Tiny11 25H2 Debloated Windows 11 Builder: Smaller ISO and No Copilot

  • Thread Author
Tiny11’s refreshed builder makes a clear promise: a lean, debloated Windows 11 25H2 image that strips Microsoft’s newest inbox AI and collaboration components and removes the Microsoft Account requirement from OOBE — all while relying on Microsoft’s own servicing tools to rebuild official ISOs into much smaller, more deterministic install media.

Background / Overview​

The tiny11 project began as a community‑driven answer to two converging problems: Windows 11’s growing on‑disk footprint and Microsoft’s increasingly integrated inbox app strategy (Copilot, new Outlook, Teams and many others). For users with older or low‑spec hardware, or for administrators who want tightly controlled images, the default Windows 11 installer often contains dozens of packages that are unnecessary for their use cases. The tiny11builder approach is not a forked operating system — it’s a script‑driven image builder that takes an official Microsoft ISO, performs offline servicing, removes specified packages and components, and rebuilds a bootable ISO using Microsoft tools.
NTDEV’s September 2025 refresh repositioned tiny11builder as 25H2‑ready and introduced three headline changes: explicit removal routines for Copilot, the “new Outlook” client and Microsoft Teams; a PowerShell‑centric single‑script workflow (tiny11maker.ps1) that is architecture and language flexible; and a switch to DISM recovery (LZX/LZMS) compression to significantly reduce the final ISO size. These changes were described and corroborated in the project repository and by independent tech outlets.

What exactly is being removed or changed?​

The removal roster (what tiny11 targets)​

Tiny11’s standard profile removes a long list of consumer‑facing inbox packages and optional features that are commonly labeled “bloat” by enthusiasts. The standard removals typically include:
  • Clipchamp, News, Weather, Xbox family apps
  • GetHelp, GetStarted, Office Hub, Solitaire, People, Power Automate, To Do
  • Alarms, Mail & Calendar (classic), Feedback Hub, Maps, Sound Recorder
  • Phone Link (Your Phone), Media Player, Quick Assist, Tablet PC Math
  • Microsoft Edge (in many configurations), OneDrive
  • Copilot, the new Outlook for Windows client, Microsoft Teams (consumer)
  • Various telemetry/feedback helpers and optional language payloads
The project’s repository and release notes list exact package identifiers and the script options to exclude or keep particular components. That granular control is core to the builder’s appeal: the maintainer exposes choices so the builder’s output matches the administrator’s intent.

Copilot, Outlook, Teams — why these matter​

Copilot and the “new Outlook” are central to Microsoft’s modern Windows strategy and are tightly integrated with cloud services and background frameworks. Removing them reduces the number of background services, decreases the on‑disk footprint, and eliminates in‑box prompts that steer users toward cloud flows. Teams and Outlook are often required in corporate environments, but for personal or kiosk use they are a frequent source of unwanted background activity. Tiny11’s explicit removal routines treat these features as optional rather than mandatory. This is a technical and cultural pushback against Microsoft’s default image composition.

Recovery compression: smaller ISOs, bigger build machine demands​

The builder now uses DISM’s recovery compression (LZX/LZMS) when reconstructing the WIM/ESD, which can produce final ISOs that are dramatically smaller than stock media. Reported examples show final images in the 3–4 GB range depending on configuration, compression choice, and what components are removed. That compression comes at a cost: high RAM usage and longer processing times when creating the image. The NTDEV notes and independent reporting both confirm this tradeoff.

How the builder works — technical walkthrough​

Tiny11’s fundamental model is straightforward: start with Microsoft’s official ISO, service the offline image with Microsoft tooling, remove packages, and rebuild a bootable ISO. The main building blocks are:
  • DISM (Deployment Image Servicing and Management) for offline servicing: package removal, feature toggles, and component servicing.
  • PowerShell as the controlling script language (tiny11maker.ps1 / tiny11coremaker.ps1) for cross‑locale and cross‑architecture scripting.
  • Windows ADK’s oscdimg.exe for ISO creation (a Microsoft binary the script uses when creating bootable media).
  • An unattended answer file optionally injected into the image to change OOBE behavior (notably to bypass Microsoft Account enforcement for offline/local accounts).
  • An optional “Core” profile (tiny11coremaker) that removes WinSxS and other servicing surfaces to produce a minimal, non‑serviceable image.
Practical steps the builder automates are:
  • Mount the source WIM/ESD from an official ISO.
  • Enumerate packages and optional components across the chosen SKU(s).
  • Remove selected package families and optional features via DISM commands.
  • Apply registry tweaks and anti‑reinstall protections to reduce the chance the Microsoft Store/Update will re‑provision removed inbox apps.
  • Repackage the serviced image using recovery compression and create a new ISO.

