This message was deleted.
# _general
s
This message was deleted.
n
I'm not sure if it'd be the same for LTSC, but this is what I used to do for W10 1909-22H2: In my sealing script, run the following:
Copy code
# Disabling Windows Defender
New-ItemProperty "HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender\" -Name "DisableAntiSpyware" -Value 0x1 -PropertyType "DWORD" -Force

# Disabling the Windows Defender Security Center icon
Remove-ItemProperty -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run -Name "SecurityHealth" -Force
In GPO, disable the following (see attachment)
That said, I seem to recall having to manually disable tampering in Defender in the master image via PS at one point. Trying to find my notes on that piece.
Found them: Required for 20H2 and above, and must be run whenever an OS layer is edited · Click on Virus & threat protection · Under Virus & threat protection settings, click on Manage settings · Turn off Tamper Protection and close the two Settings dialog boxes
We were an App Layering shop, but this would apply to traditional master images, too.
d
Thanks a lot Nick! Will try that. App Layering is indeed involved, see https://worldofeuc.slack.com/archives/CKBV38LD7/p1704798518008079 TM Support complained that msmpeng.exe is running in the Image.
@Nick Panaccio So the registry Part ist done in Sealing for the App Layer, the GPO is applied to the VDAs and the manual part is done in the OS Layer?
n
Yep, that's exactly how I handled it. Always gotta use the OS layer for Defender because of how it's integrated (IMO).
r
The last time I did it I used this guide which works the best. I know this is for Windows 11 but it will work on Windows 10.

https://youtu.be/81l__vvGnjA?si=CkCeTsHscaI6NpwB