Use Glasswire to disable all activity being sent to Microsoft

I find Glasswire very difficult to understand and use. When I go to settings/privacy etc. on my windows 10 piece of junk there is NO OPTION to stop sending activity to Microsoft as all the articles say there is. There are only options to clear history ie. my email.

So can I use Glasswire to disable my box from sending ANY AND ALL info to MS? Like if some app crashes I immediately get a message that that info is going To MS etc.

Along these lines I have disabled those invasive endless updates long ago but that played havoc with the machine so now I had to reenable them.

All the garbage Microsoft forces you to eat is ultimately installed to spy on you for whatever reasons and I’m sick of it.

For now though, can someone say exactly and simply, like talking to a moronic 3 year old , the precise way to get Glasswire to disallow any outgoing stuff to of any type to that giant evil corporation?

Thanks

Simply, you can’t. As I am also just discovering, no matter what you set, Glasswire will always let certain Microsoft communications through.

Coincidently, on the bottom of their main page it states they are a Microsoft partner soo…

Time to move on to another application, even though their pages states you can control all traffic, it was a lie. I will be seeking refunds due to poor/false ads and no longer recommending it to anyone. You should as well.

Two suggestions

  1. Google Debloat Windows 10 and follow the suggestions in the first link article on Powershell
  2. Setup Abelssoft Win10PrivacyFix 2022 4.06.37201

Important: Unless you want problems with your PC and have to format in the future, do not use any “debloat” or “privacy improving” softwares for Windows 10 or 11.

You cannot block Microsoft’s urls and there’s nothing wrong with that. GlassWire does not block them because GlassWire hooks into Microsoft Defender. Certain URLs are permitted access, for things like Windows Updates, etc.

There is too much paranoia about things like telemetry. Telemetry is beneficial for handing things like crash dumps. Look at telemetry like this: You’re a software developer. People start telling you about problems in your software but are not the best at saying how to reproduce it. You attempt a bug fix and introduce telemetry. This gives you some extra information that is anonymous - such as what OS they’re using, if it’s up to date (think 21H1, 1903, etc for Windows 10), what .NET they have installed, the installed antivirus, firewall, and so on. You can then use this anonymous data to see what happened when the program crashed, and how to best fix it.

Something to keep in mind. Programs that claim to enhance Windows 10/11 often do things that break your system. Or worse, as recently seen - like the tool to enable Google Play was actually malware. There’s even fake Windows 11 upgrades that are true data thiefs - stealing browser data and any cryptcurrency wallet information.

Be smart and stay safe with all the real dangers out there.

Click on your Firewall icon at the top of your screen, then look over to the left and it will say Click to Block, click on it and it will bring down a menu with choices, click on the one that says Block All! Hope that helps! :grinning:

:rofl: That comment made my day!

Microsoft Windows is now a connected service. It needs access to the net and Microsoft servers to function correctly.

GlassWire does not have any host blocking or IP blocking features, just application blocking. Even if it did, blocking all Microsoft connections would be a bad idea.

If you don’t trust Microsoft, then you should probably be using Linux.

Windows won’t stop working if you unplug the Ethernet cable, turn off your router or your ISP goes dark.

Here’s the Windows and MS stuff I’ve blocked in GW since I built my i9-9900K/Z390 Win10 Pro primary (10 hours a day, 12-18 GB/month) desktop in Feb. 2020. My other systems pretty much the same. If blocking anything here that matters to your system, you’ll get some sort of alert at which time you can unblock it. It’s never happened to me.

This is the best any app blocking tool can do, and IMHO, GW’s method is the best at it.

OOPS. “File version and signature viewer” isn’t a MS app.

For those apps MS chose not to preface with “Microsoft” or “Windows,” I’ve listed them as text.

Many of these are LAN focused, having to do with syncing devices, files and share points, particularly in the enterprise (business).

Windows Problem Reporting: there are different process MS uses for that. I’ve had three of 'em run over time.

For the monthly Windows Update (aka Bork Tuesday), I turn off GW in order to return control to the Defender Firwewall ruleset.

Obviously, if you use Windows Apps, don’t block them.

As well, you can always unblock an app and re-block it if connectivity is needed. Like Power Shell or the Feedback Hub.

I don’t do (gag, choke) Edge. But if you do, you can disable its updater. Unblock, run, block returns manual control to you.

Cheers.

1 Like

Check this out https://www.oo-software.com/en/shutup10

More control over your operating system

Adapt your security settings
Protect your privacy
Control location services
Disable telemetry for Microsoft Office
Do not pass on your user data and diagnostics

Add this to your hosts file. Not a complete list but will block most Windows telemetry stuff.

