Disable "Windows Defender Firewall Authorization Driver" service (breaks Microsoft Store, "netsh advfirewall", winget, Windows Sandbox, Docker, WSL)
- Windows onlyThis script improves your privacy on Windows
- Single actionThis page belongs to a script, containing basic changes to achieve a task.
- Impact: High
System Functionality / Data Loss Risk: High
This action improves privacy with high impact when you run the recommended script.
- Batch (batchfile)These changes use Windows system commands to update your settings.
- Administrator rights requiredThis script requires privilege access to do the system changes
- Fully reversible
You can fully restore this action (revert back to the original behavior) using this website.
The restore/revert methods provided here can help you fix issues.
Overview
This script disables the Windows Defender Firewall Authorization Driver service.
This service is a kernel mode driver crucial for inspecting network traffic entering and exiting your computer 1 2.
Disabling this service can enhance privacy by reducing Microsoft's capability to monitor and analyze your network traffic. It also improves system performance by decreasing background resource consumption.
The driver is identified by the file mpsdrv.sys
1 2 3.
This file is a component of Microsoft Protection Service 3.
This service encompasses the Windows Defender Firewall (mpssvc
) 4 5.
Disabling this driver disables Windows Defender Firewall 1 2.
This action can significantly increase security risks 6.
Restart your computer after running this script to ensure all changes take effect 7.
Disabling this service causes problems with software that depends on it 8 such as:
- Prevents Microsoft Store app downloads 9 10, impacting winget CLI functionality 11.
- Disables
netsh advfirewall
commands, used for Windows Firewall management 8. - Disables Windows Sandbox 7 12, an isolated environment for safely running applications 13.
- Disables Docker 14, a platform for developing and running applications in isolated environments 15.
- Disables Windows Subsystem for Linux (WSL) 14, which lets Linux programs run directly on Windows 16.
Overview of default service statuses
OS Version | Status | Start type |
---|---|---|
Windows 10 (≥ 22H2) | 🟢 Running | Manual |
Windows 11 (≥ 23H2) | 🟢 Running | Manual |
- Not Advised
This script should only be used by advanced users.
This script is not recommended for daily use as it breaks important functionality.
Consider creating a system restore point before doing any changes.
- Security Trade-off
This action prioritizes privacy over certain security features. It's not recommended and should only be used by advanced users after understanding its implications.
Increased Privacy
Enhanced privacy through reduced data collection and trackingDecreased Security
Some security features will be disabled or limitedThis script can be reversed, this action allows you to can restore the system security.
Sources
- Windows Defender Firewall Authorization Driver - Windows 10 Service - batcmd.com. batcmd.com. (2024).
Original: https://batcmd.com/windows/10/services/mpsdrv
Archived: https://web.archive.org/web/20240314091039/https://batcmd.com/windows/10/services/mpsdrv/ - Windows Defender Firewall Authorization Driver (mpsdrv) Service Defaults in Windows 10. revertservice.com. (2024).
Original: https://revertservice.com/10/mpsdrv
Archived: https://web.archive.org/web/20240406223537/https://revertservice.com/10/mpsdrv/ - mpsdrv.sys Windows process - What is it?. www.file.net. (2024).
Original: https://www.file.net/process/mpsdrv.sys.html
Archived: https://web.archive.org/web/20240406223542/https://www.file.net/process/mpsdrv.sys.html - MPSSVC.dll. Microsoft Protection Service. STRONTIC. strontic.github.io. (2023).
Original: https://strontic.github.io/xcyclopedia/library/MPSSVC.dll-AA441F7C99AAACBA2538E90D7693637A.html
Archived: https://web.archive.org/web/20231122132150/https://strontic.github.io/xcyclopedia/library/MPSSVC.dll-AA441F7C99AAACBA2538E90D7693637A.html - Windows Defender Firewall - Windows 10 Service - batcmd.com. batcmd.com. (2023).