Tiny11 profiles: serviceable vs core (tradeoffs explained)​

Tiny11 exposes at least two profiles that represent a tradeoff between footprint and maintainability:
  • tiny11maker (standard) — Keeps the image serviceable. Core OS servicing components like WinSxS are preserved so updates and language additions remain possible. This is recommended for everyday systems where regular updates and vendor support are required.
  • tiny11coremaker (core) — Extremely aggressive removal. The script intentionally removes the Windows Component Store and many servicing hooks, which yields a very small image but makes the OS non‑serviceable. Systems built this way cannot reliably receive cumulative updates, add languages, or reinstall many features without a rebuild. This profile is intended only for isolated testing, VMs, or single‑purpose appliances.
Those two profiles map directly to two different maintenance philosophies: the standard profile balances control and future patchability, while Core optimizes for minimality at the expense of long‑term maintenance and security patchability.

Installation and deployment: a high‑level guide​

Tiny11 is intentionally a technical tool rather than a consumer installer. The high‑level workflow recommended by the project is:
  • Download an official Windows 11 ISO from Microsoft (do not use untrusted third‑party ISOs).
  • Download the tiny11builder repository (tiny11maker.ps1 / tiny11coremaker.ps1).
  • Prepare a Windows machine with the Windows ADK (if you want oscdimg output) and run PowerShell as Administrator.
  • Run the script and follow prompts to select ISO mount point, SKU, language, and build profile.
  • Let the script service and rebuild the image (expect a long run if you enable recovery compression).
  • Create bootable media from the output ISO (Rufus, Windows USB/DVD tool, etc.) and install to your target machine.
Two practical notes: the repository includes an unattended answer file that can be used to bypass the Microsoft Account requirement in OOBE, and the maintainer deliberately recommends building from an official ISO locally rather than downloading prebuilt, redistributed images. Both are important for legality and supply‑chain security.

Benefits — why users and admins are adopting tiny11​

  • Smaller install and ISO footprints. The recovery compression plus component removal can reduce installer and on‑disk sizes markedly, which helps low‑capacity devices and constrained VMs.
  • Lower background churn. Removing auto‑updating inbox apps and services reduces background tasks, network chatter, and update vectors for nonessential apps.
  • Privacy & control. For users concerned about AI prompts, cloud nudges, or preinstalled telemetry services, tiny11 offers a way to avoid those defaults entirely.
  • Works on older/unsupported hardware (when paired with compatibility helpers). While tiny11 itself focuses on image composition, it’s often used alongside tools that assist with installation on machines that fail Microsoft’s hardware checks. That combination extends the usable life of older devices.

Risks, legal and security considerations (be explicit)​

Tiny11 is powerful, but it introduces specific, concrete risks that any IT admin, hobbyist, or security‑minded user must weigh.

1) Serviceability and update risk​

If you use the Core profile or heavily trim servicing components, you may break Windows Update, prevent future cumulative updates from applying, and leave systems unpatched. For production or internet‑facing systems, this is a material security hazard. The project documentation repeatedly warns that Core images are not intended for long‑term daily drivers.

2) Compatibility and functionality gaps​

Removing Edge, Copilot or other components can have knock‑on effects: search results embedded in File Explorer, mailto: handling, or integrations expected by some enterprise software may behave differently. Reinstallation of removed apps is not always seamless. Test thoroughly before deploying an image to end users.

3) Supply‑chain and trust considerations​

Modifying Microsoft ISOs and distributing them widely can introduce supply‑chain risks if end users obtain prebuilt images from untrusted sources. The recommended best practice is to download the official ISO directly from Microsoft and run the builder locally so you retain control and can verify what’s changed. The maintainer and journalists emphasize building locally for this reason.

4) Legal/licensing gray areas​

Tiny11 relies on official Microsoft media and the script’s outputs must still be activated with a valid Windows license. Distributing prebuilt, modified ISOs can raise licensing or redistribution questions depending on jurisdiction and context; organizations should consult legal counsel for fleet deployments. Journalistic and project commentary stresses the importance of valid activation.

5) The cat‑and‑mouse problem​

Microsoft’s servicing/Store mechanics can reintroduce removed inbox apps over time; tiny11’s maintainers actively add registry locks and preventative tweaks but acknowledge this is an ongoing battle. Expect maintenance work to keep images aligned with changing platform behavior.

Cross‑verification of key claims​

  • The NTDEV repository and blog explicitly document the new PowerShell pipeline, the use of DISM recovery compression, and the addition of Copilot/Outlook/Teams removal routines. That is the primary authoritative source for what the builder does.
  • Independent reporting from multiple outlets confirms the same headline claims — that the September 2025 builder refresh is 25H2‑ready, removes AI and mail clients explicitly, and can produce much smaller images (with the caveat of higher resource usage during creation). Tom’s Hardware, Neowin, TechRadar and others have corroborated the essentials of the release. Those outlets also emphasize the same tradeoffs: smaller images versus maintainability risks.
  • Reported final ISO sizes are situational and depend on configuration. Multiple community and tech articles show reproducible cases of ~3–4 GB ISO outputs for certain configurations, but these are not absolute guarantees — they’re examples tied to specific build choices. Treat any exact size claim as configuration‑dependent and therefore partly unverifiable until reproduced locally.
Where claims were ambiguous or likely to change over time (for example, whether Outlook reinstallation persists across subsequent cumulative updates), the project notes and journalists together advise caution and flag those items as ongoing maintenance concerns.

