiagTrack start= disabled
sc config diagnosticshub.standardcollector.service start= disabled
sc config dmwappushservice start= disabled
rem sc config dmwappusvc start= disabled ::comprobar
REM sc config RemoteRegistry start= disabled
REM sc config TrkWks start= disabled
sc config WMPNetworkSvc start= disabled
sc config WSearch start= disabled
@echo.
@echo Hecho!
@echo.
REM *** SCHEDULED TASKS tweaks ***
REM schtasks /Change /TN "Microsoft\Windows\AppID\SmartScreenSpecific" /Disable
schtasks /Change /TN "Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /Disable
schtasks /Change /TN "Microsoft\Windows\Application Experience\ProgramDataUpdater" /Disable
schtasks /Change /TN "Microsoft\Windows\Application Experience\StartupAppTask" /Disable
schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /Disable
schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /Disable
schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /Disable
schtasks /Change /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader" /Disable
schtasks /Change /TN "Microsoft\Windows\Shell\FamilySafetyUpload" /Disable
schtasks /Change /TN "Microsoft\Office\OfficeTelemetryAgentLogOn" /Disable
schtasks /Change /TN "Microsoft\Office\OfficeTelemetryAgentFallBack" /Disable
schtasks /Change /TN "Microsoft\Office\Office 15 Subscription Heartbeat" /Disable
rem # Eliminar telemetría y recolección de datos
@echo Eliminando telemetría ...
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Device Metadata" /v PreventDeviceMetadataFromNetwork /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v DontOfferThroughWUAU /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows" /v "CEIPEnable" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "AITEnable" /t REG_DWORD /d 0 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat" /v "DisableUAR" /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 0 /f
reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\AutoLogger-Diagtrack-Listener" /v "Start" /t REG_DWORD /d 0 /f
reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\SQMLogger" /v "Start" /t REG_DWORD /d 0 /f
@REM Settings -> Privacy -> General -> Let apps use my advertising ID...
reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /v Enabled /t REG_DWORD /d 0 /f
REM - SmartScreen Filter for Store Apps: Disable
reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v EnableWebContentEvaluation /t REG_DWORD /d 0 /f
REM - Let websites provide locally...
reg add "HKCU\Control Panel\International\User Profile" /v HttpAcceptLanguageOptOut /t REG_DWORD /d 1 /f
@REM WiFi Sense: HotSpot Sharing: Disable
reg add "HKLM\Software\Microsoft\PolicyManager\default\WiFi\AllowWiFiHotSpotReporting" /v value /t REG_DWORD /d 0 /f
@REM WiFi Sense: Shared HotSpot Auto-Connect: Disable
reg add "HKLM\Software\Microsoft\PolicyManager\default\WiFi\AllowAutoConnectToWiFiSenseHotspots" /v value /t REG_DWORD /d 0 /f
@REM Change Windows Updates to "Notify to schedule restart"
reg add "HKLM\SOFTWARE\Microsoft\WindowsUpdate\UX\Settings" /v UxOption /t REG_DWORD /d 1 /f
@REM Disable P2P Update downlods outside of local network
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config" /v DODownloadMode /t REG_DWORD /d 0 /f
@REM *** Disable Cortana & Telemetry ***
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /t REG_DWORD /d 0
REM *** Hide the search box from taskbar. You can still search by pressing the Win key and start typing what you're looking for ***
REM 0 = hide completely, 1 = show only icon, 2 = show long search box
reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "SearchboxTaskbarMode" /t REG_DWORD /d 0 /f
REM *** Disable MRU lists (jump lists) of XAML apps in Start Menu ***
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Start_TrackDocs" /t REG_DWORD /d 0 /f
REM *** Set Windows Explorer to start on This PC instead of Quick Access ***
REM 1 = This PC, 2 = Quick access
REM reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "LaunchTo" /t REG_DWORD /d 1 /f
@echo.
@echo Hecho!
@echo.
rem # Mejoras en el Explorador de Windows
@echo Habilitando opciones avanzadas en el Explorador de Windows ...
rem * Mostrar archivos ocultos
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d 1 /f
rem * Mostrar archivos ocultos de sistema
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSuperHidden" /t REG_DWORD /d 1 /f
rem * Mostrar extensión de los archivos
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d 0 /f
@echo.
@echo Hecho!
@echo.
rem # Deshabilitar Cortana
@echo Deshabilitando completamente cortana ...
taskkill /F /IM SearchUI.exe
move "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy" "%windir%\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy.bak"
@echo.
@echo Hecho!
@echo.
REM # Eliminar/deshabilitar OneDrive
start /wait "" "%SYSTEMROOT%\SYSWOW64\ONEDRIVESETUP.EXE" /UNINSTALL
rd C:\OneDriveTemp /Q /S >NUL 2>&1
rd "%USERPROFILE%\OneDrive" /Q /S >NUL 2>&1
rd "%LOCALAPPDATA%\Microsoft\OneDrive" /Q /S >NUL 2>&1
rd "%PROGRAMDATA%\Microsoft OneDrive" /Q /S >NUL 2>&1
reg add "HKEY_CLASSES_ROOT\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder" /f /v Attributes /t REG_DWORD /d 0 >NUL 2>&1
reg add "HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\ShellFolder" /f /v Attributes /t REG_DWORD /d 0 >NUL 2>&1
@echo OneDrive eliminado. Se va a reiniciar el Explorador de Windows para aplicar los cambios ...
start /wait TASKKILL /F /IM explorer.exe
start explorer.exe
@echo.
@echo Hecho!
@echo.
@echo Terminado!
@echo.
@echo Reinicie manualmente el equipo
)
pause
exit
@isawebs
Copy link

isawebs commented Sep 26, 2018

hi, can u post the inverse action of this Sript? Unfortunately for me, i used it but some functions of my pc goes down or broken. I apreciate if you can do that.

@fernandodavilajara
Copy link

hi, can u post the inverse action of this Sript? Unfortunately for me, i used it but some functions of my pc goes down or broken. I apreciate if you can do that.

When you use a Script, you have to make a system restore point before. If you don't understand the script don't excecute then.

@SirFrederickIbarra
Copy link

Debes leer el código antes de armarlos, elimina no que no necesitas y lo conviertes de hecho hay líneas de códigos que te dicen que hace cada segmento.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment