Since its inception, Windows has been a natural habitat for malware of all stripes. It seems that the new version of this operating system itself has become one of the Trojans. Immediately after installation, a clean system behaves suspiciously. Data is pouring into dozens of servers from Microsoft and partner companies. We decided to deal with the complaints about the Dozens' espionage habits and found out what and where it was sending.

WARNING

All information was obtained in the course of our own research and is provided for informational purposes only. Neither the editorial board nor the author is responsible for any possible harm caused by interference with the OS.

Microsoft> NSA

The first reports of the strange behavior of Windows 10 appeared at the stage of acquaintance with the Technical Preview. Significant traffic is generated in it all the time - even when no network applications are running. Then this behavior was attributed to the collection of statistics necessary for debugging. Microsoft studied the behavior of the new product on different configurations, and users played the role of beta testers. Everything seems to be logical. However, with the release, nothing has changed, and the complaints have only increased. “Last weekend, I upgraded my son’s laptop to Windows 8 to Windows 10. Today, on my first business day, I received an email from Microsoft with the subject line“ Weekly Activity Report ”. It contained the most detailed information about the actions of his son at the laptop: when and how much he sat at it, what applications he used and for how long, what he searched on the net, what sites he visited, and much more. I was extremely outraged because I had no intention of keeping an eye on my child. Microsoft told me that if I do not want to receive such letters, then I should indicate this in the settings of my family account through my account. There was no such problem in Windows 8. " This is an excerpt from a letter from famous writer and activist friend Corey Doctorow, posted on the Boing Boing blog. Many reviewers claim that this user information is still collected - regardless of account settings. If something can be turned off, then these are reports that come to the mail.
Notice of lack of confidentiality The most interesting thing is that the collection of various information is built-in Windows tools 10 is detailed in the Privacy Statement. Of course, the majority will not read it, and among those who have familiarized themselves there will be many perplexed. The wording in bulky text is tricky and blurry. From them it is difficult to understand what exactly will change in terms of privacy with the transition to Windows 10. In short, you can forget about it. Human rights activists agree that the system immediately begins to collect all the data it can get. Here is a list of their main types. Biometric:
  • a sample of the voice and pronunciation of certain words;
  • sample of handwriting (handwriting input);
  • samples of typed texts in any application.
Geolocation:
  • information about the current location;
  • location history with timestamps.
Technical:
  • hardware data, including device identifiers;
  • information about connected networks (wired and wireless);
  • telemetry information;
  • data from any built-in sensors.
Behavioral Analysis:
  • search history;
  • history of visited web pages;
  • Windows start and shutdown time;
  • start and close time of each application.
Purchasing activity:
  • downloading applications from the company store;
  • clicking on links of contextual advertising;
  • clicking on links of personalized ads.
The list can be continued, but such a set is enough to start your own research. Looking ahead, we note that some of the accusations against Windows 10 were still not confirmed. For example, the Czech edition of AE News suggests that the OS is sending an image from a webcam to Microsoft's servers. In our test, the system reacted to the camera connection only by installing the drivers - no extraneous actions with it were registered either immediately or later.

Observing the observer

There are plenty of familiar tools in a hacker's arsenal to study any software. Test computer with blank SSD, virtual machine, Wireshark sniffer, Fiddler HTTP proxy and debugger, TCPView network connection monitor, registry snapshot programs and small helper utilities. We tried to use versions that do not require installation. The only exceptions were Wireshark and Fiddler due to the specifics of their work. We left these programs for last, so that most of the testing was done on a completely clean system. Network traffic was analyzed as in Windows settings 10 by default and after phasing out all tracking functions. From the white papers, it follows that the user is being followed: Windows itself, deeply integrated Bing search, Cortana voice assistant, MSN service, Office suite, OneDrive cloud storage client, mail client Outlook, as well as Skype, Silverlight, and Xbox Live. Read more about this on the Microsoft website. Let's see how the data collection takes place.
Start Windows 10 for the first time After performing a clean install of build 10240, we began to observe its network behavior using TCPView. No other action was taken. At first everything was quiet - like in "Seven". Only the branded app store showed willingness to receive data through the content delivery network from Akamai Technologies.
The calm before the storm When it was already getting boring to sit in ambush, suddenly came to life system process\ Windows \ System32 \ svchost.exe. It established a connection to remote host 191.232.139.254 and sent 7.5 KB to it.
First Petrel It was possible to find out the ownership of the IP address through the WHOIS service, but asking Shodan is more informative.
BingBot got caught As it became clear from the description, this is a robot search engine Bing. If at least one search query (even a local one) was made in the test, then the connection would not raise any objections. However, we just sat and watched the computer start spying on us in TCPView.

