NoPilot 1.0

Microsoft Copilot is almost universally disliked due to its forced integration across Windows and Office, which many users find intrusive, distracting, and a disruption to established workflows.
Critics often complain of 'AI slop': poorly executed, generic, or incorrect outputs, along with increased, unnecessary, and unremovable AI presence in daily tasks, making it feel like a forced, premium-cost annoyance rather than a helpful tool.

Copilot is heavily forced into the toolbar, right-click menus, and as a permanent, hard-to-remove icon in Windows 11, disrupting user experience.

Users frequently report generic, inaccurate, or redundant responses, often requiring more time to edit than to write from scratch. Frequent updates constantly change how Copilot works, creating inconsistency and frustrating users who want a stable, predictable environment. It frequently and frustatingly suffers from, or takes a long time for, complex tasks. Serious concerns exist regarding the potential exposure of sensitive documents due to misconfigured SharePoint or OneDrive permissions.

Users report that Copilot can act stubborn, refusing to acknowledge valid user approaches to problems.

Overall, the sentiment is that Copilot is often seen as an unnecessary, premature addition that prioritizes marketing hype over user-centric design.

Now there is NoPilot.

NoPilot mostly hides CoPilot as complete removal is no longer possible. Some visible parts are removed, others are blocked, or disabled.

More information and download here.

Instructions:
- Download the batchfile to your Desktop
- Run as an Administrator (Right-click > 'Run as admin')

Changelog:
- [28jan26] version 1.0: Initial release

ToDo:
- Add Microsoft 365 Copilot

Download Mirror: MajorGeeks.

How to let Grok forget your queries

Suppose you use Grok as your AI to ask questions. As always, it will remember your question which may be 'unwelcome' to your privacy. You'd rather see that Grok forget about your sometimes personal questions.
To make Grok 'forget' your queries or, in other words, delete your conversation history is surprisingly easy.

Remember, deleted data is typically removed from xAI's systems within 30 days, some de-identified info may be retained for safety, security, or legal reasons.

Here's how to do it:

[a] On X (x.com or X Apps)
- Log in to your X account.
- Go to Settings and privacy > Privacy and safety > Grok (or search for "Grok" in settings).
- Under Grok options, tap or click 'Delete conversation history' and confirm. This removes all stored interactions.

[b] On the X Android/iOS app:
- Open the app, tap your profile icon > Settings and privacy > Privacy and safety > Grok and third-party collaborators > 'Delete conversation history'.

Additional Tips
- Opt out of data training: In the same Grok settings on X, toggle off "Allow your posts as well as your interactions, inputs, and results with Grok to be used for training and fine-tuning." This prevents future queries from being used to improve Grok.
- Unregistered sessions (no login) aren't retained after you close the tab/app.
- For shared conversation links: On grok.com, go to grok.com/share-links and remove specific ones.

How to opt out of LinkedIn's 'improve the content-generating AI'

Starting on November 3, 2025, 'LinkedIn will also start to use data from members in your region to improve the content-generating AI that enhances your experience and better connects our members to opportunities'. See here for the explanation.
This, LinkedIn claims, can help hirers find and reach you more easily, and assist members in creating content such as profile updates, messages, and posts.

This data could include data like details from your profile and public content you create on LinkedIn, though it does not (yet) include your private messages. In fact, it is just another obtruse way of saying: I will gather your personal data and do unknown things with it.

You can opt out via your settings if you’d prefer not to have your data used in this way.

How to opt out
- Hit your profile photo (Me)
- Open 'Settings & Privacy'
- Goto 'Data Privacy' (on the left)
- Hit 'Data for Generative AI Improvement'
- Switch off 'Use my data for training content creation AI models'

How to troubleshoot your Windows computer

Sometimes, your Windows experiences problems, such as some functions aren't working properly or Windows crashes.

[1] Deployment Image Servicing and Management Tool
On Windows 11, the Deployment Image Servicing and Management (DISM) tool is designed to prepare, modify, and repair system images, including Windows Recovery Environment, Windows Setup, and Windows PE (WinPE). However, you can also use it with the local recovery image to fix system problems.
[1] Type 'cmd' in 'Search'
[2] Rightclick 'Command Prompt'
[3] Choose 'Run as administrator'
[4] At the command prompt, type the following command, and then press ENTER: DISM.exe /Online /Cleanup-image /Restorehealth

[2] sfc /scannow command
[1] Type 'cmd' in 'Search'
[2] Rightclick 'Command Prompt'
[3] Choose 'Run as administrator'
[4] At the command prompt, type the following command, and then press ENTER: sfc /scannow

The sfc /scannow command will scan all protected system files, and replace corrupted files with a copy.

