New Windows 11 trick lets you bypass Microsoft Account requirement
A previously unknown trick lets you easily bypass using a Microsoft Account in Windows 11, just as Microsoft tries to make it harder to use local accounts.
Since the release of Windows 11, Microsoft has been increasingly closing loopholes and making it harder to use a local account in the operating system.
Instead, the company wants you to use a Microsoft Account, as many operating system features rely on cloud-based services.
Last week, Microsoft removed the 'BypassNRO.cmd' script from Windows 11 preview builds, which allowed users to bypass the Microsoft Account requirement when installing the operating system.
While the Registry commands used by the script still worked, it became less easy to add them, requiring users to type them out or manually edit the Registry.
On Saturday, X user "Wither OrNot" shared a much easier way to bypass Windows 11's Microsoft Account requirement, which BleepingComputer has confirmed to work.
When installing Windows 11 and you reach the screen asking, "Let's connect you to a network," you can use the Shift+F10 keyboard combination to open a Windows command prompt.
At this prompt, type start ms-cxh:localonly
and press Enter on your keyboard to open a "Microsoft account" window where you can create a new local user for the Windows 11 install.

After filling in the information and clicking the Next button, the Windows 11 setup will continue. However, now it will continue using your created local account and will not prompt you to use a Microsoft Account.
When done installing, you can confirm a local account is being used by clicking on the Start button and then clicking on your account name, as shown below.

As you can see, this command makes it much easier to use a local account when setting up Windows 11, even compared to the previous BypassNRO method.
Whether Microsoft will remove this command from Windows in the future is too early to tell.
However, as the start ms-cxh:localonly command appears to be more tightly integrated into the operating system, rather than just a script, it will likely be harder to remove.
Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks
Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
North Korean IT worker army expands operations in Europe
New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth
CVE-2025-22224 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability
CVE-2020-29574 CyberoamOS (CROS) SQL Injection Vulnerability
CVE-2025-2783 Google Chromium Mojo Sandbox Escape Vulnerability
CVE-2022-43939 Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability
CVE-2024-49035 Microsoft Partner Center Improper Access Control Vulnerability
CVE-2022-43769 Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability
CVE-2024-40890 Zyxel DSL CPE OS Command Injection Vulnerability
CVE-2025-24983 Microsoft Windows Win32k Use-After-Free Vulnerability
CVE-2017-0148 Microsoft SMBv1 Server Remote Code Execution Vulnerability
CVE-2024-20953 Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability
MediumFormat String Error
InformationalBase64 Disclosure in WebSocket message
InformationalSec-Fetch-Site Header Has an Invalid Value
InformationalInformation Disclosure - JWT in Browser sessionStorage
MediumBuffer Overflow
Free online web security scanner