{"id":24335,"date":"2025-07-15T17:17:39","date_gmt":"2025-07-15T13:17:39","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/defendnot-disables-microsoft-defender-on-windows\/24335\/"},"modified":"2025-07-15T17:17:39","modified_gmt":"2025-07-15T13:17:39","slug":"defendnot-disables-microsoft-defender-on-windows","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/defendnot-disables-microsoft-defender-on-windows\/24335\/","title":{"rendered":"Schr\u00f6dinger&#8217;s antivirus: is protection dead or alive?"},"content":{"rendered":"<p>Many companies today operate a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/byod\/\" target=\"_blank\" rel=\"noopener\">Bring Your Own Device (BYOD)<\/a> policy, allowing employees to use their own devices for work purposes. This practice is especially prevalent in organizations that embrace remote working. BYOD brings many obvious advantages, but its implementation creates new risks for companies in terms of cybersecurity.<\/p>\n<p>To protect systems from threats, information security departments often require that security software is installed on all devices used for work. At the same time, some employees \u2013 especially hotshot techies \u2013 may view antivirus software more as a hindrance than a help.<\/p>\n<p>Not the most sensible attitude for sure, but convincing them otherwise can be hard. The main problem is that employees who believe they know better may find a way to dupe the system. Today, we investigate one such method: a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/new-defendnot-tool-tricks-windows-into-disabling-microsoft-defender\/\" target=\"_blank\" rel=\"nofollow noopener\">new research tool known as Defendnot<\/a>, which disables Microsoft Defender on Windows devices by registering fake antivirus software.<\/p>\n<h2>How <em>no-defender<\/em> blazed the trail using fake antivirus to disable Microsoft Defender<\/h2>\n<p>To understand exactly how Defendnot disables Microsoft Defender, we need to turn the clock back a year. Back then, a researcher with the X handle <a href=\"https:\/\/x.com\/es3n1n\" target=\"_blank\" rel=\"nofollow noopener\">es3n1n<\/a> created and published the first version of the tool on GitHub. Called <a href=\"https:\/\/github.com\/es3n1n\/no-defender\" target=\"_blank\" rel=\"nofollow noopener\">no-defender<\/a>, it was tasked with disabling the built-in Windows Defender antivirus.<\/p>\n<p>To accomplish this task, es3n1n exploited a weakness in the Windows Security Center (WSC) API. Through it, antivirus software informs the system that it is installed and ready to start protecting the device in real time. Upon receiving such a message, Windows automatically disables Microsoft Defender to avoid conflicts between different security solutions all running on the same device.<\/p>\n<p>Using the code of an existing security solution, the researcher created their own fake antivirus that registered in the system and passed all Windows checks. Once Microsoft Defender was disabled, the device was left unprotected \u2013 since no-defender offered no protection of its own.<\/p>\n<p>The no-defender project quickly drew a following on GitHub, where it was starred over two thousand times. However, the antivirus developer company whose code was reused filed a complaint for violation of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_Millennium_Copyright_Act\" target=\"_blank\" rel=\"nofollow noopener\">Digital Millennium Copyright Act (DMCA)<\/a>. So es3n1n was forced to remove the project code from GitHub, leaving only a description page.<\/p>\n<h2>How Defendnot succeeded no-defender<\/h2>\n<p>But the story doesn\u2019t end there. Almost a year later, New Zealand programmer <a href=\"https:\/\/mrbruh.com\" target=\"_blank\" rel=\"nofollow noopener\">MrBruh<\/a> prompted es3n1n into developing a version of no-defender that didn\u2019t rely on third-party code. Piqued by the challenge and poor sleep, <a href=\"https:\/\/blog.es3n1n.eu\/posts\/how-i-ruined-my-vacation\/\" target=\"_blank\" rel=\"nofollow noopener\">es3n1n wrote a new tool in four days flat<\/a>, which was dubbed Defendnot.<\/p>\n<p>At the heart of Defendnot was a stub DLL posing as a legitimate antivirus. To bypass all WSC API checks \u2013 including Protected Process Light (PPL), digital signatures and other mechanisms \u2013 Defendnot injects its DLL into Taskmgr.exe, which is signed and already considered as trusted by Microsoft. The tool then registers the fake antivirus, prompting Microsoft Defender to immediately turn off and leave the device without active protection.<\/p>\n<p>On top of that, Defendnot allows the user to assign any name to the \u201cantivirus\u201d. Similarly to its predecessor, this project became a hit on GitHub, having been starred 2100 times at the time of writing. To install Defendnot, the user must have administrator rights (which employees most likely have on personal devices).<\/p>\n<h2>How to protect corporate infrastructure from BYOD misuse<\/h2>\n<p>Defendnot and no-defender are positioned as research projects, with both tools demonstrating how trusted system mechanisms can be manipulated to disable protective functions. The conclusion is obvious: you can\u2019t always trust what Windows says.<\/p>\n<p>Therefore, so as not to endanger your company\u2019s digital infrastructure, we recommend beefing up its BYOD policy with a number of additional security measures:<\/p>\n<ul>\n<li>Where possible, make it mandatory for BYOD device owners to install <a href=\"https:\/\/me-en.kaspersky.com\/next?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____655fe72318f39647\" target=\"_blank\" rel=\"noopener\">reliable corporate protection<\/a> administered by the company\u2019s information security team.<\/li>\n<li>If this is not possible, do not consider BYOD devices as trusted simply for having antivirus software installed, and limit their access to corporate systems.<\/li>\n<li>Strictly control access permissions to ensure they correspond to employees\u2019 job responsibilities.<\/li>\n<li>Pay special attention to BYOD device activity in corporate systems, and deploy an <a href=\"https:\/\/me-en.kaspersky.com\/next?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____655fe72318f39647\" target=\"_blank\" rel=\"noopener\">XDR solution<\/a> to monitor behavioral anomalies.<\/li>\n<li>Train employees in the basics of cybersecurity so that they understand how antivirus software works, and why they shouldn\u2019t try to disable it. To help with this, our <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> delivers all you need and more.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>How the research tool Defendnot disables Microsoft Defender by registering a fake antivirus, and why you shouldn\u2019t always trust what your operating system says.<\/p>\n","protected":false},"author":2726,"featured_media":24336,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[415],"class_list":{"0":"post-24335","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-byod"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/defendnot-disables-microsoft-defender-on-windows\/24335\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/defendnot-disables-microsoft-defender-on-windows\/29139\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/defendnot-disables-microsoft-defender-on-windows\/12581\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/defendnot-disables-microsoft-defender-on-windows\/29183\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/defendnot-disables-microsoft-defender-on-windows\/28309\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/defendnot-disables-microsoft-defender-on-windows\/31146\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/defendnot-disables-microsoft-defender-on-windows\/40058\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/defendnot-disables-microsoft-defender-on-windows\/13544\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/defendnot-disables-microsoft-defender-on-windows\/53820\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/defendnot-disables-microsoft-defender-on-windows\/23998\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/defendnot-disables-microsoft-defender-on-windows\/32422\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/defendnot-disables-microsoft-defender-on-windows\/29360\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/defendnot-disables-microsoft-defender-on-windows\/35114\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/defendnot-disables-microsoft-defender-on-windows\/34754\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/byod\/","name":"BYOD"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24335"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24335\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24336"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}