Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Tamper Protection for Microsoft Defender on Windows 10 [Part 1]
  • Synology Wi Fi CC400W
    Review of the Synology CC400W Installation and Configuration Network | Monitoring
  • FEATUREDC
    How to create Confidential VMs in Azure AWS/Azure/OpenShift
  • wds
    What are the differences between Lite-Touch and Zero-Touch installation? Windows
  • spell
    Disable Cloud-Based Spell Checker in Microsoft Edge and Google Chrome Windows
  • FimageUbuntuUpgrade
    How to Upgrade From Ubuntu 20.04 LTS to 22.04 LTS Linux
  • How to stop remove and manage docker container
    Stopping, Removing and Naming Docker Container Containers
  • Disable and Enable USB in Windows
    Disable and Enable USB Usage for Certain Users in Windows Windows
  • original 1
    DISM “Failed to open image” CWimImageInfo Mount(hr:0x8007000d): Fix Error DISM WIM Provider Windows

Tamper Protection for Microsoft Defender on Windows 10 [Part 1]

Posted on 04/07/202211/12/2023 Matthew By Matthew No Comments on Tamper Protection for Microsoft Defender on Windows 10 [Part 1]
Featured-image

When hackers or bad actors attack, they attempt to disable security measures on your systems, such as antivirus protection. Bad actors like to disable your security measures to gain easy access to your data, install malware, or otherwise abuse your data, identity, and devices. In this article, you will learn how to Tamper Protection for Microsoft Defender on Windows 10 [Part 1]. Please see New Windows 11 encryption features and security enhancements will help protect hybrid work, and Files On-Demand with OneDrive: Microsoft OneDrive Setup On Windows 10 and 11 and Key Features Explained.

Tamper protection helps in the prevention of such incidents. According to Microsoft, tamper protection blocks malicious programs from doing acts such as Disabling virus and threat protection, disabling real-time protection, turning off behaviour monitoring, disabling antivirus protection, such as IOfficeAntivirus (IOAV), disabling cloud-delivered protection, removing security intelligence updates, disabling automatic actions on detected threats, and suppressing notifications in the Windows Security app.

Here are other related guides: Microsoft Endpoint Manager: How to manage safety system with Group Policy and Microsoft threats safety via the Command Line Utility, Smart App Control and how to enable Phishing safety: Windows 11 New safety Features,

How Windows Tamper Protection Works

Tamper protection locks Microsoft Defender Antivirus to safe settings, preventing modification by programs or techniques like:

  • Using Registry Editor to alter settings on your Windows device
  • Modifying settings with PowerShell cmdlets
  • Changing or deleting security settings using Group Policy

You may still see your security settings despite tamper protection. Furthermore, tampering prevention has no effect on how non-Microsoft antivirus software register with the Windows Security app.

Individual users cannot modify the tamper protection setting if your business is running Windows 10 Enterprise E5; in those circumstances, tamper protection is controlled by your security team.

Ways to enable tamper protection in windows

There may be a reliance on cloud-delivered protection based on the method or management tool you select to provide tamper prevention. Cloud security is cloud protection or Microsoft Advanced Protection Service (MAPS).

The table below contains information on the techniques, tools, and dependencies.

How tamper protection is enabledDependency on cloud protection
Microsoft IntuneNo
Microsoft Endpoint Configuration Manager with Tenant AttachNo
Microsoft 365 Defender portal (https://security.microsoft.com)Yes

How to enable tamper protection on an individual device

If you are using a personal system that is not subject to settings managed by an organization’s security team, you can manage tamper protection using the Windows Security app. To update security settings such as tamper protection, you must have proper admin permissions on your device.

Press the Windows key to open Start menu, then type Windows Security and select the result that best match your search.

Security

You may be prompted to enable Tamper Protection. To enable it, simply click “Turn On.” If not, click the “Virus & threat protection” icon.

Antivirus

Click the “Manage Settings” link under Virus & threat protection settings.

Windows Defender

Locate the Tamper Protection option and toggle it from “Off” to “On.”

Malware Protection

How to Turn on Tamper Protection in Registry

The registry can also be used to enable this setting. It can be found under the following key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features
Security

Double-click on TamperProtection and set its value data to 0 or 1 to enable or disable it.

