Windows Tips & News

Prestanite da vas Windows 10 špijunira samo pomoću Windows vatrozida

click fraud protection

Za svakoga tko koristi Windows 10 nije tajna da ovaj operativni sustav prikuplja puno privatnih informacija i šalje ih natrag Microsoftu kako bi dobili više telemetrijskih podataka. Mnogi korisnici nisu sretni što ih Windows 10 špijunira i stalno traži način da to zaustave. Iako ovo nije prvi put da se pozivamo na ovo pitanje, danas bih želio podijeliti jedan drugačiji način da spriječite Windows 10 da prikuplja vaše osjetljive podatke koristeći samo ugrađeni Windows Vatrozid.

U mom prethodnom članku, Kako onemogućiti telemetriju i prikupljanje podataka u sustavu Windows 10, opširno sam opisao što je telemetrija i kako Microsoft prikuplja vaše podatke. Osim toga, članak dolazi s rješenjem protiv prikupljanja podataka bez vašeg odobrenja.

Prije nego krenemo, svakako bih trebao spomenuti jednu činjenicu. Čuvajte se korisnici Windowsa 7/Windows 8, vaš operativni sustav možda i vas špijunira! Pogledajte sljedeći članak:Telemetrija i prikupljanje podataka također dolaze u Windows 7 i Windows 8

Pogledajmo što možemo učiniti kako bismo spriječili da vas Windows 10 špijunira samo pomoću Windows vatrozida. Glavna ideja ove metode je blokiranje dobro poznatog popisa Microsoftovih poslužitelja pomoću odgovarajućih pravila Windows vatrozida. To ne uključuje nikakav alat treće strane u proces, što je također dobro. Vidjet ćete i kontrolirati ono što radite.

Pogledajmo sljedeći primjer:

netsh advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes

Gornja naredba dodaje i aktivira novo pravilo koje blokira odlazne veze s poslužiteljem "telemetry_watson.telemetry.microsoft.com". Blokiranje će se izvršiti korištenjem ovih IP adresa: 65.55.252.43,65.52.108.29.

Ovu naredbu treba izvršiti u povišenom naredbenom retku. Ovo nije preteško. Ali kada trebate blokirati sve poslužitelje telemetrije, možete se umoriti izvršavajući sve potrebne naredbe jednu po jednu. Samo pogledajte kompletan popis (isječak PowerShell) u nastavku!