0.0.0.0	a.ads1.msn.com
0.0.0.0	a.ads2.msads.net
0.0.0.0	a.ads2.msn.com
0.0.0.0	a.rad.msn.com
0.0.0.0	a-0001.a-msedge.net
0.0.0.0	a-0002.a-msedge.net
0.0.0.0	a-0003.a-msedge.net
0.0.0.0	a-0004.a-msedge.net
0.0.0.0	a-0005.a-msedge.net
0.0.0.0	a-0006.a-msedge.net
0.0.0.0	a-0007.a-msedge.net
0.0.0.0	a-0008.a-msedge.net
0.0.0.0	a-0009.a-msedge.net
0.0.0.0	ac3.msn.com
0.0.0.0	ad.doubleclick.net
0.0.0.0	adnexus.net
0.0.0.0	adnxs.com
0.0.0.0	ads.msn.com
0.0.0.0	ads1.msads.net
0.0.0.0	ads1.msn.com
0.0.0.0	aidps.atdmt.com
0.0.0.0	aka-cdn-ns.adtech.de
0.0.0.0	a-msedge.net
0.0.0.0	apps.skype.com
0.0.0.0	az361816.vo.msecnd.net
0.0.0.0	az512334.vo.msecnd.net
0.0.0.0	b.ads1.msn.com
0.0.0.0	b.ads2.msads.net
0.0.0.0	b.rad.msn.com
0.0.0.0	bs.serving-sys.com
0.0.0.0	c.atdmt.com
0.0.0.0	c.msn.com
0.0.0.0	cdn.atdmt.com
0.0.0.0	cds26.ams9.msecn.net
0.0.0.0	compatexchange.cloudapp.net
0.0.0.0	corpext.msitadfs.glbdns2.microsoft.com
0.0.0.0	cs1.wpc.v0cdn.net
0.0.0.0	db3aqu.atdmt.com
0.0.0.0	ec.atdmt.com
0.0.0.0	fe2.update.microsoft.com.akadns.net
0.0.0.0	feedback.microsoft-hohm.com
0.0.0.0	flex.msn.com
0.0.0.0	g.msn.com
0.0.0.0	h1.msn.com
0.0.0.0	lb1.www.ms.akadns.net
0.0.0.0	live.rads.msn.com
0.0.0.0	m.adnxs.com
0.0.0.0	m.hotmail.com
0.0.0.0	msedge.net
0.0.0.0	msftncsi.com
0.0.0.0	msnbot-65-55-108-23.search.msn.com
0.0.0.0	msntest.serving-sys.com
0.0.0.0	pre.footprintpredict.com
0.0.0.0	preview.msn.com
0.0.0.0	pricelist.skype.com
0.0.0.0	rad.live.com
0.0.0.0	rad.msn.com
0.0.0.0	s.gateway.messenger.live.com
0.0.0.0	s0.2mdn.net
0.0.0.0	schemas.microsoft.akadns.net
0.0.0.0	secure.adnxs.com
0.0.0.0	secure.flashtalking.com
0.0.0.0	sls.update.microsoft.com.akadns.net
0.0.0.0	static.2mdn.net
0.0.0.0	statsfe1.ws.microsoft.com
0.0.0.0	statsfe2.update.microsoft.com.akadns.net
0.0.0.0	statsfe2.ws.microsoft.com
0.0.0.0	survey.watson.microsoft.com
0.0.0.0	view.atdmt.com
0.0.0.0	www.msftncsi.com
0.0.0.0	choice.microsoft.com
0.0.0.0	choice.microsoft.com.nstac.net
0.0.0.0	df.telemetry.microsoft.com
0.0.0.0	oca.telemetry.microsoft.com
0.0.0.0	oca.telemetry.microsoft.com.nsatc.net
0.0.0.0	redir.metaservices.microsoft.com
0.0.0.0	reports.wes.df.telemetry.microsoft.com
0.0.0.0	services.wes.df.telemetry.microsoft.com
0.0.0.0	settings-sandbox.data.microsoft.com
0.0.0.0	settings-win.data.microsoft.com
0.0.0.0	sqm.df.telemetry.microsoft.com
0.0.0.0	sqm.telemetry.microsoft.com
0.0.0.0	sqm.telemetry.microsoft.com.nsatc.net
0.0.0.0	telecommand.telemetry.microsoft.com
0.0.0.0	telecommand.telemetry.microsoft.com.nsatc.net
0.0.0.0	telemetry.appex.bing.net
0.0.0.0	telemetry.microsoft.com
0.0.0.0	telemetry.urs.microsoft.com
0.0.0.0	vortex-sandbox.data.microsoft.com
0.0.0.0	vortex-win.data.microsoft.com
0.0.0.0	vortex.data.microsoft.com
0.0.0.0	watson.telemetry.microsoft.com
0.0.0.0	watson.telemetry.microsoft.com.nsatc.net
0.0.0.0	watson.ppe.telemetry.microsoft.com
0.0.0.0	wes.df.telemetry.microsoft.com
0.0.0.0	vortex-bn2.metron.live.com.nsatc.net
0.0.0.0	vortex-cy2.metron.live.com.nsatc.net
0.0.0.0	watson.live.com
0.0.0.0	watson.microsoft.com
0.0.0.0	feedback.search.microsoft.com
0.0.0.0	feedback.windows.com
0.0.0.0	corp.sts.microsoft.com
0.0.0.0	diagnostics.support.microsoft.com
0.0.0.0	i1.services.social.microsoft.com
0.0.0.0	i1.services.social.microsoft.com.nsatc.net
0.0.0.0	vortex-bn2.metron.live.com.nsatc.net
0.0.0.0	vortex-cy2.metron.live.com.nsatc.net
0.0.0.0	ca.telemetry.microsoft.com
0.0.0.0	cache.datamart.windows.com
0.0.0.0	diagnostics.support.microsoft.com
0.0.0.0	spynet2.microsoft.com
0.0.0.0	spynetalt.microsoft.com