How to turn it on (or off) in the Microsoft 365 Defender portal

1: Go to the Microsoft 365 Defender portal (https://security.microsoft.com) and sign in.
2: Choose Settings > Endpoints.
3: Go to General > Advanced features, and then turn tamper protection on.

image3

How to turn it on (or off) in Microsoft Endpoint Manager

The Microsoft 365 Defender Portal allows users to update this setting globally. This has an impact on all devices linked with that tenant.

On the client, the relevant option in the Settings app is grayed out, preventing local administrators from changing it.

  1. Navigate to Endpoint security > Antivirus in the Microsoft Endpoint Manager admin center, and then select Create Policy.
    • Select Windows 10 and later from the Platform list.
    • Select Windows Security experience from the Profile list.
  2. Create a profile that includes the following settings: To prevent Microsoft Defender being disabled, enable Windows 10 Safety Enhancer: Enable
img6-1
  1. Assign the profile to one or more groups.

If you don’t want to toggle Windows Windows 10 Safety Enhancer on and off globally, you can utilize Intune or Configuration Manager 2006 with tenant attach. Specific devices can thus be addressed in a targeted manner.

I hope you found this article useful on Tamper Protection for Microsoft Defender on Windows 10 [Part 1]. Please feel free to leave a comment below.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Defender, Microsoft Defender Antivirus, Microsoft Windows, MicrosoftDefender, office365, RegistryEditor, Windows 10, Windows 11, Windows Defender, Windows Defender Antivirus, Windows Server 2016

Post navigation

Previous Post: How to Reset Services Restore Mode (DSRM) Password
Next Post: Install AnyDesk on Windows for remote Connections

Related Posts

  • images
    How to perform vulnerability scan on Microsoft SQL Server Security | Vulnerability Scans and Assessment
  • Turn On Or Off Auto Unlock For BitLocker Drive
    How To Turn On Or Off Auto-Unlock For BitLocker Drive In Windows 10/11 Security | Vulnerability Scans and Assessment
  • Featured image Periodic scanning
    How to enable or disable Windows Defender Antivirus Scanning periodically on Windows via Windows Settings Security | Vulnerability Scans and Assessment
  • azure just in time
    How to secure access to your Virtual Machine with Just-in-Time (JIT) VM Access AWS/Azure/OpenShift
  • 5rgh65436
    New Windows 11 encryption features and security enhancements for Hybrid Work Security | Vulnerability Scans and Assessment
  • Set Microsoft Defender AV to Passive mode on a Windows Server
    Set Microsoft Defender AV to Passive mode on a Windows Server Security | Vulnerability Scans and Assessment

More Related Articles

images How to perform vulnerability scan on Microsoft SQL Server Security | Vulnerability Scans and Assessment
Turn On Or Off Auto Unlock For BitLocker Drive How To Turn On Or Off Auto-Unlock For BitLocker Drive In Windows 10/11 Security | Vulnerability Scans and Assessment
Featured image Periodic scanning How to enable or disable Windows Defender Antivirus Scanning periodically on Windows via Windows Settings Security | Vulnerability Scans and Assessment
azure just in time How to secure access to your Virtual Machine with Just-in-Time (JIT) VM Access AWS/Azure/OpenShift
5rgh65436 New Windows 11 encryption features and security enhancements for Hybrid Work Security | Vulnerability Scans and Assessment
Set Microsoft Defender AV to Passive mode on a Windows Server Set Microsoft Defender AV to Passive mode on a Windows Server Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Synology Wi Fi CC400W
    Review of the Synology CC400W Installation and Configuration Network | Monitoring
  • FEATUREDC
    How to create Confidential VMs in Azure AWS/Azure/OpenShift
  • wds
    What are the differences between Lite-Touch and Zero-Touch installation? Windows
  • spell
    Disable Cloud-Based Spell Checker in Microsoft Edge and Google Chrome Windows
  • FimageUbuntuUpgrade
    How to Upgrade From Ubuntu 20.04 LTS to 22.04 LTS Linux
  • How to stop remove and manage docker container
    Stopping, Removing and Naming Docker Container Containers
  • Disable and Enable USB in Windows
    Disable and Enable USB Usage for Certain Users in Windows Windows
  • original 1
    DISM “Failed to open image” CWimImageInfo Mount(hr:0x8007000d): Fix Error DISM WIM Provider Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,839 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.