Set-NetFirewallProfile -all netsh advfirewall firewall add rule name="telemetry_vortex.data.microsoft.com" dir=out action=block remoteip=191.232.139.254 enable=yes netsh advfirewall firewall add pravilo name="telemetry_telecommand.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.92 enable=yes netsh advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.63 enable=yes netsh advfirewall firewall add rule name="telemetry_sqm.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.93 enable=yes netsh advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_redir.metaservices.microsoft.com" dir=out action=block remoteip=194.44.4.200,194.44.4.208 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_choice.microsoft.com" dir=out action=block remoteip=157.56.91.77 enable=yes netsh advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes netsh advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.93 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_services.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.92 enable=yes netsh advfirewall firewall add rule name="telemetry_sqm.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.94 enable=yes netsh advfirewall firewall add rule name="telemetry_telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.9 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_watson.ppe.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.11 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_telemetry.appex.bing.net" dir=out action=block remoteip=168.63.108.233 enable=yes netsh advfirewall firewall add rule name="telemetry_telemetry.urs.microsoft.com" dir=out action=block remoteip=157.56.74.250 enable=yes netsh advfirewall firewall add pravilo name="telemetry_settings-sandbox.data.microsoft.com" dir=out action=block remoteip=111.221.29.177 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_survey.watson.microsoft.com" dir=out action=block remoteip=207.68.166.254 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_watson.live.com" dir=out action=block remoteip=207.46.223.94 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_watson.microsoft.com" dir=out action=block remoteip=65.55.252.71 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_statsfe2.ws.microsoft.com" dir=out action=block remoteip=64.4.54.22 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_corpext.msitadfs.glbdns2.microsoft.com" dir=out action=block remoteip=131.107.113.238 netsh enable=yes advfirewall firewall add rule name="telemetry_compatexchange.cloudapp.net" dir=out action=block remoteip=23.99.10.11 enable=yes netsh advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes netsh advfirewall firewall add rule name="telemetry_a-0001.a-msedge.net" dir=out action=block remoteip=204.79.197.200 enable=yes netsh advfirewall firewall add rule name="telemetry_statsfe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=64.4.54.22 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_sls.update.microsoft.com.akadns.net" dir=out action=block remoteip=157.56.77.139 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_fe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=134.170.58.121,134.170.58.123,134.170.53.29,66.119.144.190,134.170.58.189,134.170.58.123.com name="telemetry_diagnostics.support.microsoft.com" dir=out action=block remoteip=157.56.121.89 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_corp.sts.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes netsh advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes netsh advfirewall firewall add pravilo name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_feedback.windows.com" dir=out action=block remoteip=134.170.185.70 enable=yes netsh advfirewall firewall add rule name="telemetry_feedback.microsoft-hohm.com" dir=out action=block remoteip=64.4.6.100,65.55.39.10 enable=firewaellsh ad firewall add rule name="telemetry_feedback.search.microsoft.com" dir=out action=block remoteip=157.55.129.21 enable=yes netsh advfirewall firewall add rule name="telemetry_rad.msn.com" dir=out action=block remoteip=207.46.194.25 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_preview.msn.com" dir=out action=block remoteip=23.102.21.4 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_dart.l.doubleclick.net" dir=out action=block remoteip=173.194.113.220,173.194.113.219,216.58.209.166 enablems=yes netsh advfirewall.firewall firewall.com addry name_ dir=out action=block remoteip=157.56.91.82,157.56.23.91,104.82.14.146,207.123.56.252,185.13.160.61,8.254.209.254 dir=out action=block remoteip=198.78.208.254,185.13.160.61 enable=yes netsh advfirewall firewall add rule name="telemetry_global.msads.net.c.footprint.net" dir=out action=block remoteip=185.13.160.61,8.254.209.254,207.123.56.252 enable=yes netsh advfirewall firewall add rule name="telemetry_az361816.vo.msecnd.net" dir=out action=block.yes2net enable=out action=block.yes20 enable. advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com.nsatc.net" dir=out action=block remoteip=65.55.252.63 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes netsh advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes netsh advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes netsh advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes netsh advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes netsh advfirewall firewall add rule name="telemetry_ssw.live.com" dir=out action=block remoteip=207.46.101.29 enable=yes netsh advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes netsh advfirewall firewall add rule name="telemetry_msnbot-65-55-108-23.search.msn.com" dir=out action=block remoteip=65.55.108.2 enable =da netsh advfirewall firewall add rule name="telemetry_a23-218-212-69.deploy.static.akamaitechnologies.com" dir=out action=block remoteip=23.218.212.69 enable=yes

Dakle, da vam ovo olakšam kako biste mogli brzo dodati ova pravila, pripremio sam za vas batch datoteku. Pokrenite "add rules.cmd" i potvrdite UAC prompt.

Preuzmite datoteku Block Telemetry Rules za Windows 10

Nakon toga, trebali biste vidjeti sljedeće u Windows vatrozidu:

Windows 10 vas više neće špijunirati. Nisu uključeni alati treće strane.

Sada idite na Usluge i aplikacije -> Usluge u lijevom oknu. Na popisu Usluge onemogućite sljedeće usluge:

Usluga praćenja dijagnostike
dmwappushsvc

Dvaput kliknite na spomenute usluge i odaberite "Onemogućeno" za vrstu pokretanja:

Trebaš ponovno pokrenite Windows 10 kako bi promjene stupile na snagu.

Ovaj posljednji korak će onemogućiti "keylogger", koji bi mogao slati podatke koje upišete. Ovaj korak zapravo nije potreban jer su svi poslužitelji već blokirani. Međutim, kada ažurirate Windows 10, Microsoft može promijeniti popis poslužitelja i dodati nove poslužitelje. Dakle, onemogućavanjem navedenih servisa možete biti sigurni da OS neće tajno prikupljati i slati podatke.

To je to. Otvoren sam za vaša pitanja. Ako nešto niste razumjeli, javite mi u komentarima.

Microsoft ukida podršku za Windows 7 i Office 2010

Microsoft ukida podršku za Windows 7 i Office 2010

Softverski div iz Redmonda ukida podršku za dva svoja najpopularnija proizvoda ikada - Windows 7 ...

Čitaj više

Zbirni paket ažuriranja za Windows 7 SP1 iz lipnja 2016. popravlja spor Windows Update

Zbirni paket ažuriranja za Windows 7 SP1 iz lipnja 2016. popravlja spor Windows Update

Ostavite odgovorIzašao je zbirni paket ažuriranja iz lipnja 2016. za Windows 7 servisni paket 1 (...

Čitaj više

Kako vratiti Windows Media Player u sustav Windows 10

Kako vratiti Windows Media Player u sustav Windows 10

Kao što možda već znate, Windows Media Player 12 postaje izborna značajka s nedavnim ažuriranjima...

Čitaj više