Practical recommendations for readers and administrators​

  • Build locally from an official Microsoft ISO. Do not download or deploy third‑party prebuilt ISOs without validating them. The NTDEV repository explicitly recommends this as the safest practice.
  • Prefer the standard tiny11maker profile for daily‑use devices that need updates and vendor support. Reserve Core for isolated VMs, testbeds, or appliances that will remain offline or be rebuilt frequently.
  • Maintain a build lab and a verification checklist. Test the image on representative hardware, validate Windows Update behavior, application compatibility, and recovery functionality before rolling out to any users.
  • Keep an eye on the project updates and community notes. Because Microsoft’s servicing and the Store mechanics evolve, maintainers will continue to tweak anti‑reinstall measures and package selection. Expect to refresh your build periodically.
  • Use the unattended answer file judiciously. While the autounattend capability to bypass Microsoft Account enforcement is a convenience for privacy‑minded users and kiosk images, it should be used in accordance with organizational policy and licensing requirements.

Final analysis — strengths, weaknesses, and where tiny11 fits​

Tiny11’s September 2025 builder refresh is a well‑scoped, technically sound response to a real user need: a deterministic, smaller Windows 11 image that avoids inbox AI and collaboration bloat. Its strengths are clear:
  • Transparent tooling: the project uses Microsoft’s DISM and ADK tools and publishes scripts, letting users inspect and modify behavior before running builds.
  • Meaningful size and surface‑area reductions: targeted removals plus recovery compression deliver measurable savings for storage‑constrained devices.
  • Configurable balance between maintainability and minimality: the two‑profile model gives administrators clear options and tradeoffs.
The weaknesses are equally real and material:
  • Long‑term maintenance burden: removed components can be reintroduced by Microsoft servicing, and non‑serviceable images will drift out of compliance with updates and security posture.
  • Compatibility and functional risk: removing integral inbox components can produce subtle application or UX regressions that only surface under real workloads.
  • Security and legal considerations: distributing modified OS images or deploying non‑serviceable systems in production exposes organizations to potential regulatory, licensing, and supply‑chain risks.
In practice, tiny11 is best positioned as a tool for enthusiasts, power users, lab admins, and specific edge‑use cases (kiosks, VMs, constrained devices). For large fleets or mission‑critical endpoints, the conservative approach remains: validate thoroughly, favor the serviceable profile, or prefer officially supported upgrade paths where vendor support and long‑term patchability are required.

Tiny11’s 25H2‑ready builder is an important, pragmatic development in the Windows ecosystem: it restores user choice over what Windows 11 ships with and how large it is, while reminding us of the tradeoffs that follow. For those who prize a lightweight, privacy‑oriented desktop on older or constrained hardware, the builder is an effective and auditable solution — provided it’s used responsibly, with an eye toward future maintenance and security.

Source: Neowin tiny11 25H2 is out, offering debloated Windows 11 25H2 without Microsoft Account requirement
 
For many Windows 10 holdouts the choice that once felt binary — keep a perfectly serviceable but unsupported OS, or buy new hardware to meet Windows 11’s checkpoints — has quietly gained a third, controversial option: a community-built, debloated Windows 11 image known as Tiny11 (now updated for 25H2) that promises a leaner desktop on older PCs while sidestepping Microsoft’s strict install requirements.

Background / Overview​

Microsoft ended mainstream support for Windows 10 on October 14, 2025, meaning consumer editions no longer receive free security patches, feature updates, or technical assistance; Microsoft’s guidance is to migrate eligible machines to Windows 11 or enroll in Extended Security Updates (ESU) if more time is required.
At the same time, community projects like NTDEV’s Tiny11 builder have matured from hobby experiments into robust, repeatable toolchains that build custom Windows 11 installation media. The Tiny11 approach is not “a new OS” — it’s a PowerShell-driven image builder that takes an official Microsoft Windows 11 ISO, performs offline servicing (DISM), strips or disables dozens of inbox apps and services, applies unattended setup tweaks, and repackages the result as a much smaller ISO. The project now explicitly supports Windows 11 25H2 and offers options to remove Microsoft’s latest inbox features such as Copilot, the new Outlook client, and Teams.
This article unpacks what Tiny11 25H2 actually does, why it matters now that Windows 10 support has ended, how the builder works, the practical benefits for older hardware, and the real — and sometimes under-discussed — security, update, and licensing trade-offs. Where claims or numbers are murky or community-sourced, those are flagged so readers understand what’s proven and what is anecdotal.