Original: https://batcmd.com/windows/10/services/mpssvc
Archived: https://web.archive.org/web/20231122132143/https://batcmd.com/windows/10/services/mpssvc/ - Basic Firewall Policy Design. technet.microsoft.com. (2012).
Original: http://technet.microsoft.com/en-us/library/cc753180.aspx
Archived: https://web.archive.org/web/20121106033255/http://technet.microsoft.com/en-us/library/cc753180.aspx - Use netsh advfirewall firewall context - Windows Server. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/netsh-advfirewall-firewall-control-firewall-behavior
Archived: https://web.archive.org/web/20240314125017/https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/netsh-advfirewall-firewall-control-firewall-behavior - [BUG][help wanted]: Cannot enable Windows Defender · Issue #104 · undergroundwires/privacy.sexy. github.com/undergroundwires/privacy.sexy. (2024).
Original: https://github.com/undergroundwires/privacy.sexy/issues/104
Archived: https://web.archive.org/web/20240406224105/https://github.com/undergroundwires/privacy.sexy/issues/104#issuecomment-962651791 - How To Fix Windows Store App Update Error Code 0x80073D0A? – Walker News. www.walkernews.net. (2020).
Original: https://www.walkernews.net/2012/09/23/how-to-fix-windows-store-app-update-error-code-0x80073d0a
Archived: https://web.archive.org/web/20200620033533/https://www.walkernews.net/2012/09/23/how-to-fix-windows-store-app-update-error-code-0x80073d0a/ - [BUG]: I broke my Windows Sandbox and I'd like it back · Issue #115 · undergroundwires/privacy.sexy. (2024).
Original: https://github.com/undergroundwires/privacy.sexy/issues/115
Archived: https://web.archive.org/web/20240526095212/https://github.com/undergroundwires/privacy.sexy/issues/115 - Windows Sandbox - Windows Security. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview
Archived: https://web.archive.org/web/20240526110752/https://learn.microsoft.com/en-us/windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview - [BUG]: Docker / wsl2 fails to start after using script · Issue #152 · undergroundwires/privacy.sexy. (2025).
Original: https://github.com/undergroundwires/privacy.sexy/issues/152
Archived: https://web.archive.org/web/2q0240526095244/https://github.com/undergroundwires/privacy.sexy/issues/152 - Docker overview. Docker Docs. docs.docker.com. (2024).
Original: https://docs.docker.com/get-started/overview
Archived: https://web.archive.org/web/20240526110733/https://docs.docker.com/get-started/overview/ - What is Windows Subsystem for Linux. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/windows/wsl/about
Archived: https://web.archive.org/web/20240526110720/https://learn.microsoft.com/en-us/windows/wsl/about - Manage Windows Firewall with the command line - Windows Security. Microsoft Learn. learn.microsoft.com. (2024).
Original: https://learn.microsoft.com/en-us/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line
Archived: https://web.archive.org/web/20240326143148/https://learn.microsoft.com/en-us/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line?tabs=powershell#disable-windows-firewall - github.com. (2024).
Original: https://github.com/undergroundwires/privacy.sexy/issues/364
Archived: https://web.archive.org/web/20240526095128/https://github.com/undergroundwires/privacy.sexy/issues/364 - github.com. (2024).
