-
-
Notifications
You must be signed in to change notification settings - Fork 151
Description
Hello, I understand defender is disabled in windowsPE phase through the vbs script created by the synchronous commands, which honestly I'd like to say is genius! Thanks for incorporating this.
I see the service list which we're disabling are
Sense, WdBoot, WdFilter, WdNisDrv, WdNisSvc, WinDefend
I could see one more which seems related - "MDCoreSvc"
"C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.25080.5-0\MpDefenderCoreService.exe"
Should we include this as well in the DisableDefender.vbs? It is very likely that defender isn't actually functional because of the other 6 services being disabled, but I'd like the list to be exhaustive.
Also, are you inclined to include the following registry edits to also Disable Virtualization Based Security, Credential Guard, HVCI, and LSASS Protection as these go together with disabling defender?
Disable VBS
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name "EnableVirtualizationBasedSecurity" -PropertyType DWord -Value 0 -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name "RequirePlatformSecurityFeatures" -PropertyType DWord -Value 0 -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name "HyperVVirtualizationBasedSecurityOptOut" -PropertyType DWord -Value 1 -Force
Disable Credential Guard
New-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\CredentialGuard" -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\CredentialGuard" -Name "Enabled" -PropertyType DWord -Value 0 -Force
Disable HVCI (Memory Integrity)
New-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" -Name "Enabled" -PropertyType DWord -Value 0 -Force
Disable LSA Protection - Runtime setting
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "LsaCfgFlags" -PropertyType DWord -Value 0 -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "RunAsPPL" -PropertyType DWord -Value 0 -Force
Disable LSA Protection - Group Policy setting
New-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard" -Force
New-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard" -Name "LsaCfgFlags" -PropertyType DWord -Value 0 -Force
Disable Vulnerable Driver Blocklist
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\CI\Config" -Name "VulnerableDriverBlocklistEnable" -PropertyType DWord -Value 0 -Force