-
Notifications
You must be signed in to change notification settings - Fork 103
Create Bootable USB flash drive with no 3rd party tools
-
Plug in a USB flash drive that has at least 8GB capacity.
-
Delete all partitions on the USB flash drive either using Disk Management ¹ ² or using Windows Settings => System => Storage => Advanced Storage Settings => Disks & Volumes
-
Using either of the methods above, create a 1GB
FAT32
partition, let's name itBOOT
🟨 -
Create a 2nd partition on the USB flash drive with the rest of the remaining unused space, formatted as
NTFS
, let's name this oneDATA
🟩 -
Mount your Windows ISO file by double clicking on it.
-
Select all and Copy everything from Windows ISO file to the
NTFS
partition (DATA partition🟩) -
Copy everything from Windows ISO file, except for the "sources" folder, to the
FAT32
partition (BOOT partition🟨) -
Create a new folder in the
FAT32
partition (BOOT partition🟨), and name itsources
-
copy the
boot.wim
from the "sources" folder inside the Windows ISO file to the newly created "sources" folder in the FAT32 partition (BOOT partition🟨). -
That's it, your USB flash drive is ready and bootable.
-
New-WDACConfig
-
New-SupplementalWDACConfig
-
Remove-WDACConfig
-
Edit-WDACConfig
-
Edit-SignedWDACConfig
-
Deploy-SignedWDACConfig
-
Confirm-WDACConfig
-
New-DenyWDACConfig
-
Set-CommonWDACConfig
-
New-KernelModeWDACConfig
-
Get-CommonWDACConfig
-
Invoke-WDACSimulation
-
Remove-CommonWDACConfig
-
Assert-WDACConfigIntegrity
-
Build-WDACCertificate
-
Test-CiPolicy
-
Get-CiFileHashes
-
ConvertTo-WDACPolicy
-
Set-CiRuleOptions
-
Get-CIPolicySetting
-
Introduction
-
WDAC for Lightly Managed Devices
-
WDAC for Fully managed device - Variant 1
-
WDAC for Fully managed device - Variant 2
-
WDAC for Fully managed device - Variant 3
-
WDAC for Fully managed device - Variant 4
-
WDAC Notes
-
How to Create and Deploy a Signed WDAC Policy
-
Fast and Automatic Microsoft Recommended Driver Block Rules updates
-
WDAC policy for BYOVD Kernel mode only protection
-
EKUs in WDAC, App Control for Business, Policies
-
WDAC Rule Levels Comparison and Guide
-
Script Enforcement and PowerShell Constrained Language
-
How to Use Microsoft Defender for Endpoint Advanced Hunting With WDAC App Control
-
Application Control (WDAC) Frequently Asked Questions (FAQs)
-
Create Bootable USB flash drive with no 3rd party tools
-
Event Viewer
-
Group Policy
-
How to compact your OS and free up extra space
-
Hyper V
-
Overrides for Microsoft Security Baseline
-
Git GitHub Desktop and Mandatory ASLR
-
Signed and Verified commits with GitHub desktop
-
About TLS, DNS, Encryption and OPSEC concepts
-
Things to do when clean installing Windows
-
Comparison of security benchmarks
-
BitLocker, TPM and Pluton | What Are They and How Do They Work
-
How to Detect Changes in User and Local Machine Certificate Stores in Real Time Using PowerShell
-
Cloning Personal and Enterprise Repositories Using GitHub Desktop
-
Device Guard and Virtualization Based Security in Windows
-
Only a Small Portion of The Windows OS Security Apparatus
-
Clean Source principle, Azure and Privileged Access Workstations
-
How to Securely Connect to Azure VMs and Use RDP
-
Basic PowerShell tricks and notes
-
Basic PowerShell tricks and notes Part 2
-
Basic PowerShell tricks and notes Part 3
-
Basic PowerShell tricks and notes Part 4
-
How To Access All Stream Outputs From Thread Jobs In PowerShell In Real Time
-
PowerShell Best Practices To Follow When Coding
-
How To Asynchronously Access All Stream Outputs From Background Jobs In PowerShell
-
Powershell Dynamic Parameters and How to Add Them to the Get‐Help Syntax
-
RunSpaces In PowerShell