There’s plenty of powershell scripts to “reclaim windows” etc. I was a sysadmin in mixed environment for 15 years and Windows Enterprise you can disable all the creepy features on. This was critical infra environment with explicit firewall rules for everything and no traffic from the end user that didn’t go through our proxies.
There’s plenty of powershell scripts to “reclaim windows” etc. I was a sysadmin in mixed environment for 15 years and Windows Enterprise you can disable all the creepy features on. This was critical infra environment with explicit firewall rules for everything and no traffic from the end user that didn’t go through our proxies.