Original: https://github.com/undergroundwires/privacy.sexy/issues/142
Archived: https://web.archive.org/web/20240406223635/https://github.com/undergroundwires/privacy.sexy/issues/142
Apply Now
Choose one of three ways to apply:
Download script
Download and run the script directly- No app needed
- Offline usage
- Easy-to-apply
- Free
- Open-source
Apply with privacy.sexy
Guided, automated application with safety checks- Recommended for most users
- Includes safety checks
- Free
- Open-source
- Popular
- Offline/Online usage
- Apply
- Revert
:: Disable the service `mpsdrv`
PowerShell -ExecutionPolicy Unrestricted -Command "$serviceQuery = 'mpsdrv'; $stopWithDependencies= $false; <# -- 1. Skip if service does not exist #>; $service = Get-Service -Name $serviceQuery -ErrorAction SilentlyContinue; if(!$service) { Write-Host "^""Service query `"^""$serviceQuery`"^"" did not yield any results, no need to disable it."^""; Exit 0; }; $serviceName = $service.Name; Write-Host "^""Disabling service: `"^""$serviceName`"^""."^""; <# -- 2. Stop if running #>; if ($service.Status -eq [System.ServiceProcess.ServiceControllerStatus]::Running) { Write-Host "^""`"^""$serviceName`"^"" is running, attempting to stop it."^""; try { Write-Host "^""Stopping the service `"^""$serviceName`"^""."^""; $stopParams = @{ Name = $ServiceName; Force = $true; ErrorAction = 'Stop'; }; if (-not $stopWithDependencies) { $stopParams['NoWait'] = $true; }; Stop-Service @stopParams; Write-Host "^""Stopped `"^""$serviceName`"^"" successfully."^""; } catch { if ($_.FullyQualifiedErrorId -eq 'CouldNotStopService,Microsoft.PowerShell.Commands.StopServiceCommand') { Write-Warning "^""The service `"^""$serviceName`"^"" does not accept a stop command and may need to be stopped manually or on reboot."^""; } else { Write-Warning "^""Failed to stop service `"^""$ServiceName`"^"". It will be stopped after reboot. Error: $($_.Exception.Message)"^""; }; }; } else { Write-Host "^""`"^""$serviceName`"^"" is not running, no need to stop."^""; }; <# -- 3. Skip if service info is not found in registry #>; $registryKey = "^""HKLM:\SYSTEM\CurrentControlSet\Services\$serviceName"^""; if (-Not (Test-Path $registryKey)) { Write-Host "^""`"^""$registryKey`"^"" is not found in registry, cannot enable it."^""; Exit 0; }; <# -- 4. Skip if already disabled #>; if( $(Get-ItemProperty -Path "^""$registryKey"^"").Start -eq 4) { Write-Host "^""`"^""$serviceName`"^"" is already disabled from start, no further action is needed."^""; Exit 0; }; <# -- 5. Disable service #>; try { Set-ItemProperty -LiteralPath $registryKey -Name "^""Start"^"" -Value 4 -ErrorAction Stop; Write-Host 'Successfully disabled the service. It will not start automatically on next boot.'; } catch { Write-Error "^""Failed to disable the service. Error: $($_.Exception.Message)"^""; Exit 1; }"
:: Soft delete files matching pattern: "%SYSTEMROOT%\System32\drivers\mpsdrv.sys" with additional permissions
