TL;DR
This guide shows you how to block Windows 10 telemetry destinations using the built-in Windows Firewall. This reduces the amount of data sent back to Microsoft.
Blocking Telemetry Destinations with Windows Firewall
- Open Windows Defender Firewall with Advanced Security: Search for “Windows Defender Firewall” in the Start menu, then click on “Advanced settings”.
- Create New Outbound Rules: In the left pane, select “Outbound Rules”, and then click “New Rule…” in the right pane.
- Rule Type – Program: Select “Program” as the rule type and click “Next”.
- Specify the Program Path: For each telemetry process, create a separate rule. Use these paths:
C:WindowsSystem32svchost.exeC:WindowsSystemAppsMicrosoft.TelemetryApp_cw5n1h2txyewyTelemetryClient.exe
Click “Next”.
- Action – Block the connection: Select “Block the connection” and click “Next”.
- Profile – All Profiles: Ensure all profiles (Domain, Private, Public) are checked. Click “Next”.
- Name the Rule: Give each rule a descriptive name like “Block Telemetry svchost” or “Block Telemetry Client”, and add an optional description. Click “Finish”.
- Repeat for Each Process: Repeat steps 2-7 for each of the telemetry process paths listed in step 4. You will create two rules in total.
- Verify Rules are Enabled: In the Outbound Rules list, ensure both newly created rules have a green checkmark icon indicating they are enabled. If not, right-click the rule and select “Enable Rule”.
Additional Considerations
- svchost.exe is critical: Blocking
svchost.execan cause unexpected issues as it hosts many important Windows services. Be prepared to disable the rule if you encounter problems. - Microsoft may change paths: Microsoft could update these telemetry process paths in future Windows updates, requiring you to recreate or modify the rules.
- Alternative Tools: Consider using third-party privacy tools for more comprehensive control over telemetry and data collection.

