Forum Discussion
bypassnro Removal
- We’re removing the bypassnro.cmd script from the build to enhance security and user experience of Windows 11. This change ensures that all users exit setup with internet connectivity and a Microsoft Account.
What is Microsoft's end game here? This is very unpopular.
- https://www.reddit.com/r/sysadmin/comments/1jmgkfk/microsoft_is_removing_the_bypassnro_command_from/
- https://www.reddit.com/r/Windows11/comments/1jm13la/no_more_bypassnro_microsoft_account_a_must/
- https://www.reddit.com/r/iiiiiiitttttttttttt/comments/1jmkmyr/i_have_thoughts_about_this_but_its_not_worth/
- https://www.reddit.com/r/assholedesign/comments/1jmfas5/microsoft_removes_bypassnro_script_in_a_new/
What isn't clear from this is whether the registry key itself will continue to work and process like we are used to. The least Microsoft could do is clarify if the script is going away or if the code and registry processing of the value/data is going away.
Or maybe asked a different way - what happens when we get an in-place upgrade from 24H2 (where bypassnro is functional) to a newer version of Win11? Is Microsoft going to pull out the rug and force local users to convert to Microsoft accounts?
If you go through with making a local account easier to use, I am going to be asking Microsoft for a refund. In fact, I already have reached out to support to complain and ask questions about this direction and these are some of the responses I got back from them:
Please allow me to inform you that, on your device as you have purchased key for Windows, you can use local account on device , it is as per your choice whether you want to use Microsoft account for using device or local account.
Yes, forever you can use local account on device it is not required to use Microsoft account.
Yes, you can use a local account on Windows 11 instead of a Microsoft account. However, there are some limitations to consider:
Setup Requirements: During the initial setup of Windows 11, especially on Home editions, a Microsoft account is typically required. You can bypass this by disconnecting from the internet during setup or using specific methods to create a local account2.
Features: A local account allows you to sign in offline, but you won't have access to features like syncing settings, OneDrive integration, or accessing certain apps that require a Microsoft account.
Switching: If you're already using a Microsoft account, you can switch to a local account through the settings menu.
Would you like guidance on creating or switching to a local account?
Yes, it is applicable till you are using Windows 11 on device, it will not create any issues except some features, that will also get fixed. if currently you are facing issue then we do have our Windows technical team they will help you out in sign in by local account and using local account on device.
As long as Windows 11 remains under mainstream and extended support, using a local account should continue to be an option for your device. While Microsoft generally ensures compatibility with local accounts, some updates may introduce additional features or services that are accessible only through a Microsoft account. However, this doesn’t typically restrict the ability to use a local account for basic device functionality.
5 Replies
- KBConspiracyCopper Contributor
Clear attempt to manipulate market share and foie gras their agenda down users throats. I'd love to say that I'm surprised a company like Microsoft could do something so evil, but actually they've been deliberately ruining their user experience for years. This BS is nothing new.
"User experience" is just a Microsoft synonym for "forced agenda". Why else would anyone have Co-Pilot or Edge browser on their OS? Don't get me started on xbox/game bar on their work PC's.
- JourneymanMCIron Contributor
The Windows 11 Insider Preview Build 26200.5516 release notes reads "We're removing the bypassnro.cmd script from the build to enhance security and user experience of Windows 11".Given the many users who experience scores of unauthorized login-attempts and eventually losing their account to hackers, https://answers.microsoft.com/en-us/outlook_com/forum/all/why-do-i-have-so-man-unsuccessful-sign-in-attempts/fe4d3329-068f-40ce-8830-9bd9f118a0af,
it probably should have read "We're removing the bypassnro.cmd script from the build because we're tired of people trying to prevent us from data mining their accounts".
Great work Microsoft!
- MousefluffIron Contributor
JourneymanMC wrote:
the many users who experience scores of unauthorized login-attempts and eventually losing their account to hackers
If you're wondering what happens to your attackers, people who actually do this get an IP ban, regardless of whether or not Microsoft allows you to skip the OOBE using a registry key. If you use a NIST-Approved Cryptographically Secure Random Number Generator, and the full range of printable Unicode ( UTF8 / UTF16 ) Characters, generating a character array with 16 values, each value not being a duplicate of another reference type in that array, along with two factor authentication, then you should have no issues with crude dictionary-based attacks that utilize a brute force method of repeated logins. I also use Transparent SME ( AMD version of Intel's TME / "Total Memory Encryption" ), and a password manager that encrypts the values in memory, as a byte array, to achieve FIPS-140 compliance, for my own personal benefit. It is true that it is faster to use an encrypted byte array using the index to represent each Unicode character, as character types are reference types, not value types, so when it comes time to update a form control, display the values on a console, or save them to a file, it is a one step process to convert them, so you don't have to recast reference types every single time something changes ( for this reason it is smarter to use C#, C++, GOLANG, etc, and not RUST. ) I also use SysInternal's Secure Delete to erase my browsing history or leftover files, while zeroing the drive itself every once in awhile, even if it seems like it would have a trivial impact on the outcome, due to the fact that the MFT records are difficult to recover even using the Windows File Recovery Tool.
- JourneymanMCIron Contributor
What a load of cr*p, time and time again I read peoples helpless vailing that their MS-account have been hacked, blocked or meddled with. It is every day, all day, again and again listed on Microsoft Community Support.
And none of the cr*p you've listed can be set up by the average Windows users.
- MousefluffIron Contributor
Enterprise grade Windows isn't going away any time soon. I wouldn't panic over this one, given that most use the https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/boot-windows-to-audit-mode-or-oobe?view=windows-11#boot-manually-into-audit-mode-on-a-new-or-existing-installation that Microsoft provides, which https://learn.microsoft.com/en-us/windows/configuration/wcd/wcd-oobe and being able to https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/automate-oobe is not going away any time soon., though neither is being able to sideload apps ( though that's less common. ) On the release channel, it's not possible to download app updates using the Microsoft Store / WinGet / OneGet on 24H2, until you log with your Microsoft Account for the first time, at least with that one machine ID and product key, which is tied to your motherboard if it's not a retail key. WinGet would be non functional anyways, if you didn't want to login. So that means nothing would work, given WinGet is used in the background for nearly everything. That one batch file they talk about removing also doesn't utilize some of the other registry strings from the https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/customize-oobe guides, which are necessary.