it seems all those billions poured into telemetry and machine learning by microsoft, google and av vendors are only used to "classify" user's private data,
none trickled down into av heuristics so av's today are dumber than a rock, not discerning actually malicious stuff, even below the 90's era signature level.
in the case of microsoft there's also a strong fake positive bias!
script restructured around cmd, and a bit more verbose and spaced out, but the gist of it is the same: IFEO intercept and add /Product Server option
notable change is that it now exclusively focuses setup via Windows Update
you're gonna have to bypass manual 11 setup some other way - hint: cd.>sources\appraiserres.dll
all issues ironed out
upgrade keeping files from Eval editions
earlier detect of setup ui exit
enhanced 11 AutoUnattend.xml
move bypass stuff from main readme
last squash I promise ;)
fix regression with 1507-1709 not getting the correct fallback esd
more descriptive label for 1507-1709 that have per-edition esd
fix dev -noe being present and halting script instead of auto close
v6 release had bad regex that did not replace launch options correctly - it should now finally work for everybody!
a great help was @sam20112011 providing requested `C:\$WINDOWS.~BT\Sources\Panther` logs in #57
For a more reliable and future-proof experience,
clean installation is still handled via winsetup.dll patching in boot.wim
upgrade is now handled only via auto.cmd with the /Product Server trick
Just ignore the Installing Windows Server label, please!
update Skip_TPM_Check_on_Dynamic_Update.cmd v6
update readme