使用 Microsoft Defender 防病毒軟體,移除 DisableAntiSpyware 的影響僅限於 1903 之前的 Windows 10 版本。 這項變更不會影響 Windows 安全性應用程式的非Microsoft防毒連線。 這些連線仍會如預期般運作。 DisableAntiSpyware 會指定是否停用 Microsoft Defender 防病毒軟體。 Microsoft Defender 防病毒軟體是一種應用程式...
DisableAntiSpyware specifies whether to disable Windows® Defender. Windows Defender is an application that can prevent, remove, and quarantine malware (malicious software) and spyware.Values展開表格 true Disables Windows Defender. false Enables Windows Defender. This is the default value.Val...
如果没有“Windows Defender”文件夹,您需要右键点击“Microsoft”文件夹,选择“新建” -> “项”,命名为“Windows Defender”。 在“Windows Defender”文件夹中,右键点击空白处,选择“新建” -> “DWORD(32位) 值”,命名为“DisableAntiSpyware”。 双击“DisableAntiSpyware”,将数值数据设置为“1”,然后点击“...
结论:微软极力反对用户禁用其内置的Windows Defender防病毒软件,尽管存在临时关闭实时保护的限制,但自2020年8月更新后,通过注册表永久禁用的方式已被官方停止,"DisableAntiSpyware"设置将被忽略。即使如此,用户仍可通过组策略编辑器或第三方软件实现暂时禁用,但Windows 10默认不支持永久禁用,以确保系统安...
If you want to revert the changes, please repeat the above steps, but on step 3, you need to right-click theDisableAntiSpywarekey to delete it. Note:There are three ways to disable Windows Defender Antivirus on Windows 10, but we strongly suggest using a computer under the protection of...
Windows10系统 需要先把wd防护设置里的防篡改保护关掉 再修改注册表 ,重启后相关键值就不会被删除 wd...
Windows10系统 需要先把wd防护设置里的防篡改保护关掉 再修改注册表 ,重启后相关键值就不会被删除 wd...
Step-3:On Registry Editor, travel to this key –HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender. Step-4:On the right side, locate and double-click the DWORDDisableAntiSpyware. Step-5:Finally, set the value to1in the Edit window and clickOKto permanently disable this protection...
3. In the right pane of Windows Defender sub-key, create a registry DWORD (REG_DWORD) named DisableAntiSpyware. Double click on the registry DWORD to modify its Value data:4. Finally, set the Value data to 1 to disable Windows Defender Antivirus. Click OK and close Registry Editor, ...
Windows Defender, also known asMicrosoft Defender Antivirus is a built-in anti-malware solutionon Windows 10. It is designed to protect your computer and connected devices from unwanted attacks, ransomware attempts, viruses, and many other forms of malicious rootkits used by hackers. ...