Does anyone know how to block Windows 10 update-delivery-optimization (built-in feature for getting Windows Updates through P2P) using mikrotik firewall rules? Please see http://windows.microsoft.com/en-gb/wind ... zation-faq for details.
No, it will kill my bandwidth. Default setting in non-VL editions of Windows 10 is to upload to other users on the internet.but why? it will save your bandwidth
This could be very hard, because you have to be lucky to catch the moment when it is uploading to some other client. I cannot find any information about protocols and ports used anywhere.You will have to sniff the traffic to see what protocol is used.
Yes it could be trojan, but in this case is not. After turning off updates in windows 10, upload was almost zero. What I want to say it is problem and people complains to ISP, because if you saturate upload..openning web pages is very slow....and also windows distribute using p2p updates on your network but before that it analyzes structure of your network and sens it to central MS servers....and this could be used in future to distribute various attacks in case of windows security problems....and MAN OF COURSE IT IS NOT!!! OFF TOPIC... This could be disaster in future for ISPs and security problems....Of course the fact that a client uses full upload on their connection does not necessarily mean it is due to this feature.
It can also mean their PC has been hacked (trojan software installed) and is being used in DDoS attacks etc.
Reading the FAQ document above it is easy to turn this feature off, so when a client complains try to (have them) do that
and see if there is an improvement. When not, it has to have some other cause.
(of course it is worrying that a company like Microsoft does things like this, also including download of Windows 10
over connections in which they have no insight w.r.t. bandwidth and bottlenecks, but that is not on-topic here)
Is any way to find out what is microsoft gathering about users and transfers?Microsoft makes use of own protocol named BITS, that is based on HTTP. The whole traffic is encrypted (SSL/TLS) and used ports vary a lot.
Summary: it works like torrent and thus is impossible to be detected by firewall and blocked/limited.
Maybe it would be a good idea to have a separate section of the forum or a pointer to a different forum for "future ISP problems",MAN OF COURSE IT IS NOT!!! OFF TOPIC... This could be disaster in future for ISPs and security problems....
That may not be as easy as you hope. I don't expect the traffic to be easily identifiable and easy to isolate or limit.So question is how to limit it. Because by default it is enabled in almost all windows 10 users installations...
/ip firewall layer7-protocol add name=WinUpl7 regexp="^.*(get|GET).+(windowsupdate.microsoft.com|update.microsoft.com|download.microsoft.com|windowsupdate.com).*\$"
/ip firewall filter add action=add-dst-to-address-list address-list=Winupdate \
address-list-timeout=0s chain=forward dst-address-list=!Winupdate \
dst-port=80 layer7-protocol=WinUpl7 out-interface=ether1 protocol=tcp