What Tiny11 25H2 is — and what it is not​

The practical definition​

  • Tiny11 is a collection of scripts and a workflow (commonly distributed as tiny11maker.ps1 / tiny11builder) that automates offline image servicing of official Windows 11 ISOs. It uses Microsoft tooling (DISM, and optionally oscdimg.exe from the Windows ADK) to remove packages, tweak the image, and create a new installer. This keeps the supply chain narrower than a pre-built third-party ISO.
  • There are two characteristic outputs:
  • Standard Tiny11 — a debloated but serviceable build that removes many inbox apps and reduces the on-disk footprint while attempting to preserve updateability and driver support.
  • Core / Nano (extreme) builds — ultra‑aggressive profiles that remove core components (even parts of WinSxS, Defender, Windows Update) and are intended for testbeds, VMs, or very specific single-purpose devices; these are explicitly not recommended for daily drivers because they break serviceability.

What Tiny11 promises in 25H2​

  • Compatibility with Windows 11 25H2 source ISOs.
  • Explicit removal routines for new inbox components (Copilot, new Outlook, Teams) and other consumer apps.
  • Use of recovery/LZMS compression to shrink the final ISO size, at the cost of more RAM and CPU during the build process.
  • Options to bypass Microsoft Account (MSA) requirement in OOBE via an unattended answer file so the installer can create a local account — a convenience Microsoft is tightening in official media.

How Tiny11 works — a quick technical tour​

Step-by-step at a glance​

  • Download an official Windows 11 25H2 ISO from Microsoft and verify checksums.
  • Clone or download the tiny11builder repository from NTDEV on GitHub.
  • Mount the official ISO in Windows, start PowerShell as Administrator, and run tiny11maker.ps1 with a designated scratch folder and options (selecting SKU, language, and removal profile).
  • The script mounts and services the WIM/ESD image with DISM, removes targeted packages and scheduled tasks, applies registry and unattend tweaks (for MSA bypass/local account), and recompresses the image using LZMS/recovery compression.
  • The script packages a new bootable ISO (optionally using oscdimg.exe from the Windows ADK) ready to write to USB with Rufus or other media tools.

Key tooling and techniques​

  • DISM for offline servicing and package removal.
  • PowerShell as the orchestration layer.
  • LZMS / recovery compression to reduce ISO size (this is CPU and RAM intensive during build).
  • Autounattend.xml to set OOBE behavior (local account creation, skip MSA).
  • Optional use of oscdimg.exe for the final ISO creation step.

What Tiny11 removes and why that matters​

Tiny11’s standard profile typically strips a long roster of inbox apps and services commonly labeled “bloat.” Examples include:
  • Copilot and related AI components
  • The “new Outlook” client and consumer Microsoft Teams
  • OneDrive, Media Player, Phone Link, Xbox apps, Clipchamp, News & Weather, Mail & Calendar (classic), Feedback Hub, and other UWP inbox apps
  • A selection of telemetry or scheduled feedback tasks (optional removals)
Why this matters:
  • Removing these components reduces background services and disk usage, and it avoids in‑box prompts and cloud-first flows many users find intrusive.
  • It also reduces attack surface in some scenarios (fewer running services), but removing components that interact with update/service infrastructure can also reduce your ability to receive future fixes. That trade-off is central to the Tiny11 decision.

Benefits: who gains from Tiny11 25H2?​

  • Owners of older hardware: machines that meet Windows 10 specs but fail Windows 11’s TPM/Secure Boot/CPU checks can receive a modern UI and light footprint without buying new hardware. Community tests show improved responsiveness on low‑spec laptops and refurb units.
  • Refurbishers and lab admins: Tiny11 can produce repeatable, small, fast images for kiosks, single-purpose devices, and lab VMs where the full Windows experience is unnecessary.
  • Privacy-minded or offline users: the ability to avoid enforced MSA sign-in is attractive for those who prefer local accounts and tighter control over telemetry.
  • Environmental and cost reasons: by extending the usable life of hardware, Tiny11 reduces e-waste and defers capital expenditure.

Risks and the hard trade-offs​

Tiny11 offers pragmatic gains, but these come with real costs. The most important are:

1) Update and security uncertainty​

Some Tiny11 variants block Windows Update or remove servicing components entirely (especially "core" or "nano" variants), meaning security patches, mitigations, and feature updates may not arrive normally. Running an OS that does not receive timely security fixes is risky for any machine exposed to the Internet or used for sensitive work. Microsoft explicitly warns that Windows 10 devices that stop receiving updates become more vulnerable after end of support.

2) Support and warranty implications​

Tiny11 is a community project, not a Microsoft product. If you alter and install a modified installer you should expect to troubleshoot without official Microsoft support. For enterprise or regulated environments, modified images raise compliance and auditability questions.

3) Software compatibility and driver issues​

Removing components or trimming the servicing stack can break drivers, DRM, or apps that depend on removed subsystems. Gamers and creative professionals have reported compatibility problems with more aggressive builds. Test in a VM first and keep a full image backup.

4) Potential supply‑chain and trust concerns​

Downloading pre-built third‑party ISOs from unknown mirrors carries risk. The safer path — recommended by the project and by many community experts — is to build your own ISO from an official Microsoft image using the Tiny11 scripts so you can inspect the steps and artifacts yourself. The NTDEV project explicitly encourages DIY builds to minimize trust concerns.