After the process is finished, you may receive one of the following messages:
- Windows Resource Protection did not find any integrity violations, meaning that you do not have any missing or corrupted system files.
- Windows Resource Protection found corrupt files and successfully repaired them.
- Windows Resource Protection found corrupt files but was unable to fix some of them. Details are included in the CBS.Log %WinDir%\Logs\CBS\CBS.log.
- Windows Resource Protection could not perform the requested operation.

Note: Never close this Command Prompt window until the verification is 100% complete. The scan results will be shown after this process is finished.

Windows System File Checker Verifier
If you are too lazy to type these commands then you're in luck, because Jake Carter has created a simple batch file that automates these commands.

Download Windows System File Checker Verifier v 1.0.0. here.

[3] Windows Memory Diagnostic Tool
Windows Memory Diagnostic Tool is a built-in troubleshooting utility that tests your computer's Random Access Memory (RAM). Run this program when your computer starts to lag, freeze, reboot on its own, or displays a blue screen. The tool also reports problems found in the applications installed on your computer.
[1] Type 'cmd' in 'Search'
[2] Rightclick 'Command Prompt'
[3] Choose 'Run as administrator'
[4] At the command prompt, type the following command, and then press ENTER: mdsched.exe
[5] Click 'Restart now and check for problems (recommended)'. Make sure to save your work and close any open programs before restarting. [6] The computer will restart and then the Windows Memory Diagnostic tool will run the memory test. Once complete, the computer will restart again.
[7] After some time, the results of the scan will be shown in a notification.

Palos: Take Back Control of Your Windows 1.08

Idea: Fred de Vries
Development: The SZ Development

On April 23, 2024, Microsoft released an update for Windows 11 that, among other more useful updates, added ads all across the OS, including the File Explorer, Start Menu, and more. See here.

Windows 11 now includes ads by default in the form of Microsoft promoting its own services and apps. These ads can include fun facts, tips, tricks, recommendations, and suggestions within the UI of Windows 11.
Many Windows 11-users were miffed after Microsoft added these seemingly unremovable ads. You've already paid for your OS and being shown ads is usually indicative of free programs.

Palos: Take Back Control of Your Windows
The-SZ has released a little program, called 'Palos: Take Back Control of Your Windows', that tries to remove, disable, block, or turn off all these irritating and useless promotional issues.

Changelog:
More info and download here.

Beware: If you use the option 'Windows Find My Device', offered by our Prey Helper, do not disable 'Find My Device' in Palos.

Prey Helper 1.17

Idea: Fred de Vries
Development: The SZ Development

Prey tracks the location of laptops, phones, and tablets. The program ensures that you can quickly react to unauthorized movements (read: your laptop gets stolen) with geofencing.

Prey is therefore is a program that should be on every system.

But Prey also leaves a lot of debris with every update (or even install). That debris accumulates and will use an increasing amount of megabytes.
Now there is Prey Helper.
Our Prey Helper will clean your computer of all that debris that is using valuable space.
Windows Find My Device
Microsoft also offers a free device location service. Prey Helper shows you the current status of it and allows you to enable or disable this service.

Windows Find My Device can be an interesting backup if and when the thief succeeds in detecting and removing Prey from your laptop.

Also, why would you want to install Prey with all its debris when Microsoft has a perfect built-in alternative?

You might get the warning 'Some Settings are Managed by Your Organisation', which is the result of you having changed some strange Windows settings. To revert those changes, you can download and use O&O ShutUp10++. Click "Actions" > "Undo all changes ("Factory Settings")".

Changelog
More info and download of Prey Helper here.

Prey and the logo of Prey are registrered trademarks of Prey.

Windows Defender Cleaner 1.4

Windows Defender is Microsoft's antivirus built into your Windows PC to protect you from viruses, malware threats, and attacks. It stores its info in several logs.
[1] Windows Defender Security Log
Whenever the Windows Defender runs a scan on your computer, it automatically stores the protection history in the Windows Defender Security Log. It also includes Controlled Folder Access blocks, along with any blocks which were made through the organizational configuration of Attack Surface Reduction Rules.

