Get a Pentest and security assessment of your IT network.

Cyber Security

Block Windows 10 Telemetry

TL;DR

This guide shows you how to block Windows 10 telemetry destinations using the built-in Windows Firewall. This reduces the amount of data sent back to Microsoft.

Blocking Telemetry Destinations with Windows Firewall

  1. Open Windows Defender Firewall with Advanced Security: Search for “Windows Defender Firewall” in the Start menu, then click on “Advanced settings”.
  2. Create New Outbound Rules: In the left pane, select “Outbound Rules”, and then click “New Rule…” in the right pane.
  3. Rule Type – Program: Select “Program” as the rule type and click “Next”.
  4. Specify the Program Path: For each telemetry process, create a separate rule. Use these paths:
    • C:WindowsSystem32svchost.exe
    • C:WindowsSystemAppsMicrosoft.TelemetryApp_cw5n1h2txyewyTelemetryClient.exe

    Click “Next”.

  5. Action – Block the connection: Select “Block the connection” and click “Next”.
  6. Profile – All Profiles: Ensure all profiles (Domain, Private, Public) are checked. Click “Next”.
  7. Name the Rule: Give each rule a descriptive name like “Block Telemetry svchost” or “Block Telemetry Client”, and add an optional description. Click “Finish”.
  8. Repeat for Each Process: Repeat steps 2-7 for each of the telemetry process paths listed in step 4. You will create two rules in total.
  9. Verify Rules are Enabled: In the Outbound Rules list, ensure both newly created rules have a green checkmark icon indicating they are enabled. If not, right-click the rule and select “Enable Rule”.

Additional Considerations

  • svchost.exe is critical: Blocking svchost.exe can cause unexpected issues as it hosts many important Windows services. Be prepared to disable the rule if you encounter problems.
  • Microsoft may change paths: Microsoft could update these telemetry process paths in future Windows updates, requiring you to recreate or modify the rules.
  • Alternative Tools: Consider using third-party privacy tools for more comprehensive control over telemetry and data collection.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation