【稳定有效】Windows 10 家庭版屏蔽系统更新的实用方法(半自动但超稳定)

20201113更新:近期发现采用修改系统时间方法可以将暂停更新时间大幅度延长,操作步骤相比下文方法更加简便稳定。建议有相关需求的朋友都采用这个方法。

参见:教你一招,把 Win10 更新暂停到 N 年后的神奇方法

警告:建议把系统时间延后3-5年即可,系统时间改到2038年后可能出现一系列不可控问题,不要自找麻烦。


  • 众所周知,win10取消了个人用户(家庭版/教育版/...)关闭系统更新的权限,安装运行上述Win10版本的计算机会定期强制收到系统更新推送。如果说后台安装更新仅仅是拖累了性能,那么弹出重启提示时操作不当就可能引发了一系列“正版软件受害者”的人间惨剧了;更甚者在于随着MS内部日益陷入咖喱化管理,各种暴雷bug也是让实时更新的windows用户叫苦不迭。
  • 所谓“道高一尺,魔高一丈”,伴随着MS强推系统更新进程的开始,用于屏蔽更新推送的工具方法就层出不穷,然而各种方法或多或少存在局限,不是仅适用于少数特定系统版本,就是操作繁琐还需定期手动操作,亦或是需要长驻后台存在安全风险...可以说目前声称能够屏蔽更新的第三方工具仍处于哪堪大用的状态,不时失灵的功能很难让人安心稳定地使用。这个时候不得不说,只有魔法才能打败魔法。
  • 以上为背景,笔者这波分享一下自己琢磨出来的win10更新屏蔽方法,参考了目前主流的几种屏蔽方法,利用了windows自身的部分机制。虽然没实现全自动的屏蔽,但是每月只需操作一次即可换来长期有效的清净系统也算值回票价了。
  • (注:本文全程在Windows 10 1903版本下操作,大版本差异可能导致操作细节不同,请酌情参考)

1. 第一步:切断计算机的网络连接

由于上网环境各不相同,大家各自选择适合自己的断网方法即可。

2. 第二步:打开Windows 设置,点选“更新和安全”

3. 第三步: 在Windows更新中选取继续更新(这一步如果检测出有待安装系统更新,就姑且先安装了再进行操作),由于计算机处于脱机状态,因此绝大多数情况下都会提示“遇到错误”(见下图),此时可以不用理会。

4. 第四步:光标下移,点选“高级选项”。首先,将上方的“更新通知”关闭;接着在“暂停更新”的下拉菜单中选取距今最远的日期。


  • 事实上,完成以上四个步骤后,只需每月定期重复操作,从而无限延长暂停更新期限,即可屏蔽绝大多数“月度累积更新”了。但是对于少数MS定义的“安全更新”或“重大更新”而言,这一方法还是会产生漏网之鱼;原因在于即使设置了暂停更新的期限,MS仍然会在计算机正常联网使用期间静默发送上述特殊更新的推送,等到下次点选“第三步”中“继续更新”按钮时,给用户一个BIG SURPRISE。(手动捂脸)
  • 基于MS上述的神奇操作,还需要进行额外的系统设置,见下文。

5. 第五步:在“系统服务”中禁用“Windows Update”和“Windows Upda Medic Service”

  • 这是两个与系统更新有关的服务,前者用于监听系统更新推送,印象中历代WIndows中一直有他的身影。而后者则为MS为想要屏蔽系统更新的个人用户准备的“大礼”,顾名思义,这个服务用于对“Windows Update”进行“治疗”。当你在“服务”中禁用了“Windows Update”,后者会在某个神秘节点把它重新启动。
  • 后者的神奇之处更加在于:首先,在"系统服务"中用户无法直接禁用“Windows Upda Medic Service”;其次,即使通过修改注册表方法将“Windows Upda Medic Service”禁用,在某个节点后它还会自动”复活“。
  • 因此事实上,在“系统服务”中禁用“Windows Update”和“Windows Upda Medic Service”本质是个伪命题,我们需要通过修改注册表以实现目的。