PowerShell -ExecutionPolicy Unrestricted -Command "$pathGlobPattern = "^""%SYSTEMROOT%\System32\drivers\mpsdrv.sys"^""; $expandedPath = [System.Environment]::ExpandEnvironmentVariables($pathGlobPattern); Write-Host "^""Searching for items matching pattern: `"^""$($expandedPath)`"^""."^""; $renamedCount = 0; $skippedCount = 0; $failedCount = 0; Add-Type -TypeDefinition "^""using System;`r`nusing System.Runtime.InteropServices;`r`npublic class Privileges {`r`n [DllImport(`"^""advapi32.dll`"^"", ExactSpelling = true, SetLastError = true)]`r`n internal static extern bool AdjustTokenPrivileges(IntPtr htok, bool disall,`r`n ref TokPriv1Luid newst, int len, IntPtr prev, IntPtr relen);`r`n [DllImport(`"^""advapi32.dll`"^"", ExactSpelling = true, SetLastError = true)]`r`n internal static extern bool OpenProcessToken(IntPtr h, int acc, ref IntPtr phtok);`r`n [DllImport(`"^""advapi32.dll`"^"", SetLastError = true)]`r`n internal static extern bool LookupPrivilegeValue(string host, string name, ref long pluid);`r`n [StructLayout(LayoutKind.Sequential, Pack = 1)]`r`n internal struct TokPriv1Luid {`r`n public int Count;`r`n public long Luid;`r`n public int Attr;`r`n }`r`n internal const int SE_PRIVILEGE_ENABLED = 0x00000002;`r`n internal const int TOKEN_QUERY = 0x00000008;`r`n internal const int TOKEN_ADJUST_PRIVILEGES = 0x00000020;`r`n public static bool AddPrivilege(string privilege) {`r`n try {`r`n bool retVal;`r`n TokPriv1Luid tp;`r`n IntPtr hproc = GetCurrentProcess();`r`n IntPtr htok = IntPtr.Zero;`r`n retVal = OpenProcessToken(hproc, TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, ref htok);`r`n tp.Count = 1;`r`n tp.Luid = 0;`r`n tp.Attr = SE_PRIVILEGE_ENABLED;`r`n retVal = LookupPrivilegeValue(null, privilege, ref tp.Luid);`r`n retVal = AdjustTokenPrivileges(htok, false, ref tp, 0, IntPtr.Zero, IntPtr.Zero);`r`n return retVal;`r`n } catch (Exception ex) {`r`n throw new Exception(`"^""Failed to adjust token privileges`"^"", ex);`r`n }`r`n }`r`n public static bool RemovePrivilege(string privilege) {`r`n try {`r`n bool retVal;`r`n TokPriv1Luid tp;`r`n IntPtr hproc = GetCurrentProcess();`r`n IntPtr htok = IntPtr.Zero;`r`n retVal = OpenProcessToken(hproc, TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, ref htok);`r`n tp.Count = 1;`r`n tp.Luid = 0;`r`n tp.Attr = 0; // This line is changed to revoke the privilege`r`n retVal = LookupPrivilegeValue(null, privilege, ref tp.Luid);`r`n retVal = AdjustTokenPrivileges(htok, false, ref tp, 0, IntPtr.Zero, IntPtr.Zero);`r`n return retVal;`r`n } catch (Exception ex) {`r`n throw new Exception(`"^""Failed to adjust token privileges`"^"", ex);`r`n }`r`n }`r`n [DllImport(`"^""kernel32.dll`"^"", CharSet = CharSet.Auto)]`r`n public static extern IntPtr GetCurrentProcess();`r`n}"^""; [Privileges]::AddPrivilege('SeRestorePrivilege') | Out-Null; [Privileges]::AddPrivilege('SeTakeOwnershipPrivilege') | Out-Null; $adminSid = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-32-544'; $adminAccount = $adminSid.Translate([System.Security.Principal.NTAccount]); $adminFullControlAccessRule = New-Object System.Security.AccessControl.FileSystemAccessRule( $adminAccount, [System.Security.AccessControl.FileSystemRights]::FullControl, [System.Security.AccessControl.AccessControlType]::Allow ); $foundAbsolutePaths = @(); try { $foundAbsolutePaths += @(; Get-Item -Path $expandedPath -ErrorAction Stop | Select-Object -ExpandProperty FullName; ); } catch [System.Management.Automation.ItemNotFoundException] { <# Swallow, do not run `Test-Path` before, it's unreliable for globs requiring extra permissions #>; }; $foundAbsolutePaths = $foundAbsolutePaths | Select-Object -Unique | Sort-Object -Property { $_.Length } -Descending; if (!