Though Protection History gets deleted after some time, the Windows Defender Security Log can become quite large, especially after an infection. Besides, the data stored in it may itself be used to see what sort of browsing history you have, which constitutes a breach of your privacy.

[2] Windows Health Center or WHC log
This log is used by Defender to report status and health information to the Windows operating system (e.g., whether real-time protection is enabled, if the product is up to date, or overall security health state). This log can be safely cleaned.

[3] Windows Defender Protection History log
Windows Defender Protection History displays recent actions, such as blocked threats and completed scans. It retains events for two weeks, showing critical (red) or informational (yellow) items that can be filtered to manage quarantined files. Events are automatically removed after two weeks. This log can be safely cleaned.

I've written a little batch file, especially for this tasks.

Windows Defender Cleaner 1.4

Windows Defender Cleaner 1.4 can be downloaded here.

Instructions:
- Download the batchfile to your Desktop
- Run as an Administrator (Right-click > 'Run as admin')

Changelog:
- [26jan26] version 1.4: Added removal of Windows Defender Protection History log (will be deleted on reboot)
- [24jan26] version 1.3: Added a better log
- [18jan26] version 1.2: Added cleaning of WHC log
- [15dec25] version 1.1: Added log to show how much is cleaned
- [15dec25] version 1.0: Initial release. Cleans Windows Defender Security Log.

ToDo:
- Add an option to 'simulate' the cleaning and reporting of the results before cleaning
- Add Windows Defender Event Log (Operational)
- Add MpCmdRun.log

Download Mirror: MajorGeeks.

Avast HermeticWiper Ransomware Decryptor

A large number of organizations in Ukraine have been hit by cyberattacks originating from Russia that involved new data-wiping malware dubbed HermeticWiper (aka FoxBlade and Win32/KillDisk.NCV) and impacted hundreds of computers on their networks, ESET Research has found on February 23th, 2022.
HermeticWiper is designed to delete data and thus render devices using the Windows Operating System (OS) inoperable. Attacks of this type can be incredibly devastating. They can cause permanent loss of crucial data and disrupt essential services.

As of February 28, 2022 Microsoft Defender Antivirus detects and removes this threat.

On February 24, 2022, the Avast Threat Labs discovered a new ransomware strain accompanying the HermeticWiper malware.

Following this naming convention, they opted to name the strain we found piggybacking on the wiper, HermeticRansom, whereas others called that ransomware component PartyTicket. According to analysis done by Crowdstrike’s Intelligence Team, the ransomware contains a weakness in the crypto schema and can be decrypted for free.

If your device has been infected with HermeticRansom and you want to decrypt your files, please, follow these steps:
[1] Download the free Avast decryptor here
[2] Simply run the executable file. It starts in the form of a wizard, which leads you through the configuration of the decryption process
[3] Click 'Next'
[4] Then, select from the list of locations which you want to be searched and decrypted
[5] On the final wizard page, you can opt-in whether you want to backup encrypted files. These backups may help if anything goes wrong during the decryption process. This option is turned on by default
[6] After clicking 'Decrypt', the decryption process begins. Let the decryptor work and wait until it finishes.

The latest release of Avast HermeticWiper Ransomware Decryptor is version 1.0.0.816 [January 26, 2026].

Microsoft's 'Cyber threat activity in Ukraine: analysis and resources' [Last updated April 27, 2022]. See here.

How to hide shortcuts on Google's News Page

If you are using Chrome (or a Chrome-based browser), Google will show shortcuts either simply based on advertising or based on the sites you have frequently visited. They might irritate you, because you feel that these ads are stupid or you don't want other users to know which sites you frequently visit.
You can choose what to show or completely disable all the shortcuts on the new tab page.

- Open Chrome browser. If you have any other page as your home page, open a new tab.
- Click on the 'Customize' button on the lower right corner. The image below shows the button's name in Comodo Dragon, a browser based on Chrome.
- Click on 'Shortcuts' on the Sidebar
- You will then be presented with two options: 'My shortcuts' and 'Most-visited sites'. Choose the one you want to show if you want to continue with your shortcuts.
- If you want to remove the shortcuts, then enable 'Hide shortcuts' to completely remove all shortcuts from the new tab page.
- Click 'Done'.

Where can I find my 'Sent Invitations' on LinkedIn?