5) Activation and licensing uncertainty​

Using a modified installer does not magically change Windows licensing. You should maintain valid product keys or use existing OEM/retail licensing. Enterprises must consider licensing compliance before mass-deploying modified images; for individuals, activation can sometimes require manual steps if the image removes activation or telemetry hooks. This remains a gray area and requires care.

Realistic scenarios and recommendations​

When Tiny11 makes sense​

  • You’re a technically competent user or admin who understands image servicing, drivers, and Windows internals.
  • The target machine is for light tasks, kiosk, media playback, retro gaming, or as a lab VM — not a primary workstation handling sensitive data.
  • You will build the image yourself from an official Microsoft ISO and verify checksums.
  • You maintain an offline backup and a recovery plan if things go wrong.

When Tiny11 is the wrong choice​

  • Production endpoints, regulated environments, or machines processing confidential data.
  • Situations where continuous, vendor-supported security updates are mandatory.
  • Users who cannot or will not maintain manual updates, drivers, or troubleshoot activation and compatibility problems.

How to build and test a Tiny11 25H2 image (concise, advanced‑user workflow)​

Follow these steps as a technical checklist — this is not a beginner tutorial and assumes Windows administration experience:
  • Obtain the official Windows 11 25H2 ISO from Microsoft. Verify the SHA256 checksum.
  • Clone ntdevlabs/tiny11builder from GitHub and read the README and release notes.
  • Prepare a build machine with ample RAM (recovery compression uses lots of memory) and the Windows ADK if you plan to use oscdimg.exe.
  • Mount the ISO, open PowerShell as Administrator, set Execution Policy as needed, and run tiny11maker.ps1 with your selected options and a scratch folder.
  • Validate the produced ISO in a VM (Hyper-V, VirtualBox, VMware). Test device drivers, Windows Update behavior, and application compatibility.
  • Once verified, write the ISO to USB with Rufus (or Ventoy) if you need bypass options for incompatible hardware; Rufus supports creating extended install media that bypasses TPM and Secure Boot checks when booting from USB. Note: bypasses apply during booted installs, not when running setup.exe from within an existing Windows session.

The tricky bits: claims worth doubting (and what’s verified)​

  • Claim: “Tiny11 can run on 100MB or 176MB of RAM.” This is an extreme claim that shows up in enthusiast chatter and older demos but is not realistic for a fully usable desktop with modern applications. These numbers likely reflect highly experimental, text-only setups or niche lab demonstrations and are not representative of practical, supported installs for daily use. Treat such claims as anecdotal and unverified unless accompanied by reproducible, independent tests.
  • Claim: “Tiny11 always keeps Windows Update and Defender functional.” This is false for the core/nano variants. Some Tiny11 configurations preserve updateability while others explicitly remove servicing paths. The precise behavior depends entirely on which build profile you run; the builder exposes these options and documents the trade-offs. Always inspect the builder options and test Windows Update behavior in a VM.
  • Claim: “Tiny11 bypasses licensing.” This is not a feature. Modified images do not confer free licenses. Activation still depends on keys or digital entitlement. Avoid any resource that claims otherwise.

Security and maintenance posture — practical advice​

  • If you use Tiny11, prefer the standard “serviceable” profile over the ultra‑minimal core/nano images for everyday systems; serviceable images keep update mechanics intact.
  • Maintain a regular backup and an alternate restore image (a Windows 10 image or stock Windows 11 ISO) so you can roll back quickly.
  • For machines that must remain secure and compliant, use official upgrade paths or Microsoft’s ESU options rather than third‑party builds. Microsoft documents ESU availability and recommends upgrading eligible devices to remain supported.
  • If you choose to download a pre-built Tiny11 ISO (not recommended), be aware of supply-chain risks — prefer building your own from an official ISO so you can audit the steps and confirm checksums. The NTDEV project actively recommends DIY builds for transparency.

Broader implications: what Tiny11 says about Windows desktop management​

Tiny11’s popularity highlights several enduring trends in the Windows ecosystem:
  • A significant segment of users wants modularity — the ability to opt out of consumer-first inbox apps, telemetry, and mandatory cloud integrations.
  • Hardware requirements and platform decisions have economic ripple effects: many users prefer to extend hardware life rather than buy new Copilot+ PCs.
  • Community tooling will continue to fill pain points left by vendor-driven lifecycles — but that also increases fragmentation and maintenance burdens across the installed base.
These dynamics may nudge vendors toward more decomposed offerings or clearer, user-focused ways to install Windows without unwanted extras; at present, though, Tiny11 represents a community work-around rather than a mainstream solution.

