
关于autounattend.xml回应文件的用途,笔者之前曾经介绍过,只要把回应文件放入Windows媒体创建工具或Rufus制作的Windows 11系统安装碟中,即可避开Windows 11的硬件与微软帐号登录限制。 由于24H2有放宽对BitLocker的开启要求,为了让不想开启的人省略关闭步骤,笔者更新了回应文件内容,方便大家使用。
autounattend.xml 回应文件使用教程
按此下载笔者制作好的回应文件,解压缩后把 xml 文件放入 Windows 11 系统安装碟内即可,就是这么简单! 假如你使用 Ventoy 之类的 ISO 模拟挂载开机工具,需要自行把响应文件包入 ISO 内 。
以下为响应文件内容:
<?xml version=“1.0” encoding=“utf-8”?>
<unattend xmlns=“urn:schemas-microsoft-com:unattend”>
<settings pass=“windowsPE”>
<component name=”Microsoft-Windows-Setup” processorArchitecture=”amd64″ publicKeyToken=”31bf3856ad364e35″ language=”neutral” versionScope=”NonSxS” xmlns: wcm=“http://schemas.microsoft.com/WMIConfig/2002/State” xmlns:xsi=“http://www.w3.org/2001/XMLSchema-instance”>
<UserData>
<AcceptEula>true</AcceptEula>
<ProductKey>
<Key />
<WillShowUI>OnError</WillShowUI>
</ProductKey>
</UserData>
<RunSynchronous>
<RunSynchronousCommand wcm:action=“add”>
<Order>1</Order>
<Path>reg add HKLMSystemSetupLabConfig /v BypassTPMCheck /t reg_dword /d 0x00000001 /f</Path>
</RunSynchronousCommand>
<RunSynchronousCommand wcm:action=“add”>
<Order>2</Order>
<Path>reg add HKLMSystemSetupLabConfig /v BypassSecureBootCheck /t reg_dword /d 0x00000001 /f</Path>
</RunSynchronousCommand>
<RunSynchronousCommand wcm:action=“add”>
<Order>3</Order>
<Path>reg add HKLMSystemSetupLabConfig /v BypassRAMCheck /t reg_dword /d 0x00000001 /f</Path>
</RunSynchronousCommand>
<RunSynchronousCommand wcm:action=“add”>
<Order>4</Order>
<Path>reg add HKLMSystemSetupLabConfig /v BypassCPUCheck /t reg_dword /d 0x00000001 /f</Path>
</RunSynchronousCommand>
<RunSynchronousCommand wcm:action=“add”>
<Order>5</Order>
<Path>reg add HKLMSystemSetupLabConfig /v BypassStorageCheck /t reg_dword /d 0x00000001 /f</Path>
</RunSynchronousCommand>
</ RunSynchronous>
</component>
</settings>
<settings pass=“oobeSystem”>
<component name=”Microsoft-Windows-SecureStartup-FilterDriver” processorArchitecture=”amd64″ language=”neutral” xmlns:wcm=” http://schemas.microsoft.com/WMIConfig/2002/State” xmlns:xsi=”http://www.w3.org/2001/XMLSchema-instance” publicKeyToken=”31bf3856ad364e35″ versionScope=”nonSxS”>
<PreventDeviceEncryption>true</PreventDeviceEncryption>
</component>
<component name=”Microsoft-Windows-EnhancedStorage-Adm” processorArchitecture=”amd64″ language=”neutral” xmlns:wcm=”http://schemas.microsoft.com/WMIConfig/2002/State” xmlns:xsi=“http://www.w3.org/2001/XMLSchema-instance” publicKeyToken=“31bf3856ad364e35” versionScope=“nonSxS”>
<TCGSecurityActivationDisabled>1</ TCGSecurityActivationDisabled>
</component>
<component name=”Microsoft-Windows-Deployment” processorArchitecture=”amd64″ publicKeyToken=”31bf3856ad364e35″ language=”neutral” versionScope=”nonSxS” xmlns: wcm=“http://schemas.microsoft.com/WMIConfig/2002/State” xmlns:xsi=“http://www.w3.org/2001/XMLSchema-instance”>
<Reseal>
<Mode> OOBE</Mode>
</Reseal>
</component>
< component name=”Microsoft-Windows-Shell-Setup” processorArchitecture=”amd64″ publicKeyToken=”31bf3856ad364e35″ language=”neutral” versionScope=”nonSxS” xmlns: wcm=“http://schemas.microsoft.com/WMIConfig/2002/State” xmlns:xsi=“http://www.w3.org/2001/XMLSchema-instance”>
<OOBE>
< ProtectYourPC>3</ProtectYourPC>
<HideOnlineAccountScreens>true</HideOnlineAccountScreens>
<HideWirelessSetupInOOBE> true</HideWirelessSetupInOOBE>
</OOBE>
</component>
</settings>
</unattend>