Manage connections from Windows operating system components to Microsoft services

Applies to

  • Windows 10
  • Windows Server 2016

If you're looking for content on what each telemetry level means and how to configure it in your organization, see Configure Windows telemetry in your organization.

Learn about the network connections that Windows components make to Microsoft and also the privacy settings that affect data that is shared with either Microsoft or apps and how they can be managed by an IT Pro.

If you want to minimize connections from Windows to Microsoft services, or configure particular privacy settings, this article covers the settings that you could consider. You can configure telemetry at the lowest level for your edition of Windows, and also evaluate which other connections Windows makes to Microsoft services you want to turn off in your environment from the list in this article.

You can configure telemetry at the Security level, turn off Windows Defender telemetry and MSRT reporting, and turn off all other connections to Microsoft network endpoints as described in this article to help prevent Windows from sending any data to Microsoft. There are many reasons why these communications are enabled by default, such as updating malware definitions and maintain current certificate revocation lists, which is why we strongly recommend against this. This data helps us deliver a secure, reliable, and more delightful personalized experience.

To help make it easier to deploy settings to restrict connections from Windows 10 to Microsoft, you can apply the Windows Restricted Traffic Limited Functionality Baseline. This baseline was created in the same way as the Windows security baselines that are often used to efficiently configure Windows to a known secure state. Running the Windows Restricted Traffic Limited Functionality Baseline on devices in your organization will allow you to quickly configure all of the settings covered in this document. However, some of the settings reduce the functionality and security configuration of your device and are therefore not recommended. Make sure should you've chosen the right settings configuration for your environment before applying. You should not extract this package to the windows\system32 folder because it will not apply correctly. Applying this baseline is equivalent to applying the Windows 10 steps covered in this article.

We are always striving to improve our documentation and welcome your feedback. You can provide feedback by contacting telmhelp@microsoft.com.

What's new in Windows 10, version 1703

Here's a list of changes that were made to this article for Windows 10, version 1703:

  • Added an MDM policy for Font streaming.
  • Added an MDM policy for Network Connection Status Indicator.
  • Added an MDM policy for the Micosoft Account Sign-In Assistant.
  • Added instructions for removing the Sticky Notes app.
  • Added registry paths for some Group Policies
  • Added the Find My Device section
  • Added the Tasks section
  • Added the App Diagnostics section

  • Added the following Group Policies:

    • Prevent managing SmartScreen Filter
    • Turn off Compatibility View
    • Turn off Automatic Download and Install of updates
    • Do not connect to any Windows Update locations
    • Turn off access to all Windows Update features
    • Specify Intranet Microsoft update service location
    • Enable Windows NTP client
    • Turn off Automatic download of the ActiveX VersionList
    • Allow Automatic Update of Speech Data
    • Accounts: Block Microsoft Accounts
    • Do not use diagnostic data for tailored experiences

Settings

The following sections list the components that make network connections to Microsoft services by default. You can configure these settings to control the data that is sent to Microsoft. To prevent Windows from sending any data to Microsoft, configure telemetry at the Security level, turn off Windows Defender telemetry and MSRT reporting, and turn off all of these connections.

If you're running Windows 10, they will be included in the next update for the Long Term Servicing Branch.

Settings for Windows 10 Enterprise, version 1703

See the following table for a summary of the management settings for Windows 10 Enterprise, version 1703.

Setting UI Group Policy MDM policy Registry Command line
1. Certificate trust lists Check mark
2. Cortana and Search Check mark Check mark Check mark Check mark Check mark
3. Date & Time Check mark Check mark Check mark
4. Device metadata retrieval Check mark Check mark
5. Find My Device Check mark
6. Font streaming Check mark Check mark
7. Insider Preview builds Check mark Check mark Check mark Check mark Check mark
8. Internet Explorer Check mark Check mark Check mark
9. Live Tiles Check mark Check mark
10. Mail synchronization Check mark Check mark Check mark
11. Microsoft Account Check mark Check mark Check mark
12. Microsoft Edge Check mark Check mark Check mark Check mark Check mark
13. Network Connection Status Indicator Check mark Check mark
14. Offline maps Check mark Check mark Check mark
15. OneDrive Check mark Check mark
16. Preinstalled apps Check mark Check mark
17. Settings > Privacy
    17.1 General Check mark Check mark Check mark Check mark
    17.2 Location Check mark Check mark Check mark Check mark
    17.3 Camera Check mark Check mark Check mark Check mark
    17.4 Microphone Check mark Check mark Check mark Check mark
    17.5 Notifications Check mark Check mark Check mark Check mark
    17.6 Speech, inking, & typing Check mark Check mark Check mark Check mark
    17.7 Account info Check mark Check mark Check mark Check mark
    17.8 Contacts Check mark Check mark Check mark Check mark
    17.9 Calendar Check mark Check mark Check mark Check mark
    17.10 Call history Check mark Check mark Check mark Check mark
    17.11 Email Check mark Check mark Check mark Check mark
    17.12 Messaging Check mark Check mark Check mark Check mark
    17.13 Radios Check mark Check mark Check mark Check mark
    17.14 Other devices Check mark Check mark Check mark Check mark
    17.15 Feedback & diagnostics Check mark Check mark Check mark Check mark
    17.16 Background apps Check mark Check mark Check mark
    17.17 Motion Check mark Check mark Check mark Check mark
    17.18 Tasks Check mark Check mark Check mark Check mark
    17.19 App Diagnostics Check mark Check mark Check mark Check mark
18. Software Protection Platform Check mark Check mark Check mark
19. Sync your settings Check mark Check mark Check mark Check mark
20. Teredo Check mark Check mark Check mark
21. Wi-Fi Sense Check mark Check mark Check mark
22. Windows Defender Check mark Check mark Check mark
23. Windows Media Player Check mark Check mark
24. Windows Spotlight Check mark Check mark Check mark Check mark
25. Microsoft Store Check mark Check mark
26. Windows Update Delivery Optimization Check mark Check mark Check mark Check mark
27. Windows Update Check mark Check mark Check mark

Settings for Windows Server 2016 with Desktop Experience

See the following table for a summary of the management settings for Windows Server 2016 with Desktop Experience.

Setting UI Group Policy Registry Command line
1. Certificate trust lists Check mark Check mark
2. Cortana and Search Check mark Check mark Check mark
3. Date & Time Check mark Check mark Check mark
4. Device metadata retrieval Check mark Check mark
6. Font streaming Check mark Check mark
7. Insider Preview builds Check mark Check mark Check mark
8. Internet Explorer Check mark Check mark Check mark
9. Live Tiles Check mark Check mark
11. Microsoft Account Check mark Check mark
13. Network Connection Status Indicator Check mark Check mark
15. OneDrive Check mark
17. Settings > Privacy
    17.1 General Check mark Check mark Check mark
18. Software Protection Platform Check mark Check mark
20. Teredo Check mark Check mark Check mark
22. Windows Defender Check mark Check mark
23. Windows Media Player Check mark
25. Microsoft Store Check mark Check mark
27. Windows Update Check mark Check mark

Settings for Windows Server 2016 Server Core

See the following table for a summary of the management settings for Windows Server 2016 Server Core.

Setting Group Policy Registry Command line
1. Certificate trust lists Check mark Check mark
3. Date & Time Check mark Check mark
6. Font streaming Check mark Check mark
13. Network Connection Status Indicator Check mark
18. Software Protection Platform Check mark
20. Teredo Check mark Check mark
22. Windows Defender Check mark Check mark
27. Windows Update Check mark Check mark

Settings for Windows Server 2016 Nano Server

See the following table for a summary of the management settings for Windows Server 2016 Nano Server.

Setting Registry Command line
1. Certificate trust lists Check mark
3. Date & Time Check mark
20. Teredo Check mark
27. Windows Update Check mark

Settings

Use the following sections for more information about how to configure each setting.

1. Certificate trust lists

A certificate trust list is a predefined list of items, such as a list of certificate hashes or a list of file name, that are signed by a trusted entity. Windows automatically downloads an updated certificate trust list when it is available.

To turn off the automatic download of an updated certificate trust list, you can turn off automatic root updates, which also includes the disallowed certificate list and the pin rules list.

Caution

By not automatically downloading the root certificates, the device might have not be able to connect to some websites.

For Windows 10, Windows Server 2016 with Desktop Experience, and Windows Server 2016 Server Core:

  • Enable the Group Policy: Computer Configuration > Administrative Templates > System > Internet Communication Management > Internet Communication Settings > Turn off Automatic Root Certificates Update

    -and-

  1. Navigate to Computer Configuration > Windows Settings > Security Settings > Public Key Policies.
  2. Double-click Certificate Path Validation Settings.
  3. On the Network Retrieval tab, select the Define these policy settings check box.
  4. Clear the Automatically update certificates in the Microsoft Root Certificate Program (recommended) check box, and then click OK.

    -or-

  • Create the registry path HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SystemCertificates\AuthRoot and then add a REG_DWORD registry setting, called DisableRootAutoUpdate, with a value of 1.

    -and-

  1. Navigate to Computer Configuration > Windows Settings > Security Settings > Public Key Policies.
  2. Double-click Certificate Path Validation Settings.
  3. On the Network Retrieval tab, select the Define these policy settings check box.
  4. Clear the Automatically update certificates in the Microsoft Root Certificate Program (recommended) check box, and then click OK.

On Windows Server 2016 Nano Server:

  • Create the registry path HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SystemCertificates\AuthRoot and then add a REG_DWORD registry setting, called DisableRootAutoUpdate, with a value of 1.
Note

CRL and OCSP network traffic is currently whitelisted and will still show up in network traces. CRL and OCSP checks are made to the issuing certificate authorities. Microsoft is one of them, but there are many others, such as DigiCert, Thawte, Google, Symantec, and VeriSign.

Use either Group Policy or MDM policies to manage settings for Cortana. For more info, see Cortana, Search, and privacy: FAQ.

2.1 Cortana and Search Group Policies

Find the Cortana Group Policy objects under Computer Configuration > Administrative Templates > Windows Components > Search.

Policy Description
Allow Cortana Choose whether to let Cortana install and run on the device.

Disable this policy to turn off Cortana.
Allow search and Cortana to use location Choose whether Cortana and Search can provide location-aware search results.

Disable this policy to block access to location information for Cortana.
Do not allow web search Choose whether to search the web from Windows Desktop Search.

Enable this policy to remove the option to search the Internet from Cortana.
Don't search the web or display web results in Search Choose whether to search the web from Cortana.

Enable this policy to stop web queries and results from showing in Search.
Set what information is shared in Search Control what information is shared with Bing in Search.

If you enable this policy and set it to Anonymous info, usage information will be shared but not search history, Microsoft Account information, or specific location.

You can also apply the Group Policies using the following registry keys:

Policy Registry Path
Allow Cortana HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search!AllowCortana
REG_DWORD: 0
Allow search and Cortana to use location HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search!AllowSearchToUseLocation
REG_DWORD: 0
Do not allow web search HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search!DisableWebSearch
REG_DWORD: 1
Don't search the web or display web results in Search HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search!ConnectedSearchUseWeb
REG_DWORD: 0
Set what information is shared in Search HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windows Search!ConnectedSearchPrivacy
REG_DWORD: 3

In Windows 10, version 1507 and Windows 10, version 1511, when you enable the Don't search the web or display web results in Search Group Policy, you can control the behavior of whether Cortana searches the web to display web results. However, this policy only covers whether or not web search is performed. There could still be a small amount of network traffic to Bing.com to evaluate if certain Cortana components are up-to-date or not. In order to turn off that network activity completely, you can create a Windows Firewall rule to prevent outbound traffic.

Important

These steps are not required for devices running Windows 10, version 1607 or Windows Server 2016.

  1. Expand Computer Configuration > Windows Settings > Security Settings > Windows Firewall with Advanced Security > Windows Firewall with Advanced Security - <LDAP name>, and then click Outbound Rules.

  2. Right-click Outbound Rules, and then click New Rule. The New Outbound Rule Wizard starts.

  3. On the Rule Type page, click Program, and then click Next.

  4. On the Program page, click This program path, type %windir%\systemapps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe, and then click Next.

  5. On the Action page, click Block the connection, and then click Next.

  6. On the Profile page, ensure that the Domain, Private, and Public check boxes are selected, and then click Next.

  7. On the Name page, type a name for the rule, such as Cortana firewall configuration, and then click Finish.

  8. Right-click the new rule, click Properties, and then click Protocols and Ports.

  9. Configure the Protocols and Ports page with the following info, and then click OK.

    • For Protocol type, choose TCP.

    • For Local port, choose All Ports.

    • For Remote port, choose All ports.

If your organization tests network traffic, do not use a network proxy as Windows Firewall does not block proxy traffic. Instead, use a network traffic analyzer. Based on your needs, there are many network traffic analyzers available at no cost.

2.2 Cortana and Search MDM policies

For Windows 10 only, the following Cortana MDM policies are available in the Policy CSP.

Policy Description
Experience/AllowCortana Choose whether to let Cortana install and run on the device.
Search/AllowSearchToUseLocation Choose whether Cortana and Search can provide location-aware search results.
Default: Allowed

3. Date & Time

You can prevent Windows from setting the time automatically.

  • To turn off the feature in the UI: Settings > Time & language > Date & time > Set time automatically

    -or-

  • Create a REG_SZ registry setting in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters\Type with a value of NoSync.

After that, configure the following:

  • Disable the Group Policy: Computer Configuration > Administrative Templates > System > Enable Windows NTP Server > Windows Time Service > Configure Windows NTP Client

    Note

    This is only available on Windows 10, version 1703 and later. If you're using Windows 10, version 1607, the Group Policy setting is Computer Configuration > Administrative Templates > System > Windows Time Service > Time Providers > Enable Windows NTP Client

    -or -

  • Create a new REG_DWORD registry setting HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\W32time\TimeProviders\NtpClient!Enabled and set it to 0 (zero).

4. Device metadata retrieval

To prevent Windows from retrieving device metadata from the Internet, apply the Group Policy: Computer Configuration > Administrative Templates > System > Device Installation > Prevent device metadata retrieval from the Internet.

You can also create a new REG_DWORD registry setting HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Device Metadata!PreventDeviceMetadataFromNetwork to 1 (one).

5. Find My Device

To turn off Find My Device:

  • Turn off the feature in the UI

    -or-

  • Disable the Group Policy: Computer Configuration > Administrative Template > Windows Components > Find My Device > Turn On/Off Find My Device

You can also create a new REG_DWORD registry setting HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Device Metadata!PreventDeviceMetadataFromNetwork to 1 (one).

6. Font streaming

Fonts that are included in Windows but that are not stored on the local device can be downloaded on demand.

If you're running Windows 10, version 1607, Windows Server 2016, or later:

  • Disable the Group Policy: Computer Configuration > Administrative Templates > Network > Fonts > Enable Font Providers.

  • Create a new REG_DWORD registry setting HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System\EnableFontProviders to 0 (zero).

  • In Windows 10, version 1703, you can apply the System/AllowFontProviders MDM policy from the Policy CSP where:

    • false. Font streaming is disabled.

    • true. Font streaming is enabled.

If you're running Windows 10, version 1507 or Windows 10, version 1511, create a REG_DWORD registry setting called DisableFontProviders in HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\FontCache\Parameters, with a value of 1.

Note

After you apply this policy, you must restart the device for it to take effect.

7. Insider Preview builds

The Windows Insider Preview program lets you help shape the future of Windows, be part of the community, and get early access to releases of Windows 10.

Note

This setting stops communication with the Windows Insider Preview service that checks for new builds. Windows Insider Preview builds only apply to Windows 10 and are not available for Windows Server 2016.

To turn off Insider Preview builds for a released version of Windows 10:

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > Toggle user control over Insider builds.

To turn off Insider Preview builds for Windows 10:

Note

If you're running a preview version of Windows 10, you must roll back to a released version before you can turn off Insider Preview builds.

  • Turn off the feature in the UI: Settings > Update & security > Windows Insider Program > Stop Insider Preview builds.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > Toggle user control over Insider builds.

    -or -

  • Create a new REG_DWORD registry setting HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PreviewBuilds!AllowBuildPreview to 0 (zero)

    -or-

  • Apply the System/AllowBuildPreview MDM policy from the Policy CSP where:

    • 0. Users cannot make their devices available for downloading and installing preview software.

    • 1. Users can make their devices available for downloading and installing preview software.

    • 2. (default) Not configured. Users can make their devices available for download and installing preview software.

    -or-

  • Create a provisioning package: Runtime settings > Policies > System > AllowBuildPreview, where:

    • 0. Users cannot make their devices available for downloading and installing preview software.

    • 1. Users can make their devices available for downloading and installing preview software.

    • 2. (default) Not configured. Users can make their devices available for download and installing preview software.

8. Internet Explorer

Use Group Policy to manage settings for Internet Explorer. You can find the Internet Explorer Group Policy objects under Computer Configuration > Administrative Templates > Windows Components > Internet Explorer.

Policy Description
Turn on Suggested Sites Choose whether an employee can configure Suggested Sites.
Default: Enabled
You can also turn this off in the UI by clearing the Internet Options > Advanced > Enable Suggested Sites check box.
Allow Microsoft services to provide enhanced suggestions as the user types in the Address Bar Choose whether an employee can configure enhanced suggestions, which are presented to the employee as they type in the address bar.
Default: Enabled
Turn off the auto-complete feature for web addresses Choose whether auto-complete suggests possible matches when employees are typing web address in the address bar.
Default: Disabled
You can also turn this off in the UI by clearing the Internet Options > Advanced > Use inline AutoComplete in the Internet Explorer Address Bar and Open Dialog check box.
Turn off browser geolocation Choose whether websites can request location data from Internet Explorer.
Default: Disabled
Prevent managing SmartScreen filter Choose whether employees can manage the SmartScreen Filter in Internet Explorer.
Default: Disabled

Alternatively, you could use the registry to set the Group Policies.

Policy Registry path
Turn on Suggested Sites HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Suggested Sites!Enabled
REG_DWORD: 0
Allow Microsoft services to provide enhanced suggestions as the user types in the Address Bar HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\AllowServicePoweredQSA
REG_DWORD: 0
Turn off the auto-complete feature for web addresses HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Explorer\AutoComplete!AutoSuggest
REG_SZ: No
Turn off browser geolocation HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Geolocation!PolicyDisableGeolocation
REG_DWORD: 1
Prevent managing SmartScreen filter HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\ Internet Explorer\PhishingFilter!EnabledV9
REG_DWORD: 0

There are three more Group Policy objects that are used by Internet Explorer:

Path Policy Description
Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Compatibility View > Turn off Compatibility View Choose whether employees can configure Compatibility View. Choose whether an employee can swipe across a screen or click forward to go to the next pre-loaded page of a website.
Default: Disabled
Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Advanced Page Turn off the flip ahead with page prediction feature Choose whether an employee can swipe across a screen or click forward to go to the next pre-loaded page of a website.
Default: Enabled
Computer Configuration > Administrative Templates > Windows Components > RSS Feeds Turn off background synchronization for feeds and Web Slices Choose whether to have background synchronization for feeds and Web Slices.
Default: Enabled

You can also use registry entries to set these Group Policies.

Policy Registry path
Choose whether employees can configure Compatibility View. HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\BrowserEmulation!MSCompatibilityMode
REG_DWORD: 0
Turn off the flip ahead with page prediction feature HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\FlipAhead!Enabled
REG_DWORD: 0
Turn off background synchronization for feeds and Web Slices HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Feeds!BackgroundSyncStatus
REG_DWORD:0

To turn off the home page, enable the Group Policy: User Configuration > Administrative Templates > Windows Components > Internet Explorer > Disable changing home page settings, and set it to about:blank.

To configure the First Run Wizard, enable the Group Policy: User Configuration > Administrative Templates > Windows Components > Internet Explorer > Prevent running First Run wizard, and set it to Go directly to home page.

To configure the behavior for a new tab, enable the Group Policy: User Configuration > Administrative Templates > Windows Components > Internet Explorer > Specify default behavior for a new tab, and set it to about:blank.

8.1 ActiveX control blocking

ActiveX control blocking periodically downloads a new list of out-of-date ActiveX controls that should be blocked.

You can turn this off by:

  • Apply the Group Policy: User Configuration > Administrative Templates > Windows Components > Internet Explorer > Security Features > Add-on Management > Turn off Automatic download of the ActiveX VersionList

    -or -

  • Changing the REG_DWORD registry setting HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\VersionManager\DownloadVersionList to 0 (zero).

For more info, see Out-of-date ActiveX control blocking.

9. Live Tiles

To turn off Live Tiles:

  • Apply the Group Policy: User Configuration > Administrative Templates > Start Menu and Taskbar > Notifications > Turn Off notifications network usage

    -or-

  • Create a REG_DWORD registry setting called HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\PushNotifications!NoCloudApplicationNotification, with a value of 1 (one).

In Windows 10 Mobile, you must also unpin all tiles that are pinned to Start.

10. Mail synchronization

To turn off mail synchronization for Microsoft Accounts that are configured on a device:

  • In Settings > Accounts > Your email and accounts, remove any connected Microsoft Accounts.

    -or-

  • Remove any Microsoft Accounts from the Mail app.

    -or-

  • Apply the Accounts/AllowMicrosoftAccountConnection MDM policy from the Policy CSP where 0 is not allowed and 1 is allowed. This does not apply to Microsoft Accounts that have already been configured on the device.

To turn off the Windows Mail app:

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Windows Mail > Turn off Windows Mail application

    -or-

  • Create a REG_DWORD registry setting called HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Mail!ManualLaunchAllowed, with a value of 0 (zero).

11. Microsoft Account

To prevent communication to the Microsoft Account cloud authentication service. Many apps and system components that depend on Microsoft Account authentication may lose functionality. Some of them could be in unexpected ways.

  • Apply the Group Policy: Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options > Accounts: Block Microsoft Accounts and set it to Users can't add Microsoft accounts.

    -or-

  • Create a REG_DWORD registry setting called HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System!NoConnectedUser, with a value of 3. To disable the Microsoft Account Sign-In Assistant:

  • Apply the Accounts/AllowMicrosoftAccountSignInAssistant MDM policy from the Policy CSP where 0 is turned off and 1 is turned on.