Preparing for a packet storm

Sleeping services can take a long time. It's time to wake them up and get some activity. Pressing the "Start" button made the infoblocks on the right come to life. The weather forecast appeared, news and advertisements began to be displayed. TCPView shows that this is all loading over the Akamai network and looks legitimate. As soon as we launch Notepad and start typing, the picture changes immediately.
Only Notepad is launched. Six connections appear at once, which are quickly closed - in total, a little more than a hundred packets are consumed. By disabling the function "search the Internet", we left only the local Windows search... We launched Notepad again and started typing arbitrary text. All the same, the SearchUI process appeared and began to transfer data to the network.
Internet search disabled Probably, we somehow misunderstood the "Privacy Statement". Let's see it again. This is a simple text page that opens in Edge browser... How much traffic can it generate? Approximately the same as in the picture.
One page is open in the browser. The list of connections was updated so quickly that you just couldn't keep track of it. Therefore, we proceeded to the second part of the study. We closed all applications, installed a Wireshark sniffer and recorded Windows activity for half an hour. To simulate at least some activity, we just looked at some settings in the control panel, but did not change them.
Windows transmits continuously - it does not matter if you are doing something or not. About eight thousand packets were sent to the network in half an hour. As the study of the logs showed, most of the connections were established at addresses within one of the large subnets. The IPs belonging to them often changed the last two or three octets. This suggests that Microsoft has deployed a huge network to handle all the information flowing down from Windows users. If we filter out addresses of the same type, then the bottom line will be a selection as in the picture.
In half an hour of our inactivity, Windows managed to send out reports all over the world. The Brazilian server catches the eye, but this is another BingBot (perhaps some especially specialized one), but it is not only this server that raises questions. For example, why the hell was the connection to the Facebook server in the Netherlands done? Who asked to connect to CloudFlare cloud storage? No files have been created yet. Even the Microsoft account hasn't been activated.

Uncovering the spy network

After searching for Bing, the main spy on Windows is Cortana. With her, a strained relationship somehow immediately developed. At first, she herself insisted on getting to know each other, and then suddenly announced that she did not understand Russian and was not even going to learn it.
Cortana is used to being the first to meet. Even after changing the language to English, and the region to the United States, we never got her location. The Microsoft knowledge base states this simply - install the appropriate patch through the update service. The only pity is that the user is now deprived of the opportunity to install updates at his own discretion. They are downloaded and installed by Windows automatically. The user can only choose to cancel the reboot and set the delayed installation.
Cortana Dynamite Russians Most of the hidden Windows traffic goes through the Akamai Content Delivery Network, so it does not appear in the HTTP proxy logs. However, this does not mean that watching them is useless. Some interesting things can be discovered by running Fiddler. For example, to find out that user identification occurs even before activating the installed copy of Windows.
Fragment of the HTTP proxy log When you look at the Fiddler window, you can see the characteristic form / usercard /? Id =, calls to account through Microsoft Live and more. Where the queries to visualstudio.com and Microsoft social services came from is a mystery.
Fiddler collected 29 web addresses HTTP traffic in half an hour of inactivity was so high that it became a problem to display it on the screen. We took a couple of screenshots and then compiled a list of the hosts that showed up. We could immediately add them to the hosts file, but we will postpone this for now so as not to disrupt the course of the experiment. Fiddler's catch feeds localhost From this list, the only expected URL is windowsupdate.com, which we did not include in the block list. According to the installation log, during the entire experiment, 21 updates were automatically installed with a total volume of about 150 MB. During the test, in addition to Notepad, we ran only Calculator and our utilities for analyzing Windows activity, in which auto-update was disabled. At the same time, the total network traffic exceeded half a gigabyte. Too much for "service data collected to improve the program experience"!
Half a gig of data leaked to the network The impression was badly spoiled. There are really a lot of tracking features in Windows 10. Disabling integrated search and firing Cortana only helps in part. Windows Defender sends images of files it deems suspicious or malicious to Microsoft. SmartScreen Filter not only scans web content, but also generates a list of visited pages. The location log records all physical movements (especially important if Windows 10 is installed on a mobile device). Many applications also send a user experience report in a new style, and in the "Diagnostic and Usage Data" section, you cannot prevent the submission of the report at all - you can only choose a less detailed option.

