Try our new Certificate Revocation List Check Tool
CRLcheck.exe is a tool developed to verify digital signatures of executable files. It collects files from known paths on your client, checks their signature, and checks Certificate Revocation Lists (CRL) and OCSP download. This helps avoid delays in launching files.
Category published:  Deployment Uncategorized W10   Click on the Category button to get more articles regarding that product.

Windows 10 NAG screen active, How to prevent (on W7/W8)

Posted by admin on 10.06.2015

Microsoft macht vorwärts mit Windows 10 im Juli 2015 ist Launch. Galt es 8.0 und 8.1 zu verhindern sollte man hier am Ball bleiben. Die Systemhäuser setzen W10 ein und es wird migriert so bald wie dies möglich ist.

Dieses ICON ist wohl mit KB3035583 im Mai 2015 gekommen. An sich auf dem WSUS geblockt bei den kleinen Kunden ohne WSUS durchgerutscht

  • BlockWindows10.cmd deinstalliert 3 Patche (Und ruft das VBscript auf)
  • VBscript HideWindowsUpdates.vbs HIDE’d die 3 Patche vor dem Windows Update Client (wuapp.exe)

 

Derzeit kommen vier Patche in Frage, welches Teile davon auslösen. Workaround: Diese Deinstallieren und von Windows Update verstecken.

 

KB2952664

Compatibility update for upgrading Windows 7

KB2990214

Update that enables you to upgrade from Windows 7 to a later version of Windows

KB3022345

Update to enable the Diagnostics Tracking Service in Windows

KB3035583

Update enables additional capabilities for Windows Update notifications in W 8.1 and W7 SP1

 

Guter Haupt Link zum Problem:

http://superuser.com/questions/922068/how-to-disable-the-get-windows-10-icon-shown-in-the-notification-area-tray

 

User OPMET posted some script which we slightly modified:

 

 

FILE: BlockWindows10.cmd

@echo off

cls

:: remember to invoke from ELEVATED command prompt!

:: or start the batch with context menu “run as admin”.

 

SETLOCAL

 

echo uninstalling updates …

echo – 2952664

start “title” /b /wait wusa.exe /kb:2952664 /uninstall /quiet /norestart

echo – 2990214

start “title” /b /wait wusa.exe /kb:2990214 /uninstall /quiet /norestart

echo – 3022345

start “title” /b /wait wusa.exe /kb:3022345 /uninstall /quiet /norestart

echo – 3035583

start “title” /b /wait wusa.exe /kb:3035583 /uninstall /quiet /norestart

echo – done.

timeout 10

 

:: Update WMI Information betreffend Patche

echo – Update WMI Info der Patche fuer Windows Update

C:\Windows\System32\wbem\wmic.exe qfe > nul

 

echo hiding updates …

start “title” /b /wait cscript.exe HideWindowsUpdates.vbs 2952664 2990214 3022345 3035583

 Then to HIDE the Updates from Windows so they will not appear next time you run WUSA.EXE

https://gist.github.com/florianbeisel/7805795 

 

If Wscript.Arguments.Count = 0 Then
    WScript.Echo “Syntax: HideWindowsUpdate.vbs [Hotfix Article ID]” & vbCRLF & _
                 “Examples:” & vbCRLF & _
                 ”  – Hide KB940157: HideWindowsUpdate.vbs 940157″
    WScript.Quit 1
End If

Dim hotfixId
hotfixId = WScript.Arguments(0)

Dim updateSession, updateSearcher
Set updateSession = CreateObject(“Microsoft.Update.Session”)
Set updateSearcher = updateSession.CreateUpdateSearcher()

Wscript.Stdout.Write “Searching for pending updates…”
Dim searchResult
Set searchResult = updateSearcher.Search(“IsInstalled=0”)

Dim update, kbArticleId, index, index2
WScript.Echo CStr(searchResult.Updates.Count) & ” found.”
For index = 0 To searchResult.Updates.Count – 1
    Set update = searchResult.Updates.Item(index)
    For index2 = 0 To update.KBArticleIDs.Count – 1
        kbArticleId = update.KBArticleIDs(index2)
        If kbArticleId = hotfixId Then
            WScript.Echo “Hiding update: ” & update.Title
            update.IsHidden = True
        End If       
    Next
Next
 

 

Please see posting on how to block on Firewall if it’s already there:

https://www.butsch.ch/post/WSUS-Do-not-Install-KB3022345-it-sends-info-back-to-MS-over-SSL.aspx

 

 


 Category published:  Deployment Uncategorized W10   Click on the Category button to get more articles regarding that product.