  • Change the Start REG_DWORD registry setting in HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wlidsvc to a value of 4.

12. Microsoft Edge

Use either Group Policy or MDM policies to manage settings for Microsoft Edge. For more info, see Microsoft Edge and privacy: FAQ.

12.1 Microsoft Edge Group Policies

Find the Microsoft Edge Group Policy objects under Computer Configuration > Administrative Templates > Windows Components > Microsoft Edge.

Policy Description
Configure Autofill Choose whether employees can use autofill on websites.
Default: Enabled
Configure Do Not Track Choose whether employees can send Do Not Track headers.
Default: Disabled
Configure Password Manager Choose whether employees can save passwords locally on their devices.
Default: Enabled
Configure search suggestions in Address bar Choose whether the address bar shows search suggestions.
Default: Enabled
Configure Windows Defender SmartScreen Filter (Windows 10, version 1703)
Configure SmartScreen Filter (Windows Server 2016)
Choose whether Windows Defender SmartScreen is turned on or off.
Default: Enabled
Allow web content on New Tab page Choose whether a new tab page appears.
Default: Enabled
Configure Start pages Choose the Start page for domain-joined devices.
Set this to <about:blank>
Prevent the First Run webpage from opening on Microsoft Edge Choose whether employees see the First Run webpage.
Default: Disabled

The Windows 10, version 1511 Microsoft Edge Group Policy names are:

Policy Description
Turn off autofill Choose whether employees can use autofill on websites.
Default: Enabled
Allow employees to send Do Not Track headers Choose whether employees can send Do Not Track headers.
Default: Disabled
Turn off password manager Choose whether employees can save passwords locally on their devices.
Default: Enabled
Turn off address bar search suggestions Choose whether the address bar shows search suggestions.
Default: Enabled
Turn off the SmartScreen Filter Choose whether SmartScreen is turned on or off.
Default: Enabled
Open a new tab with an empty tab Choose whether a new tab page appears.
Default: Enabled
Configure corporate Home pages Choose the corporate Home page for domain-joined devices.
Set this to about:blank

Alternatively, you can configure the Microsoft Group Policies using the following registry entries:

Policy Registry path
Configure Autofill HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\Main!Use FormSuggest
REG_SZ: no
Configure Do Not Track HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\Main!DoNotTrack
REG_DWORD: 1
Configure Password Manager HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\Main!FormSuggest Passwords
REG_SZ: no
Configure search suggestions in Address bar HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\SearchScopes!ShowSearchSuggestionsGlobal
REG_DWORD: 0
Configure Windows Defender SmartScreen Filter (Windows 10, version 1703) HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter!EnabledV9
REG_DWORD: 0
Allow web content on New Tab page HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\SearchScopes!AllowWebContentOnNewTabPage
REG_DWORD: 0
Configure corporate Home pages HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\ServiceUI!ProvisionedHomePages
REG_DWORD: 0

12.2 Microsoft Edge MDM policies

The following Microsoft Edge MDM policies are available in the Policy CSP.

Policy Description
Browser/AllowAutoFill Choose whether employees can use autofill on websites.
Default: Allowed
Browser/AllowDoNotTrack Choose whether employees can send Do Not Track headers.
Default: Not allowed
Browser/AllowMicrosoftCompatbilityList Specify the Microsoft compatibility list in Microsoft Edge.
Default: Enabled
Browser/AllowPasswordManager Choose whether employees can save passwords locally on their devices.
Default: Allowed
Browser/AllowSearchSuggestionsinAddressBar Choose whether the address bar shows search suggestions..
Default: Allowed
Browser/AllowSmartScreen Choose whether SmartScreen is turned on or off.
Default: Allowed
Browser/FirstRunURL Choose the home page for Microsoft Edge on Windows Mobile 10.
Default: blank

For a complete list of the Microsoft Edge policies, see Available policies for Microsoft Edge.

13. Network Connection Status Indicator

Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to http://www.msftconnecttest.com/connecttest.txt to determine if the device can communicate with the Internet. For more info about NCSI, see The Network Connection Status Icon.

In versions of Windows 10 prior to Windows 10, version 1607 and Windows Server 2016, the URL was http://www.msftncsi.com.

You can turn off NCSI by doing one of the following:

  • Enable the Group Policy: Computer Configuration > Administrative Templates > System > Internet Communication Management > Internet Communication Settings > Turn off Windows Network Connectivity Status Indicator active tests

  • In Windows 10, version 1703 and later, apply the Connectivity/DisallowNetworkConnectivityActiveTests MDM policy.

Note

After you apply this policy, you must restart the device for the policy setting to take effect.

-or-

  • Create a REG_DWORD registry setting called HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\NetworkConnectivityStatusIndicator!NoActiveProbe, with a value of 1 (one).

14. Offline maps

You can turn off the ability to download and update offline maps.

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Maps > Turn off Automatic Download and Update of Map Data

    -or-

  • Create a REG_DWORD registry setting called HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Maps!AutoDownloadAndUpdateMapData, with a value of 0 (zero).

    -and-

  • In Windows 10, version 1607 and later, apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Maps > Turn off unsolicited network traffic on the Offline Maps settings page

    -or-

  • Create a REG_DWORD registry setting called HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Maps!AllowUntriggeredNetworkTrafficOnSettingsPage, with a value of 0 (zero).

15. OneDrive

To turn off OneDrive in your organization:

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > OneDrive > Prevent the usage of OneDrive for file storage

    -or-

  • Create a REG_DWORD registry setting called HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\OneDrive!DisableFileSyncNGSC, with a value of 1 (one).

16. Preinstalled apps

Some preinstalled apps get content before they are opened to ensure a great experience. You can remove these using the steps in this section.

To remove the News app:

  • Right-click the app in Start, and then click Uninstall.

    -or-

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.BingNews"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.BingNews | Remove-AppxPackage

To remove the Weather app:

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.BingWeather"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.BingWeather | Remove-AppxPackage

To remove the Money app:

  • Right-click the app in Start, and then click Uninstall.

    -or-

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.BingFinance"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.BingFinance | Remove-AppxPackage

To remove the Sports app:

  • Right-click the app in Start, and then click Uninstall.

    -or-

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.BingSports"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.BingSports | Remove-AppxPackage

To remove the Twitter app:

  • Right-click the app in Start, and then click Uninstall.

    -or-

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "*.Twitter"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage *.Twitter | Remove-AppxPackage

To remove the XBOX app:

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.XboxApp"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.XboxApp | Remove-AppxPackage

To remove the Sway app:

  • Right-click the app in Start, and then click Uninstall.

    -or-

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.Office.Sway"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.Office.Sway | Remove-AppxPackage

To remove the OneNote app:

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.Office.OneNote"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.Office.OneNote | Remove-AppxPackage

To remove the Get Office app:

  • Right-click the app in Start, and then click Uninstall.

    -or-

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.MicrosoftOfficeHub"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.MicrosoftOfficeHub | Remove-AppxPackage

To remove the Get Skype app:

  • Right-click the Sports app in Start, and then click Uninstall.

    -or-

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.SkypeApp"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.SkypeApp | Remove-AppxPackage

To remove the Sticky notes app:

  • Remove the app for new user accounts. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxProvisionedPackage -Online | Where-Object {$_.PackageName -Like "Microsoft.MicrosoftStickyNotes"} | ForEach-Object { Remove-AppxProvisionedPackage -Online -PackageName $_.PackageName}

    -and-

    Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: Get-AppxPackage Microsoft.MicrosoftStickyNotes | Remove-AppxPackage

17. Settings > Privacy

Use Settings > Privacy to configure some settings that may be important to your organization. Except for the Feedback & Diagnostics page, these settings must be configured for every user account that signs into the PC.

