Skip to content

Disable Windows Defender - Revisit Service List #303

@sickypedia

Description

@sickypedia

Hello, I understand defender is disabled in windowsPE phase through the vbs script created by the synchronous commands, which honestly I'd like to say is genius! Thanks for incorporating this.

I see the service list which we're disabling are
Sense, WdBoot, WdFilter, WdNisDrv, WdNisSvc, WinDefend

I could see one more which seems related - "MDCoreSvc"
"C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.25080.5-0\MpDefenderCoreService.exe"

Should we include this as well in the DisableDefender.vbs? It is very likely that defender isn't actually functional because of the other 6 services being disabled, but I'd like the list to be exhaustive.

Also, are you inclined to include the following registry edits to also Disable Virtualization Based Security, Credential Guard, HVCI, and LSASS Protection as these go together with disabling defender?

Disable VBS

New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name "EnableVirtualizationBasedSecurity" -PropertyType DWord -Value 0 -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name "RequirePlatformSecurityFeatures" -PropertyType DWord -Value 0 -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard" -Name "HyperVVirtualizationBasedSecurityOptOut" -PropertyType DWord -Value 1 -Force

Disable Credential Guard

New-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\CredentialGuard" -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\CredentialGuard" -Name "Enabled" -PropertyType DWord -Value 0 -Force

Disable HVCI (Memory Integrity)

New-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity" -Name "Enabled" -PropertyType DWord -Value 0 -Force

Disable LSA Protection - Runtime setting

New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "LsaCfgFlags" -PropertyType DWord -Value 0 -Force
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" -Name "RunAsPPL" -PropertyType DWord -Value 0 -Force

Disable LSA Protection - Group Policy setting

New-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard" -Force
New-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceGuard" -Name "LsaCfgFlags" -PropertyType DWord -Value 0 -Force

Disable Vulnerable Driver Blocklist

New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\CI\Config" -Name "VulnerableDriverBlocklistEnable" -PropertyType DWord -Value 0 -Force

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions