Seems M$ isn't being entirely open with its customers. Go to this M$ page and scroll down to Q21.
http://support.microsoft.com/?kbid=890830<snip>
Q21: Can I prevent this tool from sending information back to Microsoft?
A21: Yes. The reporting component can be disabled by setting a specific registry key. For additional information, click the
following article number to view the article in the Microsoft Knowledge Base:
891716 Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment
http://support.microsoft.com/kb/891716<snip>
Follow that link and scroll down to Q4
<snip>
Q4. How can I disable the infection reporting component of the tool so that the report is not sent back to Microsoft?
A4. An administrator can choose to disable the infection reporting component of the tool by adding the following registry key
value to computers. If this registry key value is set, the tool will not report infection information back to Microsoft.
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT\DontReportInfectionInformation with the value of "1". Note that this value
should be of type REG_DWORD.
This functionality is automatically disabled if the following registry key value exists:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\WUServer
This registry key value indicates that the computer is connected to a SUS server.
<snip>
"An administrator can choose to disable the infection reporting component"...WTF? The component needs a registry hack to disable
it? Excuse me? Oh, I forgot, everyone who has a computer can mess around with Regedit without even thinking about it (sarcasm) Typically sneaky. Read the small print methinks...always
edit: Looking at it some more. Not yet sussed whether this applies to networks only. But if it works on a networked 'puter it's likely to work on a stand-alone box. If anyone has the utility on their home PC look in the Registry; I don't have it installed.