Conclusion​

Tiny11 25H2 is a technically mature, community-driven solution that answers a clear and timely need: give older, perfectly serviceable PCs a path forward after Windows 10’s end of support without forcing hardware upgrades. The builder’s reliance on official ISOs and Microsoft tooling makes the approach more transparent and auditable than random pre-built images, and the 25H2 update brings timely removal routines (Copilot, new Outlook, Teams) and better compression.
However, the choice is a trade-off. For hobbyists, refurbishers, and lab environments, Tiny11 can extend usefulness and reduce e‑waste. For everyone else — particularly enterprises, regulated environments, and users who need continuous, vendor-backed security updates — the safer, long-term approach is to use supported upgrade paths or consider ESU and hardware refresh cycles. Verified, practical use demands building your own ISO from official media, testing in a VM, and accepting the maintenance responsibilities that come with running a community-modified installation.
If Tiny11’s trade-offs sound acceptable and you are comfortable with advanced image servicing, the project gives you the tools to keep older PCs relevant — but do it with caution: validate every claim, test thoroughly, and prioritize security where it matters most.

Source: TechRadar New stripped-down version of Windows 11 lands to save those who can’t upgrade - and it works on 'any PC that supports Windows 10'
 
For many Windows 10 holdouts and owners of older hardware, the arrival of Windows 11 25H2 presented a stark choice: replace hardware, accept Microsoft’s stricter install requirements and cloud‑centric setup flows, or lean on the enthusiast community for alternatives—one of the most talked‑about being the tiny11 25H2 builder, which promises a debloated, installable Windows 11 image that removes hardware checks and can restore a local‑account (no Microsoft account) setup flow.

Background / Overview​

Microsoft tightened Windows 11’s installation gates (TPM, Secure Boot, CPU generation checks) and increased integration with Microsoft Accounts and cloud features in recent releases. That has driven an ecosystem of community projects—Rufus’ “Extended Windows 11 installation” workflows, Flyoobe, and image builders like tiny11—that aim to help technically proficient users run Windows 11 on unsupported machines or produce leaner, privacy‑minded images.
tiny11 is not a forked operating system. It is a PowerShell‑driven image builder that automates offline servicing of an official Windows 11 ISO: mounting the source image, using DISM to remove selected packages and services, injecting an unattended answer file (to control OOBE behavior such as bypassing the Microsoft Account requirement), compressing the result with higher‑ratio recovery compression, and repackaging a bootable ISO. The project explicitly offers multiple profiles (standard tiny11 and an ultra‑aggressive tiny11 Core/nano family) to match different use cases.
This article walks through what tiny11 25H2 is, why people use it, the practical step‑by‑step for building and installing tiny11 media (including the commonly used Rufus path), and a detailed risk/mitigation analysis so readers understand the trade‑offs before they proceed.

What tiny11 25H2 actually is​

The project in plain terms​

  • tiny11 is a script-based image builder: it consumes an official Microsoft Windows 11 ISO and produces a new installer ISO by performing offline servicing with Microsoft tools (DISM, and optionally oscdimg.exe from the Windows ADK).
  • Two main profiles: a “standard” tiny11 that aims to remain serviceable and updateable, and a “Core/nano” profile that aggressively strips components (including servicing pieces) to minimize size and footprint—at the cost of future updateability. fileciteturn0file11turn0file5
  • 25H2‑aware: the builder has been updated to handle Windows 11 version 25H2 imagery and includes removal routines for newer inbox components (Copilot, the “new Outlook” client, Teams) that Microsoft added in recent releases. fileciteturn0file8turn0file3

What tiny11 removes (typical list)​

tiny11’s standard profiles typically remove or block reinstallation of a long list of consumer inbox apps and optional features, for example:
  • Copilot and related AI helper components
  • New Outlook client and consumer Microsoft Teams
  • Xbox apps, Clipchamp, Media Player, OneDrive, Phone Link
  • Mail & Calendar (classic), Feedback Hub, News & Weather
  • Selected telemetry/feedback scheduled tasks (optional)
    These removals are granular and script‑driven; the builder exposes the options so you can tune the profile before building. fileciteturn0file4turn0file9

How the builder claims to handle supply chain integrity​

The tiny11 builder’s maintainers and documentation emphasize that the workflow uses Microsoft-supplied tooling for servicing and ISO creation, which narrows the attack surface compared with opaque prebuilt, redistributed ISOs—but using official tooling does not eliminate other risks introduced by component removals and unattended configs. Treat developer claims about “only official tools” as a positive control measure, but not as a security guarantee. fileciteturn0file11turn0file8

Why users turn to tiny11 25H2​

  • Run Windows 11 on unsupported hardware: bypass TPM/Secure Boot/CPU checks so usable Windows 11 experience can be delivered to older machines. This conserves hardware budgets and reduces e‑waste. fileciteturn0file1turn0file19
  • Smaller, faster installs: recovery compression plus removal of inbox apps can cut ISO and on‑disk footprint, improving responsiveness on low‑RAM machines and reducing storage use.
  • Restore local‑account first run: the builder supports injecting an autounattend to avoid forced Microsoft Account enrollment in OOBE, which appeals to privacy‑oriented users.
  • Cleaner, more deterministic images for labs and VMs: administrators and VM builders use tiny11 to create repeatable, minimal images for testing and kiosks.