17.1 General

General includes options that don't fall into other areas.

Windows 10, version 1703 options

To turn off Let apps use advertising ID to make ads more interesting to you based on your app usage (turning this off will reset your ID):

Note

When you turn this feature off in the UI, it turns off the advertising ID, not just resets it.

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > System > User Profiles > Turn off the advertising ID.

    -or-

  • Create a REG_DWORD registry setting called Enabled in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo, with a value of 0 (zero).

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo!DisabledByGroupPolicy, with a value of 1 (one).

To turn off Let websites provide locally relevant content by accessing my language list:

  • Turn off the feature in the UI.

    -or-

  • Create a new REG_DWORD registry setting called HttpAcceptLanguageOptOut in HKEY_CURRENT_USER\Control Panel\International\User Profile, with a value of 1.

To turn off Let Windows track app launches to improve Start and search results:

  • Turn off the feature in the UI.

    -or-

  • Create a REG_DWORD registry setting called Start_TrackProgs with value of 0 (zero) in HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced

Windows Server 2016 and Windows 10, version 1607 and earlier options

To turn off Let apps use my advertising ID for experiences across apps (turning this off will reset your ID):

Note

When you turn this feature off in the UI, it turns off the advertising ID, not just resets it.

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > System > User Profiles > Turn off the advertising ID.

    -or-

  • Create a REG_DWORD registry setting called Enabled in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo, with a value of 0 (zero).

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo!DisabledByGroupPolicy, with a value of 1 (one).

To turn off Turn on SmartScreen Filter to check web content (URLs) that Microsoft Store apps use:

  • Turn off the feature in the UI.

    -or-

  • In Windows Server 2016, apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Microsoft Edge > Configure SmartScreen Filter. In Windows 10, version 1703, apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Microsoft Edge > Configure Windows Defender SmartScreen Filter.

    In Windows Server 2016, apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > File Explorer > Configure Windows SmartScreen. In Windows 10, version 1703 , apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > File Explorer > Configure Windows Defender SmartScreen.

    -or-

  • Apply the Browser/AllowSmartScreen MDM policy from the Policy CSP where 0 is turned off and 1 is turned on.

    -or-

  • Create a provisioning package, using:

    • For Internet Explorer: Runtime settings > Policies > Browser > AllowSmartScreen

    • For Microsoft Edge: Runtime settings > Policies > MicrosoftEdge > AllowSmartScreen

    -or-

  • Create a REG_DWORD registry setting called EnableWebContentEvaluation in HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost, with a value of 0 (zero).

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Sofware\Policies\Microsoft\Windows\System!EnableSmartScreen, with a value of 0 (zero).

To turn off Send Microsoft info about how I write to help us improve typing and writing in the future:

Note

If the telemetry level is set to either Basic or Security, this is turned off automatically.

  • Turn off the feature in the UI.

    -or-

  • Apply the TextInput/AllowLinguisticDataCollection MDM policy from the Policy CSP where:

    • 0. Not allowed

    • 1. Allowed (default)

To turn off Let websites provide locally relevant content by accessing my language list:

  • Turn off the feature in the UI.

    -or-

  • Create a new REG_DWORD registry setting called HttpAcceptLanguageOptOut in HKEY_CURRENT_USER\Control Panel\International\User Profile, with a value of 1.

To turn off Let apps on my other devices open apps and continue experiences on this devices:

  • Turn off the feature in the UI.

    -or-

  • Disable the Group Policy: Computer Configuration > Administrative Templates > System > Group Policy > Continue experiences on this device.

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System!EnableCdp, with a value of 0 (zero).

To turn off Let apps on my other devices use Bluetooth to open apps and continue experiences on this device:

  • Turn off the feature in the UI.

17.2 Location

In the Location area, you choose whether devices have access to location-specific sensors and which apps have access to the device's location.

To turn off Location for this device:

  • Click the Change button in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Location and Sensors > Turn off location.

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessLocation, with a value of 2 (two).

    -or-

  • Apply the System/AllowLocation MDM policy from the Policy CSP, where:

    • 0. Turned off and the employee can't turn it back on.

    • 1. Turned on, but lets the employee choose whether to use it. (default)

    • 2. Turned on and the employee can't turn it off.

    Note

    You can also set this MDM policy in System Center Configuration Manager using the WMI Bridge Provider.

    -or-

  • Create a provisioning package, using Runtime settings > Policies > System > AllowLocation, where

    • No. Turns off location service.

    • Yes. Turns on location service. (default)

To turn off Location:

  • Turn off the feature in the UI.

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access location

    • Set the Select a setting box to Force Deny.

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\LocationAndSensors!DisableLocation, with a value of 1 (one).

    -or-

To turn off Location history:

  • Erase the history using the Clear button in the UI.

To turn off Choose apps that can use your location:

  • Turn off each app using the UI.

17.3 Camera

In the Camera area, you can choose which apps can access a device's camera.

To turn off Let apps use my camera:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access the camera

    • Set the Select a setting box to Force Deny.

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessCamera, with a value of 2 (two).

    -or-

  • Apply the Camera/AllowCamera MDM policy from the Policy CSP, where:

    • 0. Apps can't use the camera.

    • 1. Apps can use the camera.

    Note

    You can also set this MDM policy in System Center Configuration Manager using the WMI Bridge Provider.

    -or-

  • Create a provisioning package with use Windows ICD, using Runtime settings > Policies > Camera > AllowCamera, where:

    • 0. Apps can't use the camera.

    • 1. Apps can use the camera.

To turn off Choose apps that can use your camera:

  • Turn off the feature in the UI for each app.

17.4 Microphone

In the Microphone area, you can choose which apps can access a device's microphone.

To turn off Let apps use my microphone:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access the microphone

    • Set the Select a setting box to Force Deny.

    -or-

  • Apply the Privacy/LetAppsAccessMicrophone MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessMicrophone, with a value of 2 (two)

To turn off Choose apps that can use your microphone:

  • Turn off the feature in the UI for each app.

17.5 Notifications

In the Notifications area, you can choose which apps have access to notifications.

To turn off Let apps access my notifications:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access notifications

    • Set the Select a setting box to Force Deny.

      -or-

  • Apply the Privacy/LetAppsAccessNotifications MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

      -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessNotifications, with a value of 2 (two)

17.6 Speech, inking, & typing

In the Speech, Inking, & Typing area, you can let Windows and Cortana better understand your employee's voice and written input by sampling their voice and writing, and by comparing verbal and written input to contact names and calendar entrees.

Note

For more info on how to disable Cortana in your enterprise, see Cortana in this article.

To turn off the functionality:

  • Click the Stop getting to know me button, and then click Turn off.

    -or-

  • Enable the Group Policy: Computer Configuration > Administrative Templates > Control Panel > Regional and Language Options > Handwriting personalization > Turn off automatic learning

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\InputPersonalization!RestrictImplicitInkCollection, with a value of 1 (one).

    -or-

  • Create a REG_DWORD registry setting called AcceptedPrivacyPolicy in HKEY_CURRENT_USER\SOFTWARE\Microsoft\Personalization\Settings, with a value of 0 (zero).

    -and-

  • Create a REG_DWORD registry setting called HarvestContacts in HKEY_CURRENT_USER\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore, with a value of 0 (zero).

