Since i‘ve been doing this sort of thing for many years here are some basic rules:
- Get LTSC (W10) or IoT/Enterprise (W11) images to begin with
- Get https://www.ntlite.com/ .. you won‘t find any other tool which does a better job at removing packages, adding drivers, etc. Worth every penny with great support.
- Use GroupPolicies to configure your system. Take the time and download them for Office, Edge, Chrome, Firefox and update those that come with Windows.
- Integrate drivers not only for the base image but also in the recovery and setup image.
- Install a firewall (binisoft is fine)
- Use NextDNS
- If you don’t mind the security implications: Disable Defender, SmartScreen, BootGuard and VBS (use bcdedit)
- Disable Microcode loading (delete the DLL)
- Disable Spectre/Meltdown mitigations
- If you need Office: Use the LTSC versionMost third party tools are outdated or do stupid stuff which isn’t needed. You can silence Windows with the right GroupPolicies quite easy.
p_ing|11 months ago
PufPufPuf|11 months ago
7bit|11 months ago
Installing a custom Firewall and Antivirus ist straight counteproductive, as ist disabling security features... obvisouly.
Downloading and installing group policies however is often required and a typical enterprise scenario.
Whenever I hear people praise these kind of things I know they don't really have any professional knowledge. It's fine to configure your own system, but suggesting these things SHOULD be done pisses me off to no end.
atVelocet|11 months ago
There‘s a reason i wrote a hint about the security. If you keep this in mind and know what you are doing (like take such a setup as a base for VMs) this totally fine.
I am also not aware of any Spectre/Meltdown exploits ever to be found in the wild. If you are not running on a shared system i don’t see a need for those mitigations.
Regarding the third party tool: NTlite uses `dism` under the hood with which you can achieve the same results. You are already sending your DNS to a third party (like your ISP).
You also should never ever alter the hosts file and abuse it for ad blocking and such.
Microsoft supplies the latest group policies for their software. Or how else do you handle those on a local system?
I never said my post was about security but on how to alter your local system in a „more correct“ way with a clear hint about security. If you don’t know what you are doing then you should think twice when touching your system.
Novosell|11 months ago
Can't believe NSO group is here doing some weird psyop. Very funny.
7bit|11 months ago