$foundAbsolutePaths) { Write-Host 'Skipping, no items available.'; exit 0; }; Write-Host "^""Initiating processing of $($foundAbsolutePaths.Count) items from `"^""$expandedPath`"^""."^""; foreach ($path in $foundAbsolutePaths) { if (Test-Path -Path $path -PathType Container) { Write-Host "^""Skipping folder (not its contents): `"^""$path`"^""."^""; $skippedCount++; continue; }; if($revert -eq $true) { if (-not $path.EndsWith('.OLD')) { Write-Host "^""Skipping non-backup file: `"^""$path`"^""."^""; $skippedCount++; continue; }; } else { if ($path.EndsWith('.OLD')) { Write-Host "^""Skipping backup file: `"^""$path`"^""."^""; $skippedCount++; continue; }; }; $originalFilePath = $path; Write-Host "^""Processing file: `"^""$originalFilePath`"^""."^""; if (-Not (Test-Path $originalFilePath)) { Write-Host "^""Skipping, file `"^""$originalFilePath`"^"" not found."^""; $skippedCount++; exit 0; }; $originalAcl = Get-Acl -Path "^""$originalFilePath"^""; $accessGranted = $false; try { $acl = Get-Acl -Path "^""$originalFilePath"^""; $acl.SetOwner($adminAccount) <# Take Ownership (because file is owned by TrustedInstaller) #>; $acl.AddAccessRule($adminFullControlAccessRule) <# Grant rights to be able to move the file #>; Set-Acl -Path $originalFilePath -AclObject $acl -ErrorAction Stop; $accessGranted = $true; } catch { Write-Warning "^""Failed to grant access to `"^""$originalFilePath`"^"": $($_.Exception.Message)"^""; }; if ($revert -eq $true) { $newFilePath = $originalFilePath.Substring(0, $originalFilePath.Length - 4); } else { $newFilePath = "^""$($originalFilePath).OLD"^""; }; try { Move-Item -LiteralPath "^""$($originalFilePath)"^"" -Destination "^""$newFilePath"^"" -Force -ErrorAction Stop; Write-Host "^""Successfully processed `"^""$originalFilePath`"^""."^""; $renamedCount++; if ($accessGranted) { try { Set-Acl -Path $newFilePath -AclObject $originalAcl -ErrorAction Stop; } catch { Write-Warning "^""Failed to restore access on `"^""$newFilePath`"^"": $($_.Exception.Message)"^""; }; }; } catch { Write-Error "^""Failed to rename `"^""$originalFilePath`"^"" to `"^""$newFilePath`"^"": $($_.Exception.Message)"^""; $failedCount++; if ($accessGranted) { try { Set-Acl -Path $originalFilePath -AclObject $originalAcl -ErrorAction Stop; } catch { Write-Warning "^""Failed to restore access on `"^""$originalFilePath`"^"": $($_.Exception.Message)"^""; }; }; }; }; if (($renamedCount -gt 0) -or ($skippedCount -gt 0)) { Write-Host "^""Successfully processed $renamedCount items and skipped $skippedCount items."^""; }; if ($failedCount -gt 0) { Write-Warning "^""Failed to process $($failedCount) items."^""; }; [Privileges]::RemovePrivilege('SeRestorePrivilege') | Out-Null; [Privileges]::RemovePrivilege('SeTakeOwnershipPrivilege') | Out-Null"
:: Suggest restarting computer for changes to take effect
PowerShell -ExecutionPolicy Unrestricted -Command "$message = 'For the changes to fully take effect, please restart your computer.'; $warn = $false; if ($warn) { Write-Warning "^""$message"^""; } else { Write-Host "^""Note: "^"" -ForegroundColor Blue -NoNewLine; Write-Output "^""$message"^""; }"