INFO

Recently, Microsoft has been trying to teach older versions of Windows to spy in the same way as the "Ten" does. In particular, tracking features will be added with updates KB3075249 and KB3080149.

Going offline

We decided to completely disable all legalized espionage tools using standard Windows tools. Basically, the settings are changed through the "Privacy", "Search" and "Update and Security" tabs in the control panel. There are about fifty switches, but will they be of any use? We disabled everything and started Wireshark again. This time, we did not use any built-in applications and did not even touch the mouse. Returning an hour later, we see painfully familiar IPs in the sniffer logs.
The snake changes its skin, but does not change its temper. There is progress. The total number of requests has decreased by an order of magnitude. The number of remote nodes to which a connection is made without the knowledge of the user has also decreased approximately threefold. However, new ones appeared among them. If a Facebook server was suddenly found in the first log of Wireshark, now the Amazon data center from Ireland is lit up.
Spy ranks thinned Since Fiddler helped get the IP list, adding them to the hosts file in bulk should help stop spying. Let's check by creating a block list and run Wireshark again.
A modest catch of Wireshark Compared to the first log, this one looks boring. Only one IP address could not fit on the screen, and their general list consists of only four. Two of them belong to the content delivery network and cannot be effectively blocked in hosts - too many subnets belong to Akamai. The third IP address belongs to the Windows Update service, which has not been blocked. The most persistent spy was BingBot. His connection with Brazilian Microsoft Informatica knows no barriers. Apparently, the process contains built-in circumvention tools.

We finish off the agents of the Matrix

A number of additional measures are available to help deal with the remaining Microsoft agents. You need to set the firewall to block connections to all IP addresses detected by Wireshark. We got 47 of them, but the list will surely increase with longer monitoring. There is still a chance that with the next automatic update, new IP addresses will be registered in the system files, but for now, together with the modification hosts file this provides most of the protection against surveillance. You can disable "non-disabled" functions through the registry: HKEY_LOCAL_MACHINE \ SOFTWARE \ Policies \ Microsoft \ Windows \ DataCollection By setting this parameter to a zero value, we prohibit sending "technical" data. It is advisable to delete the DiagTrack service file with the data already collected. Here is the path to it: C: \ ProgramData \ Microsoft \ Diagnosis \ ETLLogs \ AutoLogger \ AutoLogger-Diagtrack-Listener.etl You can disable the DiagTrack and dmwappushsvc services themselves through service management or the registry branch: HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ In the scheduler it is worth looking at the task queue and turning off all regular data submissions, if they are still left. It is recommended that you uninstall the OneDrive cloud client if you are not going to use it anyway. All of these steps can be performed manually, but the DisableWinTracking utility is a huge time saver. Unlike many of its counterparts, it is open source and well documented.

Outcome

After completing all the steps described above, Windows 10 lost its spy habits. Along with them, however, almost all new chips have disappeared, which are designed to improve the usability and ensure safety. However, as Franklin said: "Those who are willing to sacrifice their essential freedom for a little bit of temporary security are not worthy of either freedom or security."

Even before the release of Windows 10, disputes began to appear on the Web about sending various information to the servers of Miscrosoft and about. In part, heated discussions on the topic of "dozens of spyware" come from the release of the version of Windows 10 for preliminary user testing, which sent statistics to the developers, which was announced in the corresponding agreement.

As a result, a large number of tweakers appeared, changing system services responsible for collecting data. Let's take a look at how to change Windows 10 privacy settings using standard methods.

We click "Start" - "Options", after "Privacy". A section opens with the ability to change privacy settings.

Let's note two sections:

  • Speech, handwriting and text input - turn off the data collection produced by Cortana.
  • "Reviews and diagnostics" - changes the level of sending telemetry data to Microsoft from basic to full.

Synchronization settings

If you are using a Microsoft account, the "Synchronizing your settings" subsection, located in the "Accounts" section, will be able to block access to the following data on your primary PC:

  • Desktop theme;
  • Browser settings;
  • Saved passwords.

Synchronization can be disabled completely if desired.

System antivirus

Windows 10 finally has a built-in antivirus utility called Windows Defender, which is disabled when another compatible antivirus is installed. Its settings are located in Options - Update & Security.

Disable some of the items, respectively, reduce the amount of information sent to Microsoft.

SmartScreen

Windows SmartScreen utility is used to notify the user about the launch new program... Its principle of operation is to check files using the "cloud" system. The filter is controlled from the "Control Panel" - "Security and Maintenance".