If you're running at least Windows 10, version 1703, you can turn off updates to the speech recognition and speech synthesis models:

  • Disable the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Speech > Allow automatically update of Speech Data

If you're running at least Windows 10, version 1607, you can turn off updates to the speech recognition and speech synthesis models:

Apply the Speech/AllowSpeechModelUpdate MDM policy from the Policy CSP, where:

  • 0 (default). Not allowed.
  • 1. Allowed.

    -or-

  • Create a REG_DWORD registry setting called ModelDownloadAllowed in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Preferences, with a value of 0 (zero).

17.7 Account info

In the Account Info area, you can choose which apps can access your name, picture, and other account info.

To turn off Let apps access my name, picture, and other account info:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access account information

    • Set the Select a setting box to Force Deny.

    -or-

  • Apply the Privacy/LetAppsAccessAccountInfo MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\AppPrivacy!LetAppsAccessContacts, with a value of 2 (two).

To turn off Choose the apps that can access your account info:

  • Turn off the feature in the UI for each app.

17.8 Contacts

In the Contacts area, you can choose which apps can access an employee's contacts list.

To turn off Choose apps that can access contacts:

  • Turn off the feature in the UI for each app.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access contacts

    • Set the Select a setting box to Force Deny.

    -or-

  • Apply the Privacy/LetAppsAccessContacts MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

17.9 Calendar

In the Calendar area, you can choose which apps have access to an employee's calendar.

To turn off Let apps access my calendar:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access the calendar

    • Set the Select a setting box to Force Deny.

    -or-

  • Apply the Privacy/LetAppsAccessCalendar MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\AppPrivacy!LetAppsAccessCalendar, with a value of 2 (two).

To turn off Choose apps that can access calendar:

  • Turn off the feature in the UI for each app.

17.10 Call history

In the Call history area, you can choose which apps have access to an employee's call history.

To turn off Let apps access my call history:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access call history

    • Set the Select a setting box to Force Deny.

      -or-

    • Apply the Privacy/LetAppsAccessCallHistory MDM policy from the Policy CSP, where:

    • 0. User in control

    • 1. Force allow
    • 2. Force deny

      -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessCallHistory, with a value of 2 (two).

17.11 Email

In the Email area, you can choose which apps have can access and send email.

To turn off Let apps access and send email:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access email

    • Set the Select a setting box to Force Deny.

      -or-

    • Apply the Privacy/LetAppsAccessEmail MDM policy from the Policy CSP, where:

      • 0. User in control
      • 1. Force allow
      • 2. Force deny

      -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessEmail, with a value of 2 (two).

17.12 Messaging

In the Messaging area, you can choose which apps can read or send messages.

To turn off Let apps read or send messages (text or MMS):

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access messaging

    • Set the Select a setting box to Force Deny.

    -or-

  • Apply the Privacy/LetAppsAccess<Messaging MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessMessaging, with a value of 2 (two).

To turn off Choose apps that can read or send messages:

  • Turn off the feature in the UI for each app.

17.13 Radios

In the Radios area, you can choose which apps can turn a device's radio on or off.

To turn off Let apps control radios:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps control radios

    • Set the Select a setting box to Force Deny.

    -or-

  • Apply the Privacy/LetAppsAccessRadios MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessRadios, with a value of 2 (two).

To turn off Choose apps that can control radios:

  • Turn off the feature in the UI for each app.

17.14 Other devices

In the Other Devices area, you can choose whether devices that aren't paired to PCs, such as an Xbox One, can share and sync info.

To turn off Let apps automatically share and sync info with wireless devices that don't explicitly pair with your PC, tablet, or phone:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps sync with devices

    -or-

  • Apply the Privacy/LetAppsSyncWithDevices MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\AppPrivacy!LetAppsSyncWithDevices, with a value of 2 (two).

To turn off Let your apps use your trusted devices (hardware you've already connected, or comes with your PC, tablet, or phone):

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access trusted devices

    • Set the Select a setting box to Force Deny.

17.15 Feedback & diagnostics

In the Feedback & Diagnostics area, you can choose how often you're asked for feedback and how much diagnostic and usage information is sent to Microsoft.

To change how frequently Windows should ask for my feedback:

Note

Feedback frequency only applies to user-generated feedback, not diagnostic and usage data sent from the device.

  • To change from Automatically (Recommended), use the drop-down list in the UI.

    -or-

  • Enable the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > Do not show feedback notifications

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\DataCollection!DoNotShowFeedbackNotifications, with a value of 1 (one).

    -or-

  • Create the registry keys (REG_DWORD type):

    • HKEY_CURRENT_USER\Software\Microsoft\Siuf\Rules\PeriodInNanoSeconds

    • HKEY_CURRENT_USER\Software\Microsoft\Siuf\Rules\NumberOfSIUFInPeriod

    Based on these settings:

    Setting PeriodInNanoSeconds NumberOfSIUFInPeriod
    Automatically Delete the registry setting Delete the registry setting
    Never 0 0
    Always 100000000 Delete the registry setting
    Once a day 864000000000 1
    Once a week 6048000000000 1

To change the level of diagnostic and usage data sent when you Send your device data to Microsoft:

  • Click either the Basic or Full options.

    -or-

  • Apply the Group Policy: Computer Configuration\Administrative Templates\Windows Components\Data Collection And Preview Builds\Allow Telemetry

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\DataCollection\AllowTelemetry, with a value of 0 (zero).

    -or-

  • Apply the System/AllowTelemetry MDM policy from the Policy CSP, where:

    • 0. Maps to the Security level.

    • 1. Maps to the Basic level.

    • 2. Maps to the Enhanced level.

    • 3. Maps to the Full level.

    -or-

  • Create a provisioning package, using Runtime settings > Policies > System > AllowTelemetry, where:

    • 0. Maps to the Security level.

    • 1. Maps to the Basic level.

    • 2. Maps to the Enhanced level.

    • 3. Maps to the Full level.

To turn off tailored experiences with relevant tips and recommendations by using your diagnostics data:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: User Configuration > Administrative Templates > Windows Components > Cloud Content > Do not use diagnostic data for tailored experiences

17.16 Background apps

In the Background Apps area, you can choose which apps can run in the background.

To turn off Let apps run in the background:

  • Turn off the feature in the UI for each app.

    -or-

  • Apply the Group Policy (only applicable for Windows 10, version 1703): Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps run in the background

    • Set the Select a setting box to Force Deny.

    -or-

  • Apply the Privacy/LetAppsRunInBackground MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

17.17 Motion

In the Motion area, you can choose which apps have access to your motion data.

To turn off Let Windows and your apps use your motion data and collect motion history:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access motion

    -or-

  • Apply the Privacy/LetAppsAccessMotion MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\AppPrivacy!LetAppsAccessMotion, with a value of 2 (two).

17.18 Tasks

In the Tasks area, you can choose which apps have access to your tasks.

To turn this off:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access Tasks

    • Set the Select a setting box to Force Deny.

      -or-

  • Apply the Privacy/LetAppsAccessTasks MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

17.19 App Diagnostics

In the App diagnostics area, you can choose which apps have access to your diagnostic information.

To turn this off:

  • Turn off the feature in the UI.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > App Privacy > Let Windows apps access dignostic information about other apps

    -or-

  • Apply the Privacy/LetAppsGetDiagnosticInfo MDM policy from the Policy CSP, where:

    • 0. User in control
    • 1. Force allow
    • 2. Force deny

18. Software Protection Platform

Enterprise customers can manage their Windows activation status with volume licensing using an on-premise Key Management Server. You can opt out of sending KMS client activation data to Microsoft automatically by doing one of the following:

For Windows 10:

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Software Protection Platform > Turn off KMS Client Online AVS Validation

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\AppPrivacy!LetAppsAccessContacts, with a value of 2 (two).

