This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

W10 list of ports that can be blocked without affecting the updates?

In the old UBB there was a thread that had a list of sites that Window 10 connected to. The aim was to provide a list of ports and sites that were needed for the w10 update process.


I tried the search in the old UBB, but was returned a 404 which means the site is basically useless as a reference.

Ian



This thread was automatically locked due to age.
  • Haven't used Windows 10 yet... still waiting for my 'free update' at home. However, do Windows 10 updates not work out of the box? Is the web filter too aggressive??
    What about this WUDO stuff I read about, is this relevant?
    www.computerworld.com/.../windows-10-commandeers-users-upload-bandwidth.html

    ==

    When in doubt, Script it out.

  • Windows should only use port 80 and port 25, rarely, for update downloading. As Azron linked, there are other ways for the update to communicate but this looks more for local listening for P2P of local systems for Windows Update than external communication. This is solely to save on external bandwidth.

    Windows Update functionality is generally done on port 80 because it is able to scale through most firewalls regardless of it's set up.

    A related topic that might answer the list of sites that Windows 10 connects to is here and it's capability of being blocked/allowed through webfiltering: www.astaro.org/.../58583-heres-how-block-windows-10-spying.html

    If you still can't access the link, search on Google for "site:astaro.org web filtering windows 10 updates" without quotes and you can view the cached content on the hits there by clicking the little green arrow next to the link in the search result.

  • I think you are meaning this thread:

    Here's how to Block Windows 10 "Spying"
    I have gathered from different sources the sites that Windows 10 use to send informations collected from your computer.

    You just need to go into: Web Protection -> Web Filtering -> Policies -> Default content filter action

    Under Websites -> Block Theses Websites Import this list :


    ads1.msn.com a.ads1.msn.com a.ads2.msn.com adnexus.net adnxs.com aidps.atdmt.com apps.skype.com az361816.vo.msecnd.net az512334.vo.msecnd.net a.rad.msn.com a.ads2.msads.net ac3.msn.com aka-cdn-ns.adtech.de b.rad.msn.com b.ads2.msads.net b.ads1.msn.com bs.serving-sys.com c.msn.com cdn.atdmt.com cds26.ams9.msecn.net c.atdmt.com db3aqu.atdmt.com ec.atdmt.com flex.msn.com g.msn.com h1.msn.com live.rads.msn.com msntest.serving-sys.com m.adnxs.com m.hotmail.com pricelist.skype.com rad.live.com secure.flashtalking.com static.2mdn.net s.gateway.messenger.live.com secure.adnxs.com sO.2mdn.net ui.skype.com www.msftncsi.com msftncsi.com view.atdmt.com msnbot-65-55-108-23.search.msn.com settings-win.data.microsoft.com schemas.microsoft.akadns.net a-0001.a-msedge.net a-0002.a-msedge.net a-0003.a-msedge.net a-0004.a-msedge.net a-0005.a-msedge.net a-0006.a-msedge.net a-0007.a-msedge.net a-0008.a-msedge.net a-0009.a-msedge.net msedge.net a-msedge.net lb1.www.ms.akadns.net pre.footprintpredict.com vortex-bn2.metron.live.com.nsatc.net vortex-cy2.metron.live.com.nsatc.net

    Timo

    _____________________
    Sophos Certified Architect

  • Thank you Tim and Emile,
    that is the information Ii was looking for.

    Ian M

    XG115W - v20.0.2 MR-2 - Home

    XG on VM 8 - v21 GA

    If a post solves your question please use the 'Verify Answer' button.