How tiny11 25H2 works — technical walkthrough​

Core tooling and steps​

  • Obtain an official Windows 11 25H2 ISO (best practice is to download directly from Microsoft and verify checksums).
  • Mount the ISO and run the tiny11builder PowerShell script (tiny11maker.ps1), usually from an elevated PowerShell session with execution policy adjusted. The script locates the WIM/ESD image inside the ISO.
  • Offline servicing with DISM: packages, appx bundles, scheduled tasks and optional features are removed or disabled via DISM and offline servicing operations. Registry and OOBE tweaks are applied.
  • Inject autounattend.xml: this file enables customized OOBE behavior — including local account creation and skipping Microsoft Account sign‑in.
  • Recompress and repack: DISM’s recovery compression (/Compress:recovery) is typically used to reduce final ISO size, with oscdimg.exe optionally used to produce a bootable ISO. This step requires substantial RAM and CPU depending on options.

Notes on tiny11 Core / nano​

  • Core builds are deliberately non‑serviceable: they strip servicing components (WinSxS, parts of the servicing stack) that prevent normal Windows Update behavior and limit the ability to apply later cumulative updates. This is suitable for isolated test VMs and single‑purpose devices only; never recommend Core for a daily‑driver exposed to the Internet. fileciteturn0file6turn0file11

Step‑by‑step: build and install tiny11 25H2 (conservative, recommended workflow)​

Below is a practical, conservative workflow that prioritizes safety: build from an official ISO, test in a VM, and use the standard tiny11 profile (not Core).

Prerequisites and safeguards​

  • Backup all important data and create a full disk image of the system you will modify or replace.
  • Use a secondary machine to prepare media. Keep recovery media and vendor drivers at hand.
  • Download the official Windows 11 25H2 ISO from Microsoft and verify checksums when available.
  • Prefer building your own tiny11 ISO from the official ISO; avoid downloading random prebuilt ISOs from unknown mirrors. Community guidance strongly warns against unknown third‑party images. fileciteturn0file9turn0file11

Build the tiny11 25H2 ISO (high level)​

  • Mount the official Windows 11 25H2 ISO in File Explorer to get a drive letter.
  • Download the tiny11builder repository (tiny11maker.ps1) from the project’s release page; extract it on your build machine.
  • Open PowerShell as Administrator and run:
  • Set‑ExecutionPolicy Bypass ‑Scope Process
  • Run the script with appropriate parameters, pointing it at the mounted ISO’s drive letter and a scratch folder for temporary files. The script will present options to choose SKU, language, and the removal profile (standard vs core). fileciteturn0file1turn0file11
  • Wait for the script to finish; it will produce a new tiny11 ISO in the chosen output folder (this process can take significant time and memory depending on compression and profile).
  • Test the generated ISO in a virtual machine before using it on physical hardware. This is the single most important safety step.

Create bootable USB (Rufus recommended for most users)​

  • Rufus is widely used to write ISOs to USB and includes explicit options to create “Extended Windows 11 installation” media that remove official hardware checks and offer Microsoft Account bypass options during setup. If you prefer not to run the builder, Rufus’ Extended installer is a lower‑risk, less‑invasive option for many users. fileciteturn0file2turn0file14
Steps with Rufus:
  • Download the latest Rufus release on a working Windows machine. Insert a USB flash drive (8–16 GB recommended).
  • Open Rufus, select your USB device, click “Select” and choose your tiny11 ISO.
  • Rufus will prompt for “Windows User Experience” or “Extended installation” options. For a no‑MSA, no‑TPM flow, enable the options that remove TPM/Secure Boot checks and the “Remove requirement for an online Microsoft account” option (Rufus’ UI presents these choices in its Extended workflows). fileciteturn0file2turn0file14
  • Click Start and wait for Rufus to write the USB. Eject and use the USB to boot the target system.

Install and OOBE​

  • Boot the target machine from the USB (press the vendor boot key during power on: F12/F2/Esc/Delete—varies by manufacturer).
  • Proceed through the installer; if you used a tiny11 image with an autounattend to bypass MSA, OOBE should offer the local account flow or present “I don’t have internet.” If required, disconnect network and use Shift+F10 to run OOBE\BYPASSNRO as an emergency bypass. fileciteturn0file0turn0file12
  • Select partition/disk to install, wait for installation to finish, and test hardware drivers, Wi‑Fi, and updates. Install vendor drivers manually if necessary.

Security, maintenance, and update considerations​

Update behavior and Defender​

  • The standard tiny11 profile tries to remain updateable, but major Windows feature updates can sometimes re‑provision removed apps or fail on heavily customized images; community maintainers add mitigations, but updates are a known fragility. fileciteturn0file11turn0file9
  • The Core/nano profile may remove Windows Update, Windows Defender, and servicing components—this creates a maintenance gap requiring a documented alternative patching and antivirus plan. Running Core on an Internet‑exposed primary machine is strongly discouraged. fileciteturn0file6turn0file12

Compatibility and drivers​

Removing inbox apps and components can cause unexpected app or driver incompatibilities—some DRM or multimedia stacks rely on components that tiny11 might strip. Test the exact hardware you plan to use with the image and keep OEM driver packages ready.

