Federated identity management using Active Directory Federation Services
Help identifying exploit of new devices initial setup of Windows 11
Purchased a MSI Crosshair 18HX AI from Costco, I connected to a home network for the initial setup, created a new login account with a new email. After login, I installed 'Harden System Security' and 'AppControl Manager' from the Microsoft playstore then disconnect ethernet. As soon as I began applying the restrictions and policies, many would quickly be reverted. There were tons of hidden bogus 'optional features' installed, fake certs, hijacked drivers OEM software. The system had been fully compromised during the installation. No devices had been connected, clouds synced, etc. I have all of the EventLogs and System Logs for analysist. I don't know how exactly the inner workings of a Windows network installation, but from what I can tell somehow the connection was hijacked to instead install a partial existing system with hardware specific drivers/exploitation tools. Payloads delivered via Remote Management, AppX and OneApp and Power Shell scripts for system elevated-privileges.
This is probably the wrong place to request support on this issue. I can provide more detail along with the systems logs, mem dumps, etc.