LinkedIn's has a new User Interface (UI) and 'Sent Invitations' seems to have gone missing. Where did LinkedIn bury the button to see my 'Sent Invitations'?

Step 1: Click 'My Network'
Step 2: Click 'Manage All'
Step 3: Click 'Sent'
The system displays only those sent invitations to which the recipient has not yet responded. If a response was received, or if your invitation was rejected, you won't see it on this list.

Alongside each member name is a button called 'Withdraw'. Clicking this will delete the invitation. This action also stops reminder emails to the member.

How to block LinkedIn 'Promoted Ads'

If you are a regular user of LinkedIn, you are – like me – probably irritated by the seemingly endless series of 'Promoted Ads'. Scroll down a bit and the first 'Promoted Ad' will always appear quite soon.
Yes, LinkedIn claims that you can adjust some settings, but it never seems to have any effect.

What to do now, you might ask in some desperation?

Well, Mihail Marin has created a small app that is especially designed to block those pesky advertisements on LinkedIn. It's called SimplyFeed LinkedIn Filter and I can tell you that it works flawlessly.

The latest release of SimplyFeed is version 0.0.3 [26 June 2021].

What's new:
[Fix] Bug which let background colour of badge slip to its default. 

More info here. Get it for Firefox here and for Chrome here.

SpeedyFox: Speed-up your browser

Your browser will start working much more slowly over time. The reason is the continuous fragmentation of profile databases, the SQLite-databases.

With the passage of time SQLite- databases considerably slow down. As a result, it takes more and more time to start apps that use such databases and the overall speed is affected.
Enter SpeedyFox.

SpeedyFox is a small tool that is able to fix the problem with a single click. After optimizing your browser with this tool, it will get a fresh newly-installed feel because the speed will have increased considerably. Sometimes, you will even get an up to three times faster startup speed, browsing history will become faster, and performing operations with cookies will be quicker than before.

SpeedyFox compacts those databases without the loss any data. Databases are decreased in size, therefore they are optimized to operate faster.

The latest release of SpeedyFox is version 2.0.30 [9 October 2020].

What's new:
[New] App icon
[Improved] QLite engine updated to 3.33.2

More info and download here.

Enroll in Windows Insider Program: OfflineInsiderEnroll

OfflineInsiderEnroll is a .cmd script that allows you to join the Windows Insider Program, but without the need to sign in to your Microsoft account.
The Windows Insider Program is free, but designed for advanced users who are willing to test upcoming features of Windows. It would thus be best if you did not use Windows Insider on your everyday computer, but instead use a virtual machine like VMware Player.

To use OfflineInsiderEnroll, simply extract the files from the portable zip. Then, right-click on OfflineInsiderEnroll.cmd, and click 'Run as administrator'.

Click on one of the following and press 'Enter':
1 - Enroll to Dev channel
2 - Enroll to Beta channel
3 - Enroll to Release Preview Channel (safest)
4 - Stop receiving Insider Preview Builds
5 - Quit without making changes

This script takes advantage of undocumented TestFlag registry values and may or may not work in the future should Microsoft decide to close this loophole.

The latest release of 'OfflineInsiderEnroll' is version 2.6.4 [13 March 2023].

What's new:
- Updated: Added Canary Channel.

Download the latest version of OfflineInsiderEnroll here.

Maximize your Windows Defender: ConfigureDefender

Windows Defender is Microsoft’s anti-malware program. It is an integral security component of Microsoft’s latest operating system. It offers a suite of anti-malware tools that are enabled by default when Windows 10 is installed and booted up.

Windows Defender has evolved to become a true rival to other anti-malware-programs. With cloud-powered protection, real-time analytics, and the ability to remove detected malware threats, Windows Defender is no cyber security weakling.
However, Microsoft Defender has many advanced hidden features that allow you to customize how the security software works. Unfortunately, most people do not know these settings exist or even how to access them.

ConfigureDefender is a small utility for configuring Windows Defender settings. The program comes with a rather rugged interface that consists of a single window where you can preview the main settings of Windows Defender. From here, you can easily enable or disable various behaviours of Windows Defender, namely the real-time monitoring, behaviour monitoring, block at first sight, whether all downloads should be scanned, script scanning and PUA protection. At the same time, you can control if the tool should automatically send a sample to Microsoft as well as the Reporting level for those with MAPS membership levels.