    -or-

  • Apply the Licensing/DisallowKMSClientOnlineAVSValidation MDM policy from the Policy CSP where 0 is disabled (default) and 1 is enabled.

For Windows Server 2016 with Desktop Experience or Windows Server 2016 Server Core:

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Software Protection Platform > Turn off KMS Client Online AVS Validation

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows NT\CurrentVersion\Software Protection Platform!NoGenTicket, with a value of 1 (one).

The Windows activation status will be valid for a rolling period of 180 days with weekly activation status checks to the KMS.

19. Sync your settings

You can control if your settings are synchronized:

  • In the UI: Settings > Accounts > Sync your settings

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Sync your settings > Do not sync

    -or-

  • Create a REG_DWORD registry setting in HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\SettingSync!DisableSettingSync, with a value of 2 (two) and HKEY_LOCAL_MACHINE\Policies\Microsoft\Windows\SettingSync!DisableSettingSyncUserOverride, with a value of 1 (one).

    -or-

  • Apply the Experience/AllowSyncMySettings MDM policy from the Policy CSP where 0 is not allowed and 1 is allowed.

    -or-

  • Create a provisioning package, using Runtime settings > Policies > Experience > AllowSyncMySettings, where

    • No. Settings are not synchronized.

    • Yes. Settings are synchronized. (default)

To turn off Messaging cloud sync:

  • Create a REG_DWORD registry setting called CloudServiceSyncEnabled in HKEY_CURRENT_USER\SOFTWARE\Microsoft\Messaging, with a value of 0 (zero).

20. Teredo

You can disable Teredo by using Group Policy or by using the netsh.exe command. For more info on Teredo, see Internet Protocol Version 6, Teredo, and Related Technologies.

Note

If you disable Teredo, some XBOX gaming features and Windows Update Delivery Optimization will not work.

  • Enable the Group Policy: Computer Configuration > Administrative Templates > Network > TCPIP Settings > IPv6 Transition Technologies > Set Teredo State and set it to Disabled State.

    -or-

  • Create a new REG_SZ registry setting called in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\TCPIP\v6Transition!Teredo_State, with a value of Disabled.

    -or-

  • From an elevated command prompt, run netsh interface teredo set state disabled

21. Wi-Fi Sense

Wi-Fi Sense automatically connects devices to known hotspots and to the wireless networks the person’s contacts have shared with them.

To turn off Connect to suggested open hotspots and Connect to networks shared by my contacts:

  • Turn off the feature in the UI.

    -or-

  • Disable the Group Policy: Computer Configuration > Administrative Templates > Network > WLAN Service > WLAN Settings > Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services.

    -or-

  • Create a new REG_DWORD registry setting called AutoConnectAllowedOEM in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\config, with a value of 0 (zero).

    -or-

  • Change the Windows Provisioning setting, WiFISenseAllowed, to 0 (zero). For more info, see the Windows Provisioning Settings reference doc, WiFiSenseAllowed.

    -or-

  • Use the Unattended settings to set the value of WiFiSenseAllowed to 0 (zero). For more info, see the Unattended Windows Setup reference doc, WiFiSenseAllowed.

When turned off, the Wi-Fi Sense settings still appear on the Wi-Fi Settings screen, but they’re non-functional and they can’t be controlled by the employee.

22. Windows Defender

You can disconnect from the Microsoft Antimalware Protection Service.

  • Disable the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Windows Defender Antivirus > MAPS > Join Microsoft MAPS

    -or-

  • Delete the registry setting HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Updates!DefinitionUpdateFileSharesSources.

    -or-

  • For Windows 10 only, apply the Defender/AllowClouldProtection MDM policy from the Defender CSP.

    -or-

  • Use the registry to set the REG_DWORD value HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet\SpyNetReporting to 0 (zero).

    -and-

    From an elevated Windows PowerShell prompt, run set-mppreference -Mapsreporting 0

You can stop sending file samples back to Microsoft.

  • Set the Group Policy Computer Configuration > Administrative Templates > Windows Components > Windows Defender Antivirus > MAPS > Send file samples when further analysis is required to Always Prompt or Never Send.

    -or-

  • For Windows 10 only, apply the Defender/SubmitSamplesConsent MDM policy from the Policy CSP, where:

    • 0. Always prompt.

    • 1. (default) Send safe samples automatically.

    • 2. Never send.

    • 3. Send all samples automatically.

    -or-

  • Use the registry to set the REG_DWORD value HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent to 0 (zero) to always prompt or 2 to never send.

You can stop downloading definition updates:

  • Enable the Group Policy Computer Configuration > Administrative Templates > Windows Components > Windows Defender Antivirus > Signature Updates > Define the order of sources for downloading definition updates and set it to FileShares.

    -and-

  • Disable the Group Policy Computer Configuration > Administrative Templates > Windows Components > Windows Defender Antivirus > Signature Updates > Define file shares for downloading definition updates and set it to nothing.

    -or-

  • Create a new REG_SZ registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Updates!FallbackOrder, with a value of FileShares.

For Windows 10 only, you can stop Enhanced Notifications:

  • Turn off the feature in the UI.

You can also use the registry to turn off Malicious Software Reporting Tool telemetry by setting the REG_DWORD value HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\MRT\DontReportInfectionInformation to 1.

23. Windows Media Player

To remove Windows Media Player on Windows 10:

  • From the Programs and Features control panel, click Turn Windows features on or off, under Media Features, clear the Windows Media Player check box, and then click OK.

    -or-

  • Run the following DISM command from an elevated command prompt: dism /online /Disable-Feature /FeatureName:WindowsMediaPlayer

To remove Windows Media Player on Windows Server 2016:

  • Run the following DISM command from an elevated command prompt: dism /online /Disable-Feature /FeatureName:WindowsMediaPlayer

24. Windows Spotlight

Windows Spotlight provides features such as different background images and text on the lock screen, suggested apps, Microsoft account notifications, and Windows tips. You can control it by using the user interface, MDM policy, or through Group Policy.

If you're running Windows 10, version 1607 or later, you only need to enable the following Group Policy:

  • User Configuration > Administrative Templates > Windows Components > Cloud Content > Turn off all Windows spotlight features

    Note

    This must be done within 15 minutes after Windows 10 is installed. Alternatively, you can create an image with this setting.

    -or-

  • For Windows 10 only, apply the Experience/AllowWindowsSpotlight MDM policy from the Policy CSP, with a value of 0 (zero).

    -or-

  • Create a new REG_DWORD registry setting in HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\CloudContent!DisableWindowsSpotlightFeatures, with a value of 1 (one).

If you're not running Windows 10, version 1607 or later, you can use the other options in this section.

  • Configure the following in Settings:

    • Personalization > Lock screen > Background > Windows spotlight, select a different background, and turn off Get fun facts, tips, tricks and more on your lock screen.

      Note

      In Windows 10, version 1507 and Windows 10, version 1511, this setting was called Show me tips, tricks, and more on the lock screen.

    • Personalization > Start > Occasionally show suggestions in Start.

    • System > Notifications & actions > Show me tips about Windows.

    -or-

  • Apply the Group Policies:

    • Computer Configuration > Administrative Templates > Control Panel > Personalization > Force a specific default lock screen image.