How to get updates

Through which you can receive system updates, it also provides for outgoing traffic from your computer. If you do not want to distribute Tens updates to other users for security reasons, turn it off.

Windows 10 runs on over 400 million devices, but it still has all the privacy issues - including the mandatory diagnostic and data usage reports at Microsoft - and a plentiful amount of advertising permeates the platform.

Not all Windows 10 problems can be fixed, but there are some things you can do to restore your privacy. Here are five privacy-related settings you can change for a safer Windows 10 experience.

Use a local account.

When you turn off sync on your devices, you'll have a reason to use your Microsoft account to sign in to your computer. Instead, you can use a local account that does not require an email address, which prevents Microsoft from collecting information about you. With a local account, you create a username and password for your computer and that's it. (You still need a Microsoft account to buy apps from the Windows Store, though, and if you want to sync files with Microsoft services such as OneDrive, OneNote, and Office 365.)

To create a local account, go to Settings> Accounts> Your Details, click Sign in with a local account instead, and follow the instructions to create a username, password, and password hint.

Turn off your location.

If you are using mobile device like tablet or laptop, there are times when you have enabled Windows 10 and third-party applications access your location. But that doesn't mean you have to leave your location on all the time. When your location is turned on, Windows 10 keeps a 24-hour history of your devices' locations and allows geolocation-enabled apps to access that data.

If you turn off your location, and applications that use this data (for example, the Maps application) will not be able to find you. However, you can manually set a default location that applications can use as an alternative.

To turn off your location, open the Options> Privacy menu and go to the Location section. You can either turn off location services for all users (under "Locate this device> Change"), or you can turn off location services for your account (Location Services). You can also clear your location history from this menu, and allow some applications to see (or not see) your exact location. The apps in the list will get location information if they use historical data.

To quickly switch the location service, open the action center; There is a Location switch in quick settings (next to Do Not Disturb).


Stop syncing.

There are many things that sync in Windows 10. If you sign in with a Microsoft account, your settings, including passwords, can be synced across other devices that you sign in to the same account. Your notifications can also be synced across all devices.

If you turn sync off, your settings and passwords won't sync across other devices when you sign in with your Microsoft account (so you'll need to do things like manually entering passwords).

To turn off sync, open the Options menu and navigate to Accounts> Sync Your Settings. You can either turn off all sync settings at once, or switch individual sync options.


To turn off sync notifications, open Cortana (in Russia, Cortana does not work, so the following is not necessary for residents of the Russian Federation) and go to the "Settings> Sending notifications between devices" section. You can turn off this setting to turn off all sync notifications, and you can also click the Change sync settings button to control your various devices.

Disable information on the lock screen.

The lock screen is the first thing a user will see when they turn on their device, and this screen can display a lot of information that you probably don't want to show to strangers.

Here are three things to do to lock the lock and login screens.

Make sure your notifications are not showing on the lock screen. Open the Settings menu and select "System> Notifications & Actions" and disable "Show notifications on lock screen". The downside to disabling this feature is that you won't see any notifications until you unlock your device.


Disable Cortana on the lock screen (residents of the Russian Federation do not need this), open Cortana and go to Settings> Use Cortana even if my device is locked. The downside to disabling this feature is that you won't be able to use Cortana while your device is locked.


You can also restrict her presence on the lock screen (instead of turning it off altogether) by unchecking the box next to "Allow Cortana to access my calendar, email, messages, and Power BI when my device is locked." This way, you will still be able to ask Cortana questions that do not reveal any personal information while the device is locked.

To hide your address Email on the login screen, open the Options menu and go to Accounts> Login Options> Privacy. Turn off the toggle switch under "Show account information (such as email address) on login screen." There is almost no secret point in disabling this feature if you really enjoy seeing your email address on screen.

Turn off advertising ID.

Each Microsoft account has a unique advertising ID that allows Microsoft to collect information about you and deliver personalized ads across platforms. When you sign in to Windows 10 with your Microsoft account, these personalized ads will follow you to your computer, you'll see them in apps and possibly in operating system(for example, in the Start menu).

To remove these ads in Windows 10, open the Options menu and go to "Privacy> General> Let apps use my ad recipient ID (if you disable this setting, the ID will be reset)" and disable this feature. You will still see ads, however, they will not be personalized according to your tastes and preferences.


