Hi @ADV-8837,
Welcome to Microsoft Q&A forum.
Thank you for your detailed inquiry. Regarding your observation about registry retention, here are the specific technical reasons and solutions.
1/ Reason for registry retention
The command netsh wlan delete profile communicates exclusively with the WLAN AutoConfig Service. Its purpose is to remove the connection credentials (SSID and password). However, the registry keys you identified belong to the Network List Service. Windows retains these entries to preserve the network’s firewall categorization (Public vs. Private) and identification history. This ensures that if you reconnect later, your security settings are automatically restored.
2/ Methods for complete removal
There is no single native command in Windows that purges both the connection profile and the Network List registry history simultaneously. To remove all traces, you must perform a two-step process: first, use netsh to delete the profile, and second, manually delete the specific keys or utilize a PowerShell script to locate and remove the associated Profile GUIDs and Signatures from the registry.
3/ Additional registry locations
Your paths cover the standard Network Location Awareness (NLA) artifacts. In addition to HKLM\...\Signatures\Unmanaged, also check HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\Managed, which is the counterpart category used for domain-classified networks. Also check HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles, because that’s where Windows stores per-interface profile details and the effective category/authentication-related state linked by ProfileGuid.
I hope this clarifies the system behavior. Should you have any further questions, please feel free to reach out.