6. 第六步,生成禁用系统更新相关服务的.reg文件。

  • .reg文件专用于Windows注册表的修改,部分“电脑管家”可能会报毒报错,但是无需理会,下面放出禁用“Windows Update”和“Windows Upda Medic Service”的注册表参数。新建空白记事本文件,将下方代码粘贴放入,并将后缀“.txt”改为“.reg”即可。
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc]
"DependOnService"=hex(7):72,00,70,00,63,00,73,00,73,00,00,00,00,00
"Description"="@WaaSMedicSvc.dll,-101"
"DisplayName"="@WaaSMedicSvc.dll,-100"
"ErrorControl"=dword:00000001
"FailureActions"=hex:84,03,00,00,00,00,00,00,00,00,00,00,03,00,00,00,14,00,00,\
  00,00,00,00,00,c0,d4,01,00,00,00,00,00,e0,93,04,00,00,00,00,00,00,00,00,00
"ImagePath"=hex(2):25,00,73,00,79,00,73,00,74,00,65,00,6d,00,72,00,6f,00,6f,00,\
  74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
  00,76,00,63,00,68,00,6f,00,73,00,74,00,2e,00,65,00,78,00,65,00,20,00,2d,00,\
  6b,00,20,00,77,00,75,00,73,00,76,00,63,00,73,00,20,00,2d,00,70,00,00,00
"LaunchProtected"=dword:00000002
"ObjectName"="LocalSystem"
"RequiredPrivileges"=hex(7):53,00,65,00,54,00,63,00,62,00,50,00,72,00,69,00,76,\
  00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,43,00,68,00,61,00,6e,00,\
  67,00,65,00,4e,00,6f,00,74,00,69,00,66,00,79,00,50,00,72,00,69,00,76,00,69,\
  00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,49,00,6d,00,70,00,65,00,72,00,\
  73,00,6f,00,6e,00,61,00,74,00,65,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,\
  00,67,00,65,00,00,00,53,00,65,00,54,00,61,00,6b,00,65,00,4f,00,77,00,6e,00,\
  65,00,72,00,73,00,68,00,69,00,70,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,\
  00,67,00,65,00,00,00,53,00,65,00,53,00,65,00,63,00,75,00,72,00,69,00,74,00,\
  79,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,\
  00,52,00,65,00,73,00,74,00,6f,00,72,00,65,00,50,00,72,00,69,00,76,00,69,00,\
  6c,00,65,00,67,00,65,00,00,00,00,00
"ServiceSidType"=dword:00000001
"Start"=dword:00000004
"Type"=dword:00000020

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc\Parameters]
"ServiceDll"=hex(2):25,00,73,00,79,00,73,00,74,00,65,00,6d,00,72,00,6f,00,6f,\
  00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,\
  57,00,61,00,61,00,73,00,4d,00,65,00,64,00,69,00,63,00,53,00,76,00,63,00,2e,\
  00,64,00,6c,00,6c,00,00,00
"ServiceDllUnloadOnStop"=dword:00000001
"ServiceMain"="ServiceMain"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc\Security]
"Security"=hex:01,00,14,80,78,00,00,00,84,00,00,00,14,00,00,00,30,00,00,00,02,\
  00,1c,00,01,00,00,00,02,80,14,00,ff,00,0f,00,01,01,00,00,00,00,00,01,00,00,\
  00,00,02,00,48,00,03,00,00,00,00,00,14,00,9d,00,02,00,01,01,00,00,00,00,00,\
  05,0b,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
  20,02,00,00,00,00,14,00,ff,01,0f,00,01,01,00,00,00,00,00,05,12,00,00,00,01,\
  01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv]
"DependOnService"=hex(7):72,00,70,00,63,00,73,00,73,00,00,00,00,00
"Description"="@%systemroot%\\system32\\wuaueng.dll,-106"
"DisplayName"="Windows Update"
"ErrorControl"=dword:00000001
"FailureActions"=hex:00,5c,26,05,00,00,00,00,00,00,00,00,03,00,00,00,14,00,00,\
  00,00,00,00,00,60,ea,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00
"ImagePath"=hex(2):25,00,73,00,79,00,73,00,74,00,65,00,6d,00,72,00,6f,00,6f,00,\
  74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
  00,76,00,63,00,68,00,6f,00,73,00,74,00,2e,00,65,00,78,00,65,00,20,00,2d,00,\
  6b,00,20,00,6e,00,65,00,74,00,73,00,76,00,63,00,73,00,20,00,2d,00,70,00,00,\
  00
"ObjectName"="LocalSystem"
"RequiredPrivileges"=hex(7):53,00,65,00,41,00,75,00,64,00,69,00,74,00,50,00,72,\
  00,69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,43,00,72,00,\
  65,00,61,00,74,00,65,00,47,00,6c,00,6f,00,62,00,61,00,6c,00,50,00,72,00,69,\
  00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,43,00,72,00,65,00,\
  61,00,74,00,65,00,50,00,61,00,67,00,65,00,46,00,69,00,6c,00,65,00,50,00,72,\
  00,69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,54,00,63,00,\
  62,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,\
  00,41,00,73,00,73,00,69,00,67,00,6e,00,50,00,72,00,69,00,6d,00,61,00,72,00,\
  79,00,54,00,6f,00,6b,00,65,00,6e,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,\
  00,67,00,65,00,00,00,53,00,65,00,49,00,6d,00,70,00,65,00,72,00,73,00,6f,00,\
  6e,00,61,00,74,00,65,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,00,67,00,65,\
  00,00,00,53,00,65,00,49,00,6e,00,63,00,72,00,65,00,61,00,73,00,65,00,51,00,\
  75,00,6f,00,74,00,61,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,00,67,00,65,\
  00,00,00,53,00,65,00,53,00,68,00,75,00,74,00,64,00,6f,00,77,00,6e,00,50,00,\
  72,00,69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,44,00,65,\
  00,62,00,75,00,67,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,00,67,00,65,00,\
  00,00,53,00,65,00,42,00,61,00,63,00,6b,00,75,00,70,00,50,00,72,00,69,00,76,\
  00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,52,00,65,00,73,00,74,00,\
  6f,00,72,00,65,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,\
  00,53,00,65,00,53,00,65,00,63,00,75,00,72,00,69,00,74,00,79,00,50,00,72,00,\
  69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,54,00,61,00,6b,\
  00,65,00,4f,00,77,00,6e,00,65,00,72,00,73,00,68,00,69,00,70,00,50,00,72,00,\
  69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,4c,00,6f,00,61,\
  00,64,00,44,00,72,00,69,00,76,00,65,00,72,00,50,00,72,00,69,00,76,00,69,00,\
  6c,00,65,00,67,00,65,00,00,00,53,00,65,00,4d,00,61,00,6e,00,61,00,67,00,65,\
  00,56,00,6f,00,6c,00,75,00,6d,00,65,00,50,00,72,00,69,00,76,00,69,00,6c,00,\
  65,00,67,00,65,00,00,00,53,00,65,00,53,00,79,00,73,00,74,00,65,00,6d,00,45,\
  00,6e,00,76,00,69,00,72,00,6f,00,6e,00,6d,00,65,00,6e,00,74,00,50,00,72,00,\
  69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,53,00,65,00,43,00,72,00,65,\
  00,61,00,74,00,65,00,53,00,79,00,6d,00,62,00,6f,00,6c,00,69,00,63,00,4c,00,\
  69,00,6e,00,6b,00,50,00,72,00,69,00,76,00,69,00,6c,00,65,00,67,00,65,00,00,\
  00,53,00,65,00,49,00,6e,00,63,00,72,00,65,00,61,00,73,00,65,00,42,00,61,00,\
  73,00,65,00,50,00,72,00,69,00,6f,00,72,00,69,00,74,00,79,00,50,00,72,00,69,\
  00,76,00,69,00,6c,00,65,00,67,00,65,00,00,00,00,00
"ServiceSidType"=dword:00000001
"Start"=dword:00000004
"SvcMemHardLimitInMB"=dword:000000f6
"SvcMemMidLimitInMB"=dword:000000a7
"SvcMemSoftLimitInMB"=dword:00000058
"Type"=dword:00000020

