2022-10-26 19:26:55 +00:00
@ setlocal enableextensions enabledelayedexpansion
@ echo off
rem Make sure we're running as admin. Got this garbage from https://stackoverflow.com/a/40388766
if not " %1 " == " am_admin " (
powershell -Command " Start-Process -Verb RunAs -FilePath ' %0 ' -ArgumentList 'am_admin' "
exit /b
)
rem USE AT OWN RISK AS IS WITHOUT WARRANTY OF ANY KIND !!!!!
rem
rem Modified version of
rem https://raw.githubusercontent.com/mattreecebentley/win10_disable_defender/main/win10_enable_defender.bat
rem https://gist.github.com/xezrunner/a7a42dbc1096a40b0c78f09488fe5a2b
rem
rem Resources:
rem https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=win10-ps
rem https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection
rem https://github.com/AndyFul/ConfigureDefender
rem https://github.com/AndyFul/Hard_Configurator
2022-10-27 20:36:07 +00:00
echo .
2022-10-26 19:26:55 +00:00
echo Enabling Windows Defender
reg query HKLM\SYSTEM\Setup /v DisabledDefenderServices | find " 0x0 "
if %errorlevel% == 0 goto already_patched
reg delete " HKLM\Software\Policies\Microsoft\Windows Defender " /f
reg add " HKLM\Software\Microsoft\Windows\CurrentVersion\Run " /v " SecurityHealth " /t REG_EXPAND_SZ /d " \ " %windir% \system32\SecurityHealthSystray.exe\" " /f
echo .
echo Restore WD shell
reg add " HKLM\Software\Classes\*\shellex\ContextMenuHandlers\EPP " /ve /t REG_SZ /d " {09A47860-11B0-4DA5-AFA5-26D86198A780} " /f
reg add " HKLM\Software\Classes\Drive\shellex\ContextMenuHandlers\EPP " /ve /t REG_SZ /d " {09A47860-11B0-4DA5-AFA5-26D86198A780} " /f
reg add " HKLM\Software\Classes\Directory\shellex\ContextMenuHandlers\EPP " /ve /t REG_SZ /d " {09A47860-11B0-4DA5-AFA5-26D86198A780} " /f
echo .
echo Enable WD services
reg add " HKLM\System\CurrentControlSet\Services\BFE " /v " Start " /t REG_DWORD /d " 2 " /f
reg add " HKLM\System\CurrentControlSet\Services\MpsSvc " /v " Start " /t REG_DWORD /d " 2 " /f
reg add " HKLM\System\CurrentControlSet\Services\SecurityHealthService " /v " Start " /t REG_DWORD /d " 2 " /f
reg add " HKLM\System\CurrentControlSet\Services\SgrmBroker " /v " Start " /t REG_DWORD /d " 2 " /f
reg add " HKLM\System\CurrentControlSet\Services\wscsvc " /v " Start " /t REG_DWORD /d " 2 " /f
reg add " HKLM\System\CurrentControlSet\Services\WdBoot " /v " Start " /t REG_DWORD /d " 2 " /f
reg add " HKLM\System\CurrentControlSet\Services\wdFilter " /v " Start " /t REG_DWORD /d " 2 " /f
reg add " HKLM\System\CurrentControlSet\Services\WdNisDrv " /v " Start " /t REG_DWORD /d " 2 " /f
reg add " HKLM\System\CurrentControlSet\Services\WdNisSvc " /v " Start " /t REG_DWORD /d " 2 " /f
reg add " HKLM\System\CurrentControlSet\Services\WinDefend " /v " Start " /t REG_DWORD /d " 2 " /f
echo .
echo 1 - Enable Logging
reg add " HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger " /v " Start " /t REG_DWORD /d " 1 " /f
reg add " HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger " /v " Start " /t REG_DWORD /d " 1 " /f
echo .
echo Enable WD Tasks
schtasks /Change /TN " Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh " /Enable
schtasks /Change /TN " Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance " /Enable
schtasks /Change /TN " Microsoft\Windows\Windows Defender\Windows Defender Cleanup " /Enable
schtasks /Change /TN " Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan " /Enable
schtasks /Change /TN " Microsoft\Windows\Windows Defender\Windows Defender Verification " /Enable
echo .
echo Setting various preferences
rem CloudExtendedTimeout / 1 - 50 / block a suspicious file for up to 60 seconds (Default is 10)
reg add " HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine " /v " MpBafsExtendedTimeout " /t REG_DWORD /d " 0 " /f
rem CloudBlockLevel / 0 - Default / 2 - High / 4 - High+ / 6 - Zero tolerance (block all unknown executables)
reg add " HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine " /v " MpCloudBlockLevel " /t REG_DWORD /d " 0 " /f
rem 1 - Potentially Unwanted Application protection (PUP) is enabled, the applications with unwanted behavior will be blocked at download and install-time
reg add " HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine " /v " MpEnablePus " /t REG_DWORD /d " 1 " /f
rem Block at First Sight / 0 - Enable / 1 - Disable
reg add " HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet " /v " DisableBlockAtFirstSeen " /t REG_DWORD /d " 0 " /f
rem Cloud-based Protection / 0 - Disable / 1 - Basic / 2 - Advanced
reg add " HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet " /v " SpynetReporting " /t REG_DWORD /d " 1 " /f
rem Send file samples when further analysis is required / 0 - Always prompt / 1 - Send safe samples automatically / 2 - Never send / 3 - Send all samples automatically
reg add " HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet " /v " SubmitSamplesConsent " /t REG_DWORD /d " 0 " /f
echo .
echo Attempting to enable Tamper Protection. If this fails then you need to do it manually.
reg add " HKLM\Software\Microsoft\Windows Defender\Features " /v " TamperProtection " /t REG_DWORD /d " 1 " /f
rem To prevent WD using too much CPU, add this file to the exclusion list:
rem C:\Program Files\Windows Defender\MsMpEng.exe
echo .
echo Attempting to exclude MsMpEng.exe to reduce CPU usage
reg add " HKLM\Software\Microsoft\Windows Defender\Exclusions\Paths " /v " C:\Program Files\Windows Defender\MsMpEng.exe " /t REG_DWORD /d " 0 " /f
echo .
echo Finishing up...
reg add HKLM\SYSTEM\Setup /v DisabledDefenderServices /t REG_DWORD /d 0 /f
echo Windows Defender has (hopefully) been enabled.
echo The Antimalware Service Executable should be active again.
echo Restart your computer to see all changes.
goto eof
: already_patched
echo Defender has already been enabled by this script.
: eof
2022-10-27 20:36:07 +00:00
echo .
2022-10-26 19:26:55 +00:00
pause