Open Cassandre60 opened 4 months ago
Great bug report @Cassandre60. A lot of useful information. I will do some research and adding disabling of these services.
I will also increase the aggressiveness by disabling and block execution of executables of this services.
These should help with this issue.
We have #170, but it's not as helpful and concrete as this report which gives me the technical details to be able to go further.
Please keep in mind that these changes will not be fast, so no timelines promised, but hopefully in next patch release.
I will share the code with you once its ready to test if they help with getting rid of these processes/services.
Thanks for the quick reply, no problems on the timeline, just appreciate the work you and your colleagues are doing.
You could also try "Defender Remover" by ionuttbara (https://github.com/ionuttbara/windows-defender-remover)
only make sure that you disable "Tamper Protection" and all realtime protection in Windows Defender before running it.
My defender is maybe disabled by like 95%, so I'm afraid to mess things up now, since I'm a normal user. On my task manager smartscreen.exe, Windows Defender SmartScreen takes 0% CPU and around 1.5 MB of RAM and MpDefenderCoreService.exe Antimalware Core Service takes 0% CPU and 5.5MB of RAM, so I'm pretty satisfied with what I have. I'll consider your script on a new install, maybe. Btw, I'm on Windows 11 IoT Enterprise LTSC.
Hi,
This should successfully get rid of smartscreen.exe
:
Please test this and let me know if worked. It should persist against reboots. I will add it in next patch if you confirm it works.
I just applied the tool provided by @Silver347, and it removed all the residue, thanks for the suggestion nonetheless.
I'd be happy if anyone else who did not apply any other third party tool give feedback on this to move this issue and solution forward.
Hi @undergroundwires,thanks for the reply,excuse me for my poor language skills.
First of all I'd like to thank you sincerely for devoting your free time to create this awesome customizable script and I apologize for not really providing any scripted solution for the problem mentioned in the post but instead relying on someone elses project,
The truth is I have no coding skills and as far as I've seen this software (which I recommended) completely removes Windows Defender entirely...which is a problem since there is no way to revert any of this once it's applied.
This script also disables some security mitigations (which I believe are Spectre and Meltdown at the OS level,VBS,UAC) which is not ideal...and I shouldn't have honestly recommended it in the first place.
Most of (if not all of it) are registry tweaks inside the .exe file which can be unziped with any archiving tool such as (WinRAR,7-Zip etc.),which can be used to further improve the project...and again I apologize for not offering any proper solution.
More aggressive SmartScreen disabling will be released as part of next patch.
The code above should get rid of smartscreen.exe
.
Using similar way, we can get rid of MpDefenderCoreService.exe
, i.e., MDCoreSvc
(Microsoft Defender Core Service).
It works according to my tests. I'd be happy if someone (running with latest updates) can this and verify that it works.
Note:, According to my tests disabling this service through reg add "HKLM\System\CurrentControlSet\Services\MDCoreSvc" /v "Start" /t "REG_DWORD" /d "4" /f
as administrator or TrustedInstaller does not working, resulting in permission error. The above method should work.
As next step I will look at: webthreatdefusersvc
and WinDefend
.
@Silver347, thank you for your such a nice comment. It's appreciated that you share knowledge, and it's expected for users to know what they're doing with third party tools.
@undergroundwires Sorry for off-topic but, the third-party project mentioned above has tons of Registry tweaks, I'm sure you'll find it useful (by merging codes from that project to yours) Just saying, maybe some lines of codes aren't implemented completely? It would be great if you check that out. https://github.com/ionuttbara/windows-defender-remover/tree/main
@femdiya,
There are various attempts to disable Defender in the wild, but privacy.sexy stands out due to the following:
I prefer not to incorporate other projects. Privacy.sexy is used by many non-tech-savvy users, and experimental security modifications without a solid basis is dangerous. Additionally, there are licensing issues that I’d like to avoid.
However, I would appreciate it if you or anyone else could:
You don’t need to be tech-savvy or a developer to contribute. You can use language models or search engines. If you find that privacy.sexy is missing a configuration or not functioning correctly, create an issue for that. This approach helps us track, manage, and implement necessary changes efficiently. Here’s how you can contribute effectively:
This kind of contribution would be appreciated by many and be very useful to the community. This way, we can work together to improve privacy.sexy in a way it meets our quality standards and goals.
Thank you for your understanding and support ❤️
@undergroundwires Seems nice, I've already found some tweaks related to defender that is not implemented in this project, I'll open a "New Script" for probably all of them. Also I'll try to explain most of the commands and tweaks as much as possible.
After I disabled Defender using the 1100 lines script generated by privacy.sexy, I still have : +webthreatdefusersvc_4549a, Web Threat Defense User Service_4549a +WinDefend, Microsoft Defender Antivirus Service +MDCoreSvc, Microsoft Defender Core Service still running.
I did mention some services to be disabled in future updates in following issue created by me: #402 "Additional information -> SIDE NOTE 2" It includes MDCoreSvc and WinDefend too
Description
After I disabled Defender using the 1100 lines script generated by privacy.sexy, I still have : +webthreatdefusersvc_4549a, Web Threat Defense User Service_4549a +WinDefend, Microsoft Defender Antivirus Service +MDCoreSvc, Microsoft Defender Core Service still running.
Is this normal/expected behavior, or does this mean that Windows Defender is still enabled? I'm new to this space of privacy/debloating, so I might get some things wrong.
Reproduction steps
In privacy.sexy, check windows defender and then click run script.
Expected behavior
For Defender to be completely removed.
Screenshots
No response
privacy.sexy environment details
No response
Additional context
In powershell, Get-MpComputerStatus | select AMRunningMode returns AMRunningMode
Normal which as far as I know means Defender is still running.