Disabling this feature will prevent personalized ads from popping up in Windows 10, but will not necessarily hide personalized ads from you when you use your Microsoft account on other platforms. To get rid of ads on other platforms, such as browsers, go to Microsoft's personalized ads page and turn off the Personalized ads in this browser toggle switch.

Hello everyone today I will tell you how to configure privacy windows 10 and disable spyware windows functions 10.Since the release new version OS from Microsoft, a lot of information appeared on the Internet that Windows 10 spies on its users, uses their personal data in an incomprehensible way and not only. The concern is understandable: People think that Windows 10 collects their personalized personal data, which is not entirely true. Just like your favorite browsers, sites, and the previous one Windows version, Microsoft collects anonymous data to improve OS, search, other system functions ... Well, and to show you ads.

If you are very concerned about the security of your confidential data and want to ensure that it is as safe as possible from Microsoft access, this guide provides a detailed description of the Windows 10 settings that allow you to maximally secure this data and prevent Windows 10 from spying on you.

You can configure the settings for transferring and storing personal data in Windows 10 already in the installed system, as well as at the stage of its installation. Below we will consider first the settings in the installation program, and then in the system already running on the computer.

Configuring personal information security when installing Windows 10

During Windows 10 setup, after copying files, rebooting for the first time, and entering or skipping your product key (and possibly connecting to the Internet), you will see the Speed ​​up your performance screen. If you click "Use standard settings", then the sending of many personal data will be enabled, but if at the bottom left click "Configure settings", then we can change some privacy settings.

Setting options takes two screens, the first of which has the option to turn off personalization, sending keyboard and voice input to Microsoft, and tracking location. If you need to completely disable the "spy" features of Windows 10, you can disable all items on this screen.

On the second screen, in order to avoid sending any personal data, I recommend disabling all functions (prediction of page load, automatic connection to networks, sending error information to Microsoft), except for "SmartScreen".

This is all privacy-related that can be configured when Windows installation 10. Additionally, you can choose not to connect a Microsoft account (since many of its parameters are synchronized with their server), but use a local account.

Configuring Windows 10 privacy settings after installation

In the Windows 10 settings, there is a whole "Privacy" section for configuring the appropriate settings. Press the Win + I keys on the keyboard (or click on the notification icon, and then - "All parameters"), then select the desired item.

In the privacy settings, there is a whole set of items, each of which we will consider in order.

  • Allow apps to use my ad recipient ID - turn off.
  • Enable SmartScreen Filter - enable.
  • Send my writing info to Microsoft - turn off.
  • Allow websites to provide local information by accessing my list of languages ​​- off.

In the "Location" section, you can turn off location detection for your computer as a whole (it is also disabled for all applications), as well as for each application that can use such data separately (later in this section).

Speech, handwriting and text input

In this section, you can turn off tracking of your typed characters, speech and handwriting input. If you see the “Meet Me” button in the “Meet Me” section, this means that these features have already been disabled.

If you see the "Stop Learning" button, then click it in order to turn off the storage of this personal information.

Camera, microphone, account information, contacts, calendar, radio, messaging and other devices

All of these sections allow you to toggle the Off position for applications to use the appropriate hardware and data for your system (safest option). They can also allow their use for certain applications and prohibit them for others.

Feedback and diagnostics

We put "Never" in the paragraph "Windows should ask for my feedback" and "Basic information" in the paragraph about sending data to Microsoft if you do not want to share information with it.

Background applications

Many Windows applications 10 keep running even when you are not using them and even if they are not in the Start menu. In the "Background applications" section, you can disable them, which will not only prevent the sending of any data, but also save the battery of your laptop or tablet.

Additional privacy and security settings

For greater security, there are also a few more steps to be taken. Return to the "All Settings" window and go to the "Network and Internet" section. In the Wi-Fi section, scroll down and tap Manage Settings Wi-Fi networks».

Disable the "Connect to suggested open hotspots" and "Connect to networks that my contacts have shared" items.

Windows 10 privacy settings-Disable windows 10-12 spy features

This article describes the available privacy options. Some privacy settings affect what information and files are downloaded from or sent to Microsoft. Other options help maintain privacy when sharing files. Some privacy options may not be available in certain Office applications.

    Select items File > Options.

    Please select Trust Center > Trust Center Settings > Privacy options.

    For a description of each setting for protecting confidential information, continue to the next section.

Description of each setting for protecting confidential information

Allow Office to connect to the Internet

Applies to Office programs 2013 .

If the checkbox Allow Office to connect to the Internet installed, when you have an Internet connection, Office can use online services and find new content on the Internet.