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Parameters]
"ServiceDll"=hex(2):25,00,73,00,79,00,73,00,74,00,65,00,6d,00,72,00,6f,00,6f,\
  00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,\
  77,00,75,00,61,00,75,00,65,00,6e,00,67,00,2e,00,64,00,6c,00,6c,00,00,00
"ServiceDllUnloadOnStop"=dword:00000001
"ServiceMain"="WUServiceMain"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\Security]
"Security"=hex:01,00,14,80,78,00,00,00,84,00,00,00,14,00,00,00,30,00,00,00,02,\
  00,1c,00,01,00,00,00,02,80,14,00,ff,00,0f,00,01,01,00,00,00,00,00,01,00,00,\
  00,00,02,00,48,00,03,00,00,00,00,00,14,00,9d,00,02,00,01,01,00,00,00,00,00,\
  05,0b,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
  20,02,00,00,00,00,14,00,ff,01,0f,00,01,01,00,00,00,00,00,05,12,00,00,00,01,\
  01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\TriggerInfo]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\TriggerInfo\0]
"Type"=dword:00000005
"Action"=dword:00000001
"Guid"=hex:e6,ca,9f,65,db,5b,a9,4d,b1,ff,ca,2a,17,8d,46,e0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv\TriggerInfo\1]
"Type"=dword:00000005
"Action"=dword:00000001
"Guid"=hex:c8,46,fb,54,89,f0,4c,46,b1,fd,59,d1,b6,2c,3b,50

7. 第七步,将.reg文件放入系统启动目录。

  • 系统启动目录用于实现以下目的:每次开机时,Windows都会在启动后运行该目录下的全部文件。其在Win10中的所在位置如下图所示(C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp)。将上一步骤中生成的.reg文件拷贝放入该目录即可。(可能会提示需要管理员权限,给予即可)

8. 总结

  • 通过完成以上步骤,每次开机时都会通过执行注册表文件以禁用“Windows Update”和“Windows Upda Medic Service”,此时系统将不会在后台状态下静默接受任何更新推送。
  • 我们需要做的就是定期重复执行前四个步骤的操作,每次可将暂停Windows更新的期限延长35天,以实现屏蔽系统更新的目的。
  • 补充:笔者并非鼓励各位一定要屏蔽系统更新,事实上定期接收系统更新尤其是安全更新对于我们的计算机长期稳定使用是有益。但是MS的神奇操作将原本可以视为福利的更新服务变成了负担,反而一再招致不必要的麻烦;基于这一背景,笔者将“与微软斗智斗勇”的一系列心得进行归纳总结,为哪些想要摆脱系统更新推送骚扰的小伙伴们提供一种可行的参考方法。

猜你喜欢

转载自blog.csdn.net/u010785550/article/details/108657580