      • Add a location in the Path to local lock screen image box.

      • Set the Turn off fun facts, tips, tricks, and more on lock screen check box.

      Note

      This will only take effect if the policy is applied before the first logon. If you cannot apply the Force a specific default lock screen image policy before the first logon to the device, you can apply this policy: Computer Configuration > Administrative Templates > Control Panel > Personalization > Do not display the lock screen. Alternatively, you can create a new REG_SZ registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization!LockScreenImage, with a value of C:\windows\web\screen\lockscreen.jpg and create a new REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization!LockScreenOverlaysDisabled, with a value of 1 (one).

    • Computer Configuration > Administrative Templates > Windows Components > Cloud Content > Do not show Windows tips.

    -or-

    • Create a new REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CloudContent!DisableSoftLanding, with a value of 1 (one).

    • Computer Configuration > Administrative Templates > Windows Components > Cloud Content > Turn off Microsoft consumer experiences.

      -or-

    • Create a new REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CloudContent!DisableWindowsConsumerFeatures, with a value of 1 (one).

For more info, see Windows Spotlight on the lock screen.

25. Microsoft Store

You can turn off the ability to launch apps from the Microsoft Store that were preinstalled or downloaded. This will also turn off automatic app updates, and the Microsoft Store will be disabled. On Windows Server 2016, this will block Microsoft Store calls from Universal Windows Apps.

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Store > Disable all apps from Microsoft Store.

    -or-

    • Create a new REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsStore!DisableStoreApps, with a value of 1 (one).
  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Store > Turn off Automatic Download and Install of updates.

    -or-

    • Create a new REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsStore!AutoDownload, with a value of 2 (two).

Disable the Group Policy: Computer Configuration > Administrative Templates > System > Group Policy > Configure web-to-app linking with URI handlers

26. Windows Update Delivery Optimization

Windows Update Delivery Optimization lets you get Windows updates and Microsoft Store apps from sources in addition to Microsoft, which not only helps when you have a limited or unreliable Internet connection, but can also help you reduce the amount of bandwidth needed to keep all of your organization's PCs up-to-date. If you have Delivery Optimization turned on, PCs on your network may send and receive updates and apps to other PCs on your local network, if you choose, or to PCs on the Internet.

By default, PCs running Windows 10 Enterprise and Windows 10 Education will only use Delivery Optimization to get and receive updates for PCs and apps on your local network.

Use the UI, Group Policy, MDM policies, or Windows Provisioning to set up Delivery Optimization.

In Windows 10, version 1607, you can stop network traffic related to Windows Update Delivery Optimization by setting Download Mode to Simple (99) or Bypass (100), as described below.

26.1 Settings > Update & security

You can set up Delivery Optimization from the Settings UI.

  • Go to Settings > Update & security > Windows Update > Advanced options > Choose how updates are delivered.

26.2 Delivery Optimization Group Policies

You can find the Delivery Optimization Group Policy objects under Computer Configuration > Administrative Templates > Windows Components > Delivery Optimization.

Policy Description
Download Mode Lets you choose where Delivery Optimization gets or sends updates and apps, including
  • None. Turns off Delivery Optimization.

  • Group. Gets or sends updates and apps to PCs on the same local network domain.

  • Internet. Gets or sends updates and apps to PCs on the Internet.

  • LAN. Gets or sends updates and apps to PCs on the same NAT only.

  • Simple. Simple download mode with no peering.

  • Bypass. Use BITS instead of Windows Update Delivery Optimization.

Group ID Lets you provide a Group ID that limits which PCs can share apps and updates.
Note: This ID must be a GUID.
Max Cache Age Lets you specify the maximum time (in seconds) that a file is held in the Delivery Optimization cache.
The default value is 259200 seconds (3 days).
Max Cache Size Lets you specify the maximum cache size as a percentage of disk size.
The default value is 20, which represents 20% of the disk.
Max Upload Bandwidth Lets you specify the maximum upload bandwidth (in KB/second) that a device uses across all concurrent upload activity.
The default value is 0, which means unlimited possible bandwidth.

You can also set the Download Mode policy by creating a new REG_DWORD registry setting in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DeliveryOptimization!DODownloadMode, with a value of 100 (one hundred).

26.3 Delivery Optimization MDM policies

The following Delivery Optimization MDM policies are available in the Policy CSP.

Policy Description
DeliveryOptimization/DODownloadMode Lets you choose where Delivery Optimization gets or sends updates and apps, including
  • 0. Turns off Delivery Optimization.

  • 1. Gets or sends updates and apps to PCs on the same NAT only.

  • 2. Gets or sends updates and apps to PCs on the same local network domain.

  • 3. Gets or sends updates and apps to PCs on the Internet.

  • 99. Simple download mode with no peering.

  • 100. Use BITS instead of Windows Update Delivery Optimization.

DeliveryOptimization/DOGroupID Lets you provide a Group ID that limits which PCs can share apps and updates.
Note This ID must be a GUID.
DeliveryOptimization/DOMaxCacheAge Lets you specify the maximum time (in seconds) that a file is held in the Delivery Optimization cache.
The default value is 259200 seconds (3 days).
DeliveryOptimization/DOMaxCacheSize Lets you specify the maximum cache size as a percentage of disk size.
The default value is 20, which represents 20% of the disk.
DeliveryOptimization/DOMaxUploadBandwidth Lets you specify the maximum upload bandwidth (in KB/second) that a device uses across all concurrent upload activity.
The default value is 0, which means unlimited possible bandwidth.

26.4 Delivery Optimization Windows Provisioning

If you don't have an MDM server in your enterprise, you can use Windows Provisioning to configure the Delivery Optimization policies

Use Windows ICD, included with the Windows Assessment and Deployment Kit (Windows ADK), to create a provisioning package for Delivery Optimization.

  1. Open Windows ICD, and then click New provisioning package.

  2. In the Name box, type a name for the provisioning package, and then click Next.

  3. Click the Common to all Windows editions option, click Next, and then click Finish.

  4. Go to Runtime settings > Policies > DeliveryOptimization to configure the policies.

For more info about Delivery Optimization in general, see Windows Update Delivery Optimization: FAQ.

27. Windows Update

You can turn off Windows Update by setting the following registry entries:

  • Add a REG_DWORD value called DoNotConnectToWindowsUpdateInternetLocations to HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate and set the value to 1.

    -and-

  • Add a REG_DWORD value called DisableWindowsUpdateAccess to HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate and set the value to 1.

    -and-

  • Add a REG_DWORD value called UseWUServer to HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\AU and set the value to 1.

    -or-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Do not connect to any Windows Update Internet locations.

    -and-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > System > Internet Communication Management > Internet Communication Settings > Turn off access to all Windows Update features.

    -and-

  • Apply the Group Policy: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify intranet Microsoft update service location and set the Set the alternate download server to "".

You can turn off automatic updates by doing one of the following. This is not recommended.

  • Add a REG_DWORD value called AutoDownload to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\WindowsStore\WindowsUpdate and set the value to 5.

    -or-

  • For Windows 10 only, apply the Update/AllowAutoUpdate MDM policy from the Policy CSP, where:

    • 0. Notify the user before downloading the update.

    • 1. Auto install the update and then notify the user to schedule a device restart.

    • 2 (default). Auto install and restart.

    • 3. Auto install and restart at a specified time.

    • 4. Auto install and restart without end-user control.

    • 5. Turn off automatic updates.

To learn more, see Device update management and Configure Automatic Updates by using Group Policy.