Connect to Office.com for updated content when you have an Internet connection

Applies to Office 2010 programs .

Check box Connect to Office.com for updated content when you have an Internet connection allows you to download the most up-to-date help content from Office.com. Your computer must be connected to the Internet to download Help. Not the entire Help system is loaded, only the Help article selected in the search results box.

Periodically download a file to help diagnose system problems

Check box Periodically download a file to help diagnose system problems allows you to use the following features.

    Office.com downloads a file that, if your computer is unstable or malfunctioning, automatically launches the Microsoft Office Diagnostics Center to help diagnose and fix problems with your computer.

    The Microsoft website may request error reporting for some types of error messages. The information contained in this report helps Microsoft understand and resolve the issue.

    The Microsoft website provides constantly updated context-sensitive help to help you troubleshoot problems with your computer.

For more information, see the article.

Participation in the software quality improvement program

Check box Register for the Quality Improvement Program software helps to improve quality, reliability and productivity Microsoft applications Office.

    No additional work is required to participate in the Customer Experience Improvement Program. You don't have to fill out forms, questionnaires or answer phone calls.

    Microsoft collects information from your computer automatically, including error messages and when they appeared; type of computer hardware; the presence of failures in the work of software products of Microsoft Corporation; information about the reliability and performance of hardware and software. Typically, this data is collected on a daily basis.

    All information is sent to Microsoft anonymously. This information is not used in any way for advertising or sales purposes.

Automatically detect installed Office apps to improve Office.com search results

Applies to Office 2010 applications.

Check box Automatically detects installed Office applications to improve search results on Office.com Helps you find results on Office.com for your installed Office applications.

Checking Microsoft Office documents taken from or linking to suspicious websites

Applies to the following Office 2010 applications: Access, Excel, InfoPath, OneNote, PowerPoint, Project, Publisher, Visio, Word, Excel Starter, and Word Starter.

Check box Checking Microsoft Office documents taken from or linking to suspicious websites includes fake website detection to help protect against phishing. If Office detects a link to a website with a fake domain name, it displays a security warning. Fake website detection is done locally on your computer. This does not send any information to Microsoft. For more information, see Turn on or turn off security alerts for links and files from suspicious websites.

Allow searching and installing new services in the "References" task pane

Check box Allow searching and installing new services in the "References" task pane Allows an Office application to automatically search for and install new Help Services.

Allow file uploads to improve the quality of file scanning

Check box Allow file uploads to improve the quality of file scanning Allows Microsoft to collect information about files that fail validation. By default, a dialog box prompts you from time to time to send files to Microsoft.

Allow ad personalization in Microsoft Office Starter

Applies to Excel Starter and Word Starter only.

Check box Allow ad personalization in Microsoft Office Starter Allows Microsoft to collect information about your use of online services and Microsoft and partner sites. This information helps you determine which advertisements may be of interest to you.

Warn before printing, saving or sending a file that contains recorded corrections or notes

Applies to Word and Word Starter applications only.

If you select Warn before printing, saving, and sending a file that contains recorded revisions or notes, a warning is displayed when you try to print, save, or send a file that contains tracked changes.

Store a random number to improve the precision of the join

Applies to Word only.

Check box Store a random number to improve the precision of the join increases the likelihood of getting the best results when you combine corrections made by multiple reviewers.

Show hidden markup when opening and saving

Applies to Word and Word Starter only.

Check box Show hidden markup when opening and saving allows you to see all the corrections that remain in it when you open and save a document. This feature allows you to remove any unnecessary revisions before submitting your document for re-review.

Remove personal information from file properties on save

Applies to the following Office applications: Excel, PowerPoint, Publisher, SharePoint Designer, Word, Excel Starter, and Word Starter.

Parameter Remove personal information from file properties on save disabled in Excel, PowerPoint, and Word, and enabled in Publisher and SharePoint Designer.

In applications that have this setting enabled, it is only available when working on a document created in an earlier version of Office, if the setting was used in the earlier version to delete personal information. To remove personal data from this document, click the button Document inspector.

Document inspector

To remove personal information and other hidden information from files created in Excel, PowerPoint, and Word, click Document inspector... For more information about the Document Inspector, see Remove Hidden and Personal Data by Inspecting Documents, Presentations, and Books.

Note: This page has been automatically translated and may contain inaccuracies and grammatical errors. It is important for us that this article is useful to you. Was the information helpful? For convenience also (in English).