":: Restore the service `mpsdrv` \nPowerShell -ExecutionPolicy Unrestricted -Command \"$serviceQuery = 'mpsdrv'; $defaultStartupMode = 'Manual'; <# -- 1. Skip if service does not exist #>; $service = Get-Service -Name $serviceQuery -ErrorAction SilentlyContinue; if (!$service) { Write-Warning \"^\"\"Service query `\"^\"\"$serviceQuery`\"^\"\" did not yield and results. Revert cannot proceed.\"^\"\"; Exit 1; }; $serviceName = $service.Name; Write-Host \"^\"\"Restoring registry settings for service `\"^\"\"$serviceName`\"^\"\" to default startup mode `\"^\"\"$defaultStartupMode`\"^\"\".\"^\"\"; <# -- 2. Skip if service info is not found in registry #>; $registryKey = \"^\"\"HKLM:\\SYSTEM\\CurrentControlSet\\Services\\$serviceName\"^\"\"; if (-Not (Test-Path $registryKey)) { Write-Warning \"^\"\"`\"^\"\"$registryKey`\"^\"\" is not found in registry. Revert cannot proceed.\"^\"\"; Exit 1; }; <# -- 3. Enable if not already enabled #>; $defaultStartupRegValue = switch ($defaultStartupMode) { 'Boot'      { 0 }; 'System'    { 1 }; 'Automatic' { 2 }; 'Manual'    { 3 }; 'Disabled'  { 4 }; default { Write-Error \"^\"\"Error: Unknown startup mode specified: `\"^\"\"$defaultStartupMode`\"^\"\". Revert cannot proceed.\"^\"\"; return; }; }; if ($(Get-ItemProperty -Path \"^\"\"$registryKey\"^\"\").Start -eq $defaultStartupRegValue) { Write-Host \"^\"\"`\"^\"\"$serviceName`\"^\"\" is has already default startup mode: `\"^\"\"$defaultStartupMode`\"^\"\".\"^\"\"; } else { try { Set-ItemProperty $registryKey -Name Start -Value $defaultStartupRegValue -Force; Write-Host \"^\"\"Successfully restored `\"^\"\"$serviceName`\"^\"\" with `\"^\"\"$defaultStartupMode`\"^\"\" start, this may require restarting your computer.\"^\"\"; } catch { Write-Error \"^\"\"Could not enable `\"^\"\"$serviceName`\"^\"\": $_\"^\"\"; Exit 1; }; }; <# -- 4. Start if not running (must be enabled first) #>; if ($defaultStartupMode -eq 'Automatic' -or $defaultStartupMode -eq 'Boot' -or $defaultStartupMode -eq 'System') { if ($service.Status -ne [System.ServiceProcess.ServiceControllerStatus]::Running) { Write-Host \"^\"\"`\"^\"\"$serviceName`\"^\"\" is not running, trying to start it.\"^\"\"; try { Start-Service -Name $serviceName -ErrorAction Stop; Write-Host 'Service started successfully.'; } catch { Write-Warning \"^\"\"Failed to restart service. It will be started after reboot. Error: $($_.Exception.Message)\"^\"\"; }; } else { Write-Host \"^\"\"`\"^\"\"$serviceName`\"^\"\" is already running, no need to start.\"^\"\"; }; }\"\n:: Restore files matching pattern: \"%SYSTEMROOT%\\System32\\drivers\\mpsdrv.sys\" with additional permissions \nPowerShell -ExecutionPolicy Unrestricted -Command \"$revert = $true; $pathGlobPattern = \"^\"\"%SYSTEMROOT%\\System32\\drivers\\mpsdrv.sys.OLD\"^\"\"; $expandedPath = [System.Environment]::ExpandEnvironmentVariables($pathGlobPattern); Write-Host \"^\"\"Searching for items matching pattern: `\"^\"\"$($expandedPath)`\"^\"\".\"^\"\"; $renamedCount   = 0; $skippedCount   = 0; $failedCount    = 0; Add-Type -TypeDefinition \"^\"\"using System;`r`nusing System.Runtime.InteropServices;`r`npublic class Privileges {`r`n    [DllImport(`\"^\"\"advapi32.dll`\"^\"\", ExactSpelling = true, SetLastError = true)]`r`n    internal static extern bool AdjustTokenPrivileges(IntPtr htok, bool disall,`r`n        ref TokPriv1Luid newst, int len, IntPtr prev, IntPtr relen);`r`n    [DllImport(`\"^\"\"advapi32.dll`\"^\"\", ExactSpelling = true, SetLastError = true)]`r`n    internal static extern bool OpenProcessToken(IntPtr h, int acc, ref IntPtr phtok);`r`n    [DllImport(`\"^\"\"advapi32.dll`\"^\"\", SetLastError = true)]`r`n    internal static extern bool LookupPrivilegeValue(string host, string name, ref long pluid);`r`n    [StructLayout(LayoutKind.Sequential, Pack = 1)]`r`n    internal struct TokPriv1Luid {`r`n        public int Count;`r`n        public long Luid;`r`n        public int Attr;`r`n    }`r`n    internal const int SE_PRIVILEGE_ENABLED = 0x00000002;`r`n    internal const int TOKEN_QUERY = 0x00000008;`r`n    internal const int TOKEN_ADJUST_PRIVILEGES = 0x00000020;`r`n    public static bool AddPrivilege(string privilege) {`r`n        try {`r`n            bool retVal;`r`n            TokPriv1Luid tp;`r`n            IntPtr hproc = GetCurrentProcess();`r`n            IntPtr htok = IntPtr.Zero;`r`n            retVal = OpenProcessToken(hproc, TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, ref htok);`r`n            tp.Count = 1;`r`n            tp.Luid = 0;`r`n            tp.Attr = SE_PRIVILEGE_ENABLED;`r`n            retVal = LookupPrivilegeValue(null, privilege, ref tp.Luid);`r`n            retVal = AdjustTokenPrivileges(htok, false, ref tp, 0, IntPtr.Zero, IntPtr.Zero);`r`n            return retVal;`r`n        } catch (Exception ex) {`r`n            throw new Exception(`\"^\"\"Failed to adjust token privileges`\"^\"\", ex);`r`n        }`r`n    }`r`n    public static bool RemovePrivilege(string privilege) {`r`n        try {`r`n            bool retVal;`r`n            TokPriv1Luid tp;`r`n            IntPtr hproc = GetCurrentProcess();`r`n            IntPtr htok = IntPtr.Zero;`r`n            retVal = OpenProcessToken(hproc, TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, ref htok);`r`n            tp.Count = 1;`r`n            tp.Luid = 0;`r`n            tp.Attr = 0;  // This line is changed to revoke the privilege`r`n            retVal = LookupPrivilegeValue(null, privilege, ref tp.Luid);`r`n            retVal = AdjustTokenPrivileges(htok, false, ref tp, 0, IntPtr.Zero, IntPtr.Zero);`r`n            return retVal;`r`n        } catch (Exception ex) {`r`n            throw new Exception(`\"^\"\"Failed to adjust token privileges`\"^\"\", ex);`r`n        }`r`n    }`r`n    [DllImport(`\"^\"\"kernel32.dll`\"^\"\", CharSet = CharSet.Auto)]`r`n    public static extern IntPtr GetCurrentProcess();`r`n}\"^\"\"; [Privileges]::AddPrivilege('SeRestorePrivilege') | Out-Null; [Privileges]::AddPrivilege('SeTakeOwnershipPrivilege') | Out-Null; $adminSid = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-32-544'; $adminAccount = $adminSid.Translate([System.Security.Principal.NTAccount]); $adminFullControlAccessRule = New-Object System.Security.AccessControl.FileSystemAccessRule( $adminAccount, [System.Security.AccessControl.FileSystemRights]::FullControl, [System.Security.AccessControl.AccessControlType]::Allow ); $foundAbsolutePaths = @(); try { $foundAbsolutePaths += @(; Get-Item -Path $expandedPath -ErrorAction Stop | Select-Object -ExpandProperty FullName; ); } catch [System.Management.Automation.ItemNotFoundException] { <# Swallow, do not run `Test-Path` before, it's unreliable for globs requiring extra permissions #>; }; $foundAbsolutePaths = $foundAbsolutePaths | Select-Object -Unique | Sort-Object -Property { $_.Length } -Descending; if (!