Disable Cortana's access to cloud services such as OneDrive and SharePoint
- Single actionThis page belongs to a script, containing basic changes to achieve a task.
- Windows onlyThis script improves your privacy on Windows
- Impact: MinimumSystem Functionality Loss Risk: Low
This action improves privacy with minimal impact when you run the recommended script. - Batch (batchfile)These changes use Windows system commands to update your settings.
- Fully reversible
You can fully restore this action (revert back to the original behavior) using this website.
The restore/revert methods provided here can help you fix issues.
Overview
Missing Good Quality Documentation
This page does not yet meet PrivacyLearn's documentation standards. However, the script/action is stable and verified by community. Here are some options for you to understand its functionality:Computer-generated docs (PREVIEW)
This documentation may be low quality but still useful.Read computer-generated explanation
This documentation is automatically extracted from the code implementation.
Disable Cortana's access to cloud services such as OneDrive and SharePoint to restrict tracking to enhance cyber data management on Windows — Read along, this setup consists of scripts to just that. For your context, this companion provides instructions to undo operational changes.
Having information privacy helps maintain the confidentiality of personal relationships. Ready to modify important privacy management control? Just, explore one of the paths provided. Think of this process as following a recipe. Each step is important for the final outcome to turn out perfectly.
Technical Details
To benefit from intelligent process monitoring, this configuration implements application execution boundaries to improve system privacy handling. To achieve balanced CPU utilization, this can help reduce system overhead.
This config applies registry security modifications to be able to maintain stricter online privacy management by deep privacy enforcement. This adjustment can also help make the system more stable, to realize streamlined registry access.
This tweak manages File Explorer settings to help reduce cyber privacy measures risks and it helps to reach selective content visibility. Subsequent to quick folder access, it can also help improve overall system responsiveness.
The instruction set here controls system preferences to gain secured system settings and this can help to be able to optimize cyber privacy handling. In association with optimize software and hardware performance, this would help to obtain enhanced resource management.
Explore similar guides
Gives more context about the goal of the changesReview code
Requires technical knowledge about Batch (batchfile)Edit this page to improve
Requires technical knowledge about YAML and GitApply Now
Choose one of three ways to apply:
Download script
Download and run the script directly- No app needed
- Offline usage
- Easy-to-apply
- Free
- Open-source
Apply with privacy.sexy
Guided, automated application with safety checks- Recommended for most users
- Includes safety checks
- Free
- Open-source
- Popular
- Offline/Online usage
- Apply
- Revert
:: Set the registry value: "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search!AllowCloudSearch"
PowerShell -ExecutionPolicy Unrestricted -Command "$registryPath = 'HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search'; $data = '0'; reg add 'HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search' /v 'AllowCloudSearch' /t 'REG_DWORD' /d "^""$data"^"" /f"
:: Suggest restarting explorer.exe for changes to take effect
PowerShell -ExecutionPolicy Unrestricted -Command "$message = 'This script will not take effect until you restart explorer.exe. You can restart explorer.exe by restarting your computer or by running following on command prompt: `taskkill /f /im explorer.exe & start explorer`.'; $warn = $false; if ($warn) { Write-Warning "^""$message"^""; } else { Write-Host "^""Note: "^"" -ForegroundColor Blue -NoNewLine; Write-Output "^""$message"^""; }"
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
Similar Guides
Wider Goal
Guides below includes this guide to achieve a wider goal.See other more general settings that includes this one as one of its actions.These plans combine multiple privacy settings, including this one, for stronger protection.
- Disable Cortana data collection
- Disable Windows search data collection
- Disable OS data collection
This category targets the reduction of Cortana's data collection practices. Cortana, Microsoft's digital assistant, integrates deeply with Windows Search...
This category is dedicated to minimizing the personal data collected and utilized by Windows Search and Cortana. It encompasses a range of scripts design...
Same Goal
Other guides in Disable Cortana data collection See settings that are in the same category as this guide.Using other actions in the same category may help you achieve your goal better.
See all 10 guides
About the Creators
These people have authored this documentation and written its scripts:
Reviewed By
This guide has undergone comprehensive auditing and peer review:Expert review by undergroundwires
- Verified technical accuracy and editorial standards
- Assessed system impact and user privacy risks
- Audited and verified using automated security tests
Public review by large community
- Privacy enthusiasts and professionals peer-reviewed
- Millions of end-users tested across different environments
- Audited and verified using third-party security software
History
We continually monitor our guides, their impact and other potential privacy options. We update our guides when new information becomes available. On every update, we publicly store who made the change, what has been changed, why the change was made and when the change was made.