I understand that whining is not so much about spying as far as Microsoft is concerned. Yes you have direct links to MS but most of them are necessary to provide good service and do not understand that there are people who try to stop the updates. Why want to be safe, stop updates is only unsafe.

I am a Microsoft insider DEV and have never had any problems and yes my whole system is available to Microsoft, well, I have nothing to hide. I download cracked software except from Microsoft and Kaspersky to secure my system. Microsoft has never spoken to me about it. If I really want to be private, I use a well-secured Linux version on an external SSD drive. There are people who complain that Microsoft spies then they use Google all day and then also use Google chrome nice and smart about spying plus it is a system source eater because you are constantly being spied on. Google spies to sell all the info no matter what, Microsoft mainly uses it to improve its product. People don’t be so naïve nothing is more private nowadays even with a VPN. No I have no shares with Microsoft and pay for their products but think it is a beautiful operating system with many possibilities and convenience and yes that has a price but for me it pays off. For Google you also pay the price to use the search for free, a much higher price, if they can grab your medical data they sell it to insurance so that you can no longer insure yourself or you pay much more. If you really want to be a bit safe, use Linux in a shell with Linux commands. That’s a lot of work. I do that but as a hobby and work, game ect with Windows 11 Enterprise.

Regards

Evert (Netherlands)

The problem I have with sending stuff to Microsoft is that you really dont know what exactly they’re collecting and how they’re using it. If we’re to believe they aren’t collecting out of malicious intent, they are probably collecting things in-line with what Apple collects, which is your current IP, MAC address, Wi-Fi names you’re connected to and possibly any other hosts on that network to include their IPs and MAC from your ARP table. None of this alone is malicious, but you can very EASILY track and map out complete networks world-wide with this, even tracking people on your network who can’t really consent since their data is sent as well.

At first glance this might seem like a far-fetched conspiracy theory, but it really isn’t. The NSA has created MASSIVE data centers for “data they are not collecting” which makes no sense. AT&T literally mirrors ALL their traffic to NSA servers for collection, just look up Room 641A.

 https://www.investmentwatchblog.com/is-the-government-using-spy-hubs-in-8-att-buildings-across-the-country-to-intercept-our-emails-phone-calls-and-text-messages/

https://en.wikipedia.org/wiki/Room_641A

Microsoft was the FIRST NSA partner back in 2007 according to leaked slides regarding PRISM, an NSA spying program which is currently on-going.

https://rcpmag.com/blogs/scott-bekker/2013/06/prism-and-microsoft.aspx?m=1

Public data that is being collected by trackers/apps is being sent to an NSA contracting company, allowing them to know your precise location with over 90% accuracy at any given time.

https://theintercept.com/2022/04/22/anomaly-six-phone-tracking-zignal-surveillance-cia-nsa/

This is all just touching the ice berg. With Microsoft being an NSA partner, I am willing to bet everything I have that they do not disclose known zero-day exploits and allow the NSA to use them for implanting networks and people of interest.

1 Like

My understanding is that you can turn off sending data to Microsoft without having to use a third party app. Details on how to do that are here.

A quick and simple command shell, save as something dot cmd (ie. EditHosts.cmd ) to make Hosts edit easy - turn back attributes after edits done

set _Args=%*
if “%~1” NEQ “” (
set _Args=%_Args:"=%
)
fltmc 1>nul 2>nul || (
cd /d “%~dp0”
cmd /u /c echo Set UAC = CreateObject^(“Shell.Application”^) : UAC.ShellExecute “cmd.exe”, “/k cd “”%~dp0"” && “”%~dpnx0"" “”%_Args%""", “”, “runas”, 1 > “%temp%\GetAdmin.vbs”
“%temp%\GetAdmin.vbs”
del /f /q “%temp%\GetAdmin.vbs” 1>nul 2>nul
exit
)

takeown /f “%SystemRoot%\System32\drivers\etc\hosts” /a

icacls “%SystemRoot%\System32\drivers\etc\hosts” /grant administrators:F

attrib -h -r -s “%SystemRoot%\System32\drivers\etc\hosts”