$foundAbsolutePaths) { Write-Host 'Skipping, no items available.'; exit 0; }; Write-Host \"^\"\"Initiating processing of $($foundAbsolutePaths.Count) items from `\"^\"\"$expandedPath`\"^\"\".\"^\"\"; foreach ($path in $foundAbsolutePaths) { if (Test-Path -Path $path -PathType Container) { Write-Host \"^\"\"Skipping folder (not its contents): `\"^\"\"$path`\"^\"\".\"^\"\"; $skippedCount++; continue; }; if($revert -eq $true) { if (-not $path.EndsWith('.OLD')) { Write-Host \"^\"\"Skipping non-backup file: `\"^\"\"$path`\"^\"\".\"^\"\"; $skippedCount++; continue; }; } else { if ($path.EndsWith('.OLD')) { Write-Host \"^\"\"Skipping backup file: `\"^\"\"$path`\"^\"\".\"^\"\"; $skippedCount++; continue; }; }; $originalFilePath = $path; Write-Host \"^\"\"Processing file: `\"^\"\"$originalFilePath`\"^\"\".\"^\"\"; if (-Not (Test-Path $originalFilePath)) { Write-Host \"^\"\"Skipping, file `\"^\"\"$originalFilePath`\"^\"\" not found.\"^\"\"; $skippedCount++; exit 0; }; $originalAcl = Get-Acl -Path \"^\"\"$originalFilePath\"^\"\"; $accessGranted = $false; try { $acl = Get-Acl -Path \"^\"\"$originalFilePath\"^\"\"; $acl.SetOwner($adminAccount) <# Take Ownership (because file is owned by TrustedInstaller) #>; $acl.AddAccessRule($adminFullControlAccessRule) <# Grant rights to be able to move the file #>; Set-Acl -Path $originalFilePath -AclObject $acl -ErrorAction Stop; $accessGranted = $true; } catch { Write-Warning \"^\"\"Failed to grant access to `\"^\"\"$originalFilePath`\"^\"\": $($_.Exception.Message)\"^\"\"; }; if ($revert -eq $true) { $newFilePath = $originalFilePath.Substring(0, $originalFilePath.Length - 4); } else { $newFilePath = \"^\"\"$($originalFilePath).OLD\"^\"\"; }; try { Move-Item -LiteralPath \"^\"\"$($originalFilePath)\"^\"\" -Destination \"^\"\"$newFilePath\"^\"\" -Force -ErrorAction Stop; Write-Host \"^\"\"Successfully processed `\"^\"\"$originalFilePath`\"^\"\".\"^\"\"; $renamedCount++; if ($accessGranted) { try { Set-Acl -Path $newFilePath -AclObject $originalAcl -ErrorAction Stop; } catch { Write-Warning \"^\"\"Failed to restore access on `\"^\"\"$newFilePath`\"^\"\": $($_.Exception.Message)\"^\"\"; }; }; } catch { Write-Error \"^\"\"Failed to rename `\"^\"\"$originalFilePath`\"^\"\" to `\"^\"\"$newFilePath`\"^\"\": $($_.Exception.Message)\"^\"\"; $failedCount++; if ($accessGranted) { try { Set-Acl -Path $originalFilePath -AclObject $originalAcl -ErrorAction Stop; } catch { Write-Warning \"^\"\"Failed to restore access on `\"^\"\"$originalFilePath`\"^\"\": $($_.Exception.Message)\"^\"\"; }; }; }; }; if (($renamedCount -gt 0) -or ($skippedCount -gt 0)) { Write-Host \"^\"\"Successfully processed $renamedCount items and skipped $skippedCount items.\"^\"\"; }; if ($failedCount -gt 0) { Write-Warning \"^\"\"Failed to process $($failedCount) items.\"^\"\"; }; [Privileges]::RemovePrivilege('SeRestorePrivilege') | Out-Null; [Privileges]::RemovePrivilege('SeTakeOwnershipPrivilege') | Out-Null\"\n:: Suggest restarting computer for changes to take effect\nPowerShell -ExecutionPolicy Unrestricted -Command \"$message = 'For the changes to fully take effect, please restart your computer.'; $warn =  $false; if ($warn) { Write-Warning \"^\"\"$message\"^\"\"; } else { Write-Host \"^\"\"Note: \"^\"