mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 14:23:38 +00:00
tamper protection updates
This commit is contained in:
Binary file not shown.
After Width: | Height: | Size: 142 KiB |
Binary file not shown.
@ -39,6 +39,10 @@ Recent updates to tamper protection include integration with [Threat & Vulnerabi
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
In the results, you can select Turn on Tamper Protection.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## How it works
|
## How it works
|
||||||
|
|
||||||
Tamper protection essentially locks Windows Defender Antivirus and prevents your security settings from being changed through apps and methods like these:
|
Tamper protection essentially locks Windows Defender Antivirus and prevents your security settings from being changed through apps and methods like these:
|
||||||
@ -57,6 +61,13 @@ Tamper protection doesn't prevent you from viewing your security settings. And,
|
|||||||
|
|
||||||
## Turn tamper protection on (or off) for an individual machine
|
## Turn tamper protection on (or off) for an individual machine
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Tamper protection blocks attempts to modify Windows Defender Antivirus settings through the registry.
|
||||||
|
>
|
||||||
|
> To help ensure that tamper protection doesn’t interfere with third-party security products or enterprise installation scripts that modify these settings, go to **Windows Security** and update **Security intelligence** to version 1.287.60.0 or later. (See [Security intelligence updates](https://www.microsoft.com/wdsi/definitions).)
|
||||||
|
>
|
||||||
|
> Once you’ve made this update, tamper protection will continue to protect your registry settings, and will also log attempts to modify them without returning errors.
|
||||||
|
|
||||||
If you are a home user, or you are not subject to settings managed by a security team, you can use the Windows Security app to turn tamper protection on or off. You must have appropriate admin permissions on your machine to perform the following task.
|
If you are a home user, or you are not subject to settings managed by a security team, you can use the Windows Security app to turn tamper protection on or off. You must have appropriate admin permissions on your machine to perform the following task.
|
||||||
|
|
||||||
1. Click **Start**, and start typing *Defender*. In the search results, select **Windows Security**.
|
1. Click **Start**, and start typing *Defender*. In the search results, select **Windows Security**.
|
||||||
@ -65,13 +76,23 @@ If you are a home user, or you are not subject to settings managed by a security
|
|||||||
|
|
||||||
3. Set **Tamper Protection** to **On** or **Off**.
|
3. Set **Tamper Protection** to **On** or **Off**.
|
||||||
|
|
||||||
> [!NOTE]
|
### Are you using Windows OS 1709?
|
||||||
> Tamper protection blocks attempts to modify Windows Defender Antivirus settings through the registry.
|
|
||||||
>
|
|
||||||
> To help ensure that tamper protection doesn’t interfere with third-party security products or enterprise installation scripts that modify these settings, go to **Windows Security** and update **Security intelligence** to version 1.287.60.0 or later. (See [Security intelligence updates](https://www.microsoft.com/wdsi/definitions).)
|
|
||||||
>
|
|
||||||
> Once you’ve made this update, tamper protection will continue to protect your registry settings, and will also log attempts to modify them without returning errors.
|
|
||||||
|
|
||||||
|
If you are using Windows OS 1709, you won't have the Windows Security app. In this case, the one of the following procedures to determine whether tamper protection is enabled.
|
||||||
|
|
||||||
|
#### To determine whether tamper protection is turned on by using PowerShell
|
||||||
|
|
||||||
|
1. Open the Windows PowerShell app.
|
||||||
|
2. Use the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) PowerShell cmdlet.
|
||||||
|
3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.)
|
||||||
|
|
||||||
|
#### To determine whether tamper protection is turned on by viewing a registry key
|
||||||
|
|
||||||
|
1. Open the Registry Editor app.
|
||||||
|
2. Go to **HKEY_LOCAL_MACHINE** > **SOFTWARE** > **Microsoft** > **Windows Defender** > **Features**.
|
||||||
|
3. Look for an entry of **TamperProtection** of type **REG_DWORD**, with a value of **0x5**.<br/>
|
||||||
|
- If you see **TamperProtection** with a value of 0, tamper protection is not turned on.
|
||||||
|
- If you do not see **TamperProtection** at all, tamper protection is not turned on.
|
||||||
|
|
||||||
## Turn tamper protection on (or off) for your organization using Intune
|
## Turn tamper protection on (or off) for your organization using Intune
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user