Windows Tips & News

Prestanite da vas Windows 10 špijunira samo pomoću Windows vatrozida

click fraud protection

Za svakoga tko koristi Windows 10 nije tajna da ovaj operativni sustav prikuplja puno privatnih informacija i šalje ih natrag Microsoftu kako bi dobili više telemetrijskih podataka. Mnogi korisnici nisu sretni što ih Windows 10 špijunira i stalno traži način da to zaustave. Iako ovo nije prvi put da se pozivamo na ovo pitanje, danas bih želio podijeliti jedan drugačiji način da spriječite Windows 10 da prikuplja vaše osjetljive podatke koristeći samo ugrađeni Windows Vatrozid.

U mom prethodnom članku, Kako onemogućiti telemetriju i prikupljanje podataka u sustavu Windows 10, opširno sam opisao što je telemetrija i kako Microsoft prikuplja vaše podatke. Osim toga, članak dolazi s rješenjem protiv prikupljanja podataka bez vašeg odobrenja.

Prije nego krenemo, svakako bih trebao spomenuti jednu činjenicu. Čuvajte se korisnici Windowsa 7/Windows 8, vaš operativni sustav možda i vas špijunira! Pogledajte sljedeći članak:Telemetrija i prikupljanje podataka također dolaze u Windows 7 i Windows 8

Pogledajmo što možemo učiniti kako bismo spriječili da vas Windows 10 špijunira samo pomoću Windows vatrozida. Glavna ideja ove metode je blokiranje dobro poznatog popisa Microsoftovih poslužitelja pomoću odgovarajućih pravila Windows vatrozida. To ne uključuje nikakav alat treće strane u proces, što je također dobro. Vidjet ćete i kontrolirati ono što radite.

Pogledajmo sljedeći primjer:

netsh advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes

Gornja naredba dodaje i aktivira novo pravilo koje blokira odlazne veze s poslužiteljem "telemetry_watson.telemetry.microsoft.com". Blokiranje će se izvršiti korištenjem ovih IP adresa: 65.55.252.43,65.52.108.29.

Ovu naredbu treba izvršiti u povišenom naredbenom retku. Ovo nije preteško. Ali kada trebate blokirati sve poslužitelje telemetrije, možete se umoriti izvršavajući sve potrebne naredbe jednu po jednu. Samo pogledajte kompletan popis (isječak PowerShell) u nastavku!