ConfigureDefender will prove to be useful for those that would like to get the most significant benefits out of Windows Defender so that you can be fully protected. This ability will be especially true if you happen to be using Windows Defender as your primary antivirus option.

The latest release of the 'ConfigureDefender' is version 4.0.1.1 beta [12 July 2024].

What's new:
- Added two new ASR rules.
- Some corrections in the help files and manual.

Download the latest version of ConfigureDefender here.

[Fix] Blue light from your computer

Until recently, the sun was the only real source of lighting and people spent their evenings in (relative) darkness. Now, in much of the world, evenings and nights are very illuminated.

But there's a dark side to all this light. At night, light throws the body's biological clock - your circadian rhythm - out of sync and sleep suffers. Research also shows that it may contribute to the causation of depression, diabetes, hypertension, obesity, and cancer[1].
White light consists of all colours of the rainbow. Blue light boosts attention, reaction times, and mood and is therefore the most disruptive at night. And the proliferation of electronics with screens, as well as energy-efficient lighting, is increasing our exposure to blue wavelengths, especially after sundown.

Especialy exposure to blue light suppresses the secretion of melatonin, a hormone that influences circadian rhythms. Thus, blue light interferes with your sleep and LED's produce more blue light than old-fashioned light bulbs.

Your computer screen emits large amounts of blue light. Working long and late hours behind your screen means that your sleep may suffer badly. In a perfect world, you’d start to avoid 'blue-enriched' light from screens four hours before bedtime.

So, what can be done about this problem. Some say you might want to start wearing blue-light-filtering glasses, but these aren't very practical.

Windows 10 has a new feature called 'Night Light' that allows you to filter out blue light from your screen during the hours you determine.
How to eliminate blue light with Windows 10 Night Light
- Open the Start Menu.
- Click the gear icon to bring up the Settings Menu.
- Choose System.
- Select Display.
- Toggle the Night light switch to On.
- Click Night light settings to adjust the level of blue displayed  (or determine the time for Night Light to activate automatically).

[1] Hatori et al: Global rise of potential health hazards caused by blue light-induced circadian disruption in modern aging societies in Aging and mechanisms of disease – 2017

Earnings Notifier 1.29

Idea: Fred de Vries
Development: The SZ Development
See your current earnings and get notified if you receive new earnings from Google AdSense, Amazon Associates and bol.com.

A tray icon constantly shows your current balance or your earnings. If your earnings change, a tooltip and a sound will notify you.

The latest release of our 'Earnings Notifier' is version 1.29 [02 July 2025].

What's new:
- [Fixed] AdSense login working again. AdSense changed their login and logout URLs.

More info and download here.

If you are interested in translating the program or have ideas on how to improve our 'Earnings Notifier' with new features, please contact the developer.

PUMs, PUOs, PUPs and More

Modern antimalware products do not only try to protect you from viruses, worms, trojans, RATs and ransomware, but also from programs that behave in a undesirable way. Some try to scare you into buying their pro-version, others secretly install programs you never wanted to install in the first place.

There are many sinister-sounding acronyms floating around the Internet. What do they all mean?

Enter: A GLOSSARY

BYOVD [Bring Your Own Vulnerable Driver]
- BYOVD is an adversarial technique where attackers implant a vulnerable legitimate driver into a targeted system. They then exploit the vulnerable driver to perform malicious actions.

MUNG [Mash Until No Good] - A term coined in 1960 to describe for a series of potentially destructive or irrevocable changes to a piece of data or a file.

PHO [Potentially Hazardous Object] - PHOs are Near-Earth Objects – either asteroids or comets – with an orbit that can make exceptionally close approaches to the Earth and large enough to cause significant damage in the event of impact. See here.

PIR [Poor Industry Reputation] - Software that has a poor industry reputation because other programs made by a particular company use your device to mine cryptocurrency, display ads, promotions or survey prompts.

PSA [Potentially Suspicious Application] - PSAs are programs compressed with packers or protectors, which are exploited by malware authors to evade detection. The term was coined by the people from ESET's Antivirus.

PUFT [Potentially Unsafe File Types] - PUFTs are types of files that can contain programs or commands, and which can, if opened or run, make changes to your system. Because of this ability, these files are potentially 'unsafe'. Examples include program files (*.exe), batch files (*.cmd and *.bat) and script files (*.vbs and *.js). Open these files with caution.

