I am a hardware developer who, alongside hardware development, is also interested in cybersecurity and automation.
Download!
Automation!
- Decide whether to ignore Windows security features, such as TPM and Secure Boot. The Secure Boot feature ensures that if any core Windows files are tampered with during the boot process, the issue is detected and their execution is prevented. This feature also helps protect the system from installing malicious updates on Windows. Enabling the option to bypass these features is sometimes unavoidable on certain computers, especially older models. However, it is generally recommended to keep features like Secure Boot enabled.
- Ignore the requirement for an internet connection to complete the process. This is useful in situations where a wired LAN connection is not available, because in most cases, the wireless card is not yet recognized during Windows installation, and internet access via cable is required. Activating this option resolves issues related to this step.
Account seetings
- We can define a name and password for the admin account. It is also possible to create multiple user or admin accounts.
- Here, we specify which account to log into the first time after Windows installation. The different options for this section are shown in the image.
- If you don’t want any accounts to be created, clean all accounts, and select this option. In this case, after Windows installation, you will automatically be logged into the Windows Administrator account.
Security settings
- Windows Defender can be enabled or disabled. This feature acts like security software in Windows and helps prevent the execution of malicious files, certain network attacks, and more.
- Automatic Windows updates can be disabled. This is one of the common challenges faced by Windows users!
- This section allows enabling or disabling UAC (User Account Control). This feature prevents suspicious applications from running with elevated permissions for reading and writing.
- This feature is used by Windows to detect potentially harmful software.
- Enable or disable support for long paths in Windows applications, such as PowerShell and others.
- Enable or disable Remote Desktop for accessing the system remotely.
- Desktop icons are listed, which can be added or removed as needed.
- Start menu icons are listed, which can also be added or removed based on requirements.
- This section allows configuring whether virtualization-related tools are installed or not. This option is specific to Windows 11 and does not apply to Windows 10.
Default software enable/disable
ISO editing
Author
This tutorial has been written by Zeraatchi
You can say thanks by tipping the professor.
Credits
This tutorial has been proofread by zeraatchi
Even if this content is in its original language, human review is necessary to ensure its accuracy.
zeraatchi1 117 sats559 satsEvery content on the platform is the result of a collaborative effort: each lesson, translation, and revision is made possible by the work of contributors. For this reason, we are always looking for proofreaders who can review our content in many languages. If you want to participate in the proofreading process, please reach out in our Telegram group and read our tutorial. We remind you that this content is open-source - licensed under CC BY-SA - so it can be freely shared and used, as long as the original source is credited.