Set-NetFirewallProfile -all netsh advfirewall firewall add rule name="telemetry_vortex.data.microsoft.com" dir=out action=block remoteip=191.232.139.254 enable=yes netsh advfirewall firewall add pravilo name="telemetry_telecommand.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.92 enable=yes netsh advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.63 enable=yes netsh advfirewall firewall add rule name="telemetry_sqm.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.93 enable=yes netsh advfirewall firewall add rule name="telemetry_watson.telemetry.microsoft.com" dir=out action=block remoteip=65.55.252.43,65.52.108.29 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_redir.metaservices.microsoft.com" dir=out action=block remoteip=194.44.4.200,194.44.4.208 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_choice.microsoft.com" dir=out action=block remoteip=157.56.91.77 enable=yes netsh advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes netsh advfirewall firewall add rule name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.93 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_services.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.92 enable=yes netsh advfirewall firewall add rule name="telemetry_sqm.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.94 enable=yes netsh advfirewall firewall add rule name="telemetry_telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.9 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_watson.ppe.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.11 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_telemetry.appex.bing.net" dir=out action=block remoteip=168.63.108.233 enable=yes netsh advfirewall firewall add rule name="telemetry_telemetry.urs.microsoft.com" dir=out action=block remoteip=157.56.74.250 enable=yes netsh advfirewall firewall add pravilo name="telemetry_settings-sandbox.data.microsoft.com" dir=out action=block remoteip=111.221.29.177 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_survey.watson.microsoft.com" dir=out action=block remoteip=207.68.166.254 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_watson.live.com" dir=out action=block remoteip=207.46.223.94 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_watson.microsoft.com" dir=out action=block remoteip=65.55.252.71 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_statsfe2.ws.microsoft.com" dir=out action=block remoteip=64.4.54.22 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_corpext.msitadfs.glbdns2.microsoft.com" dir=out action=block remoteip=131.107.113.238 netsh enable=yes advfirewall firewall add rule name="telemetry_compatexchange.cloudapp.net" dir=out action=block remoteip=23.99.10.11 enable=yes netsh advfirewall firewall add rule name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes netsh advfirewall firewall add rule name="telemetry_a-0001.a-msedge.net" dir=out action=block remoteip=204.79.197.200 enable=yes netsh advfirewall firewall add rule name="telemetry_statsfe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=64.4.54.22 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_sls.update.microsoft.com.akadns.net" dir=out action=block remoteip=157.56.77.139 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_fe2.update.microsoft.com.akadns.net" dir=out action=block remoteip=134.170.58.121,134.170.58.123,134.170.53.29,66.119.144.190,134.170.58.189,134.170.58.123.com name="telemetry_diagnostics.support.microsoft.com" dir=out action=block remoteip=157.56.121.89 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_corp.sts.microsoft.com" dir=out action=block remoteip=131.107.113.238 enable=yes netsh advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes netsh advfirewall firewall add pravilo name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_feedback.windows.com" dir=out action=block remoteip=134.170.185.70 enable=yes netsh advfirewall firewall add rule name="telemetry_feedback.microsoft-hohm.com" dir=out action=block remoteip=64.4.6.100,65.55.39.10 enable=firewaellsh ad firewall add rule name="telemetry_feedback.search.microsoft.com" dir=out action=block remoteip=157.55.129.21 enable=yes netsh advfirewall firewall add rule name="telemetry_rad.msn.com" dir=out action=block remoteip=207.46.194.25 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_preview.msn.com" dir=out action=block remoteip=23.102.21.4 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_dart.l.doubleclick.net" dir=out action=block remoteip=173.194.113.220,173.194.113.219,216.58.209.166 enablems=yes netsh advfirewall.firewall firewall.com addry name_ dir=out action=block remoteip=157.56.91.82,157.56.23.91,104.82.14.146,207.123.56.252,185.13.160.61,8.254.209.254 dir=out action=block remoteip=198.78.208.254,185.13.160.61 enable=yes netsh advfirewall firewall add rule name="telemetry_global.msads.net.c.footprint.net" dir=out action=block remoteip=185.13.160.61,8.254.209.254,207.123.56.252 enable=yes netsh advfirewall firewall add rule name="telemetry_az361816.vo.msecnd.net" dir=out action=block.yes2net enable=out action=block.yes20 enable. advfirewall firewall add rule name="telemetry_oca.telemetry.microsoft.com.nsatc.net" dir=out action=block remoteip=65.55.252.63 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_reports.wes.df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.91 enable=yes netsh advfirewall firewall add rule name="telemetry_df.telemetry.microsoft.com" dir=out action=block remoteip=65.52.100.7 enable=yes netsh advfirewall firewall dodaj pravilo name="telemetry_cs1.wpc.v0cdn.net" dir=out action=block remoteip=68.232.34.200 enable=yes netsh advfirewall firewall add rule name="telemetry_vortex-sandbox.data.microsoft.com" dir=out action=block remoteip=64.4.54.32 enable=yes netsh advfirewall firewall add rule name="telemetry_pre.footprintpredict.com" dir=out action=block remoteip=204.79.197.200 enable=yes netsh advfirewall firewall add rule name="telemetry_i1.services.social.microsoft.com" dir=out action=block remoteip=104.82.22.249 enable=yes netsh advfirewall firewall add rule name="telemetry_ssw.live.com" dir=out action=block remoteip=207.46.101.29 enable=yes netsh advfirewall firewall add rule name="telemetry_statsfe1.ws.microsoft.com" dir=out action=block remoteip=134.170.115.60 enable=yes netsh advfirewall firewall add rule name="telemetry_msnbot-65-55-108-23.search.msn.com" dir=out action=block remoteip=65.55.108.2 enable =da netsh advfirewall firewall add rule name="telemetry_a23-218-212-69.deploy.static.akamaitechnologies.com" dir=out action=block remoteip=23.218.212.69 enable=yes

Dakle, da vam ovo olakšam kako biste mogli brzo dodati ova pravila, pripremio sam za vas batch datoteku. Pokrenite "add rules.cmd" i potvrdite UAC prompt.

Preuzmite datoteku Block Telemetry Rules za Windows 10

Nakon toga, trebali biste vidjeti sljedeće u Windows vatrozidu:

Windows 10 vas više neće špijunirati. Nisu uključeni alati treće strane.

Sada idite na Usluge i aplikacije -> Usluge u lijevom oknu. Na popisu Usluge onemogućite sljedeće usluge:

Usluga praćenja dijagnostike
dmwappushsvc

Dvaput kliknite na spomenute usluge i odaberite "Onemogućeno" za vrstu pokretanja:

Trebaš ponovno pokrenite Windows 10 kako bi promjene stupile na snagu.

Ovaj posljednji korak će onemogućiti "keylogger", koji bi mogao slati podatke koje upišete. Ovaj korak zapravo nije potreban jer su svi poslužitelji već blokirani. Međutim, kada ažurirate Windows 10, Microsoft može promijeniti popis poslužitelja i dodati nove poslužitelje. Dakle, onemogućavanjem navedenih servisa možete biti sigurni da OS neće tajno prikupljati i slati podatke.

To je to. Otvoren sam za vaša pitanja. Ako nešto niste razumjeli, javite mi u komentarima.

Odaberite i premjestite više kartica u Google Chromeu

Odaberite i premjestite više kartica u Google Chromeu

U trenutku pisanja ovog teksta, Google Chrome je najpopularniji web preglednik. Dostupan je za Wi...

Čitaj više

Flight (bez naslovnice) skin iz AIMP3

Ova web stranica koristi kolačiće kako bi poboljšala vaše iskustvo dok se krećete kroz web strani...

Čitaj više

Tamna tema za Firefox stabilna

Tamna tema za Firefox stabilna

4 odgovoraRazvojno izdanje preglednika Mozilla Firefox dolazi s drugačijom, tamnom temom. Evo tri...

Čitaj više