PUA [Potentially Unwanted Application] - PUAs are essentially the same as PUPs. See there.

PUC [Potentially Unsafe Component] - A term coined by Java. Java Web Start applications and applets sometimes contain components that could potentially be unsafe. When a program contains such components, a warning dialog is raised.

PUC [Potentially Unwanted Content] - A term coined by ESET. Websites that have a reputation for promoting PUAs or that have a reputation for misleading users into performing actions that might have negative implications on their system or browsing experience will be blocked by ESET's Antivirus as potentially unwanted content.

PUM [Potentially Unwanted Modification] – PUMs are modifications of your settings to re-direct your browser to another website. This website might simply exist to generate income via ads, but also to harvest your login and password to empty your bank account.

PUO [Potentially Unwanted Optimizer] – PUOs are programs that purport to optimize your computer, such as registry cleaners, registry optimizers or driver updaters. Usually there's very little increase in performance, but they could damage your computer so badly as to require a re-installation of the operating system.

PUP [Potentially Unwanted Program] – PUPs are unwanted software programs often installed along with legitimate applications (piggybacked). They can be spyware or adware programs. Some may simply display annoying advertisements, while others may run background processes that cause your computer to slow down. As most users download and install these programs (un)willingly, McAfee coined the term to avoid labeling such programs as malware. However, the term is often seen as a euphemism for malware since most users want to remove PUPs immediately after they have been installed. 

PUS [Potentially Unwanted Software] - This acronym can be used to describe any type of software that is unwanted. It can be used for many of the above.

UAP [Unidentified Anomalous Phenomenon] - This acronym is a catch-all term to describe objects detected in the air, sea and space that defy easy explanation. It was preceded by UFO [Unidentified Flying Object]. The acronym UAP originally stood for 'Unidentified Aerial Phenomenon' until December 2022, when the Pentagon updated its terminology to encompass 'submerged and trans-medium objects'.

PAR [Prevention and Removal]
How do you remove these pesky programs from your computer, you might ask.

Well, the first line of defense is always an up-to-date antivirus program, such as Windows Defender (which is free).

You might also give the Malwarebytes AdwCleaner a whirl to remove all those unwanted PUAs, PUMs, PUOs, PUPs, and more.

How to update your Java Runtime Environment

While most people who view security of the utmost importance think that you should ditch Java Runtime Environment (JRE), most of us still have JRE installed. So, if you have JRE installed, what is the best way to protect your computer and your privacy? The answer is, of course, to keep JRE updated at all times.

The question is therefore: how do you update your JRE? The answer is quite simple, because you can instruct your JRE to update automatically.

How to update your Java Runtime Environment:
[1a] In Windows 10: Goto 'Start' and then 'Java'
[1b] In Windows 11: Goto 'Start' and then type 'Java' in the search bar
[2] Hitting 'Java Update' will open the 'Java Control Panel'
[3] Goto 'Update'
[4] Check 'Check for updates automatically'
[5] Goto 'Advanced'
[6] Check 'Weekly' plus your preferred time of checking

How to enable Windows 11 Limited Periodic Scanning

Even if you are not using Windows Defender as your (primary) antivirus program on Windows 10, you can still enable Limited Periodic Scanning.

Thus you can get a 'second opinion' by simply using the Limited Periodic Scanning feature of Windows Defender.

- Navigate to Settings > Update & Security > Windows Defender.
- Turn Limited Periodic Scanning on.
When a threat is found, Windows Defender will notify you with a Windows 10 notification. In most cases, Windows Defender will also automatically take action on the threat. Clicking on the notification will open Windows Defender where you can further review the threat that was found and the action that was automatically taken.

If you are already using Windows Defender as your antivirus program on Windows 10, then you already have this feature enabled. Windows Defender periodically scans your PC, also known as Scheduled scans.

How to change the search engine in Microsoft Edge

Microsoft Edge comes with Microsoft's own default search engine, Bing.com. That's not a problem if you like Bing but it is if you want another search engine, such as Google.

The solution is a bit elaborate.

- Open Microsoft Edge and goto 'Google.com'
- Select the “…” more menu in the top right corner
- Select Settings from the menu
- Scroll down to “View advanced settings” and hit the button
- Scroll down to “Search in the address bar with” and hit the button
- Choose “Add new” - You'll now see a list of available search engines
- Choose “Add as default”