Legal and warranty implications​

  • tiny11 is a community, non‑Microsoft project. Using a custom image voids any expectation of official Microsoft support for the resulting system and may affect OEM warranty/support decisions; treat such installations as unsupported and prepare to troubleshoot without vendor assistance.

Supply‑chain and trust risk​

  • Downloading prebuilt ISOs from random sites is risky. The safer workflow is to build your own tiny11 ISO from an official ISO and inspect the builder script yourself. Community guidance repeats this strongly. fileciteturn0file9turn0file11

Practical mitigations and best practices​

  • Always build from an official Microsoft ISO and verify checksums when possible.
  • Test extensively in a VM and on non‑critical hardware before deploying on a primary machine.
  • Use the standard tiny11 profile if you need updateability and only move to Core for isolated, offline, or ephemeral test machines.
  • Maintain a recovery image and keep vendor drivers and firmware updates separately; create a fresh disk image of your configured system as soon as setup is complete so you can roll back fast.
  • If you remove Defender or Windows Update, substitute a managed patch and endpoint protection process (third‑party AV, manual patching, or isolated network policy). Never expose a non‑patched, non‑protected system to sensitive networks.
  • Document exactly what you removed from the image so you (or an auditor) can understand what was changed and why. The tiny11 builder logs and options help with this.

Common misconceptions and unverifiable claims — flagged​

  • Claim: “tiny11 images are inherently safe because they’re assembled with official Microsoft utilities.” — Caution: while the builder uses Microsoft tools (DISM, oscdimg), that does not make the resulting image equivalent to Microsoft’s official media. Component removals and unattended OOBE tweaks alter behavior and updateability; consider security impacts independently.
  • Claim: “Using tiny11 Core halves installation size and is fine for daily use.” — Caution: Core may dramatically reduce size but often deliberately removes servicing and security components; this raises long‑term risks for any machine that connects to the Internet. The Core profile is intended for offline/experimental use only. fileciteturn0file5turn0file6
  • Claim: “You should download prebuilt tiny11 25H2 ISOs from archives for convenience.” — Caution: community guidance strongly discourages downloading unvetted prebuilt ISOs. Building your own image from an official ISO is safer and more auditable. fileciteturn0file9turn0file11
These caveats are important: where the tiny11 project is transparent, testers and admins can inspect and validate behavior; but where prebuilt images or unverified distributions are used, trust issues and supply‑chain concerns increase.

Who should (and should not) consider tiny11 25H2?​

Good candidates​

  • Hobbyists and power users comfortable with Windows internals and offline servicing who accept responsibility for updates and troubleshooting.
  • Lab admins and VM builders needing small, repeatable images for testing and ephemeral environments.
  • Owners of older, otherwise functional hardware who want a modern UI without buying new devices and are willing to trade some conveniences for control.

Not suitable for​

  • Primary workstations that require guaranteed security updates, vendor support, or compliance with corporate policies.
  • Less technical users who cannot perform backups, driver restores, or in‑place recovery.
  • Enterprise fleets or regulated environments that must maintain vendor‑supported images and update chains.

Final verdict — weighing the trade‑offs​

tiny11 25H2 is a powerful, transparent, and pragmatic community tool that addresses two real problems: restrictive hardware gates and a growing inbox of apps and cloud‑tied features that many users do not want. When used conservatively—built from official ISOs, tested in VMs, and kept on machines with a solid recovery and update plan—it can extend the life of hardware, reduce on‑disk clutter, and restore local‑account setup flows for privacy‑minded users. fileciteturn0file9turn0file11
However, the benefits come with measurable costs: potential update and security gaps (especially with Core), compatibility pitfalls, and the lack of official Microsoft support. The safest approach is to prefer the standard tiny11 profile, build your own images, test thoroughly, and retain a recovery image and driver set for rollbacks. For enterprise or non‑technical users, the recommended path remains using supported hardware and official Microsoft installers. fileciteturn0file6turn0file14

If the goal is to “install Windows 11 25H2 without a Microsoft account” on older hardware while keeping the system reasonably serviceable and secure, the best pragmatic method is:
  • Download an official 25H2 ISO and verify it.
  • Use the tiny11 builder (standard profile) to produce a debloated ISO, or use Rufus’ Extended installer for a lower‑risk path. fileciteturn0file11turn0file14
  • Test in a VM, build recovery images, and keep a maintenance plan for updates and security. fileciteturn0file9turn0file14
tiny11 25H2 is a compelling tool for technically adept users who value control and a leaner desktop experience. It is not a universal replacement for vendor‑supported installations, and it requires discipline—backups, testing, and an explicit update strategy—to avoid exposing the user to unnecessary risk. fileciteturn0file11turn0file12


Source: myhostnews.com Install Windows 11 25H2 without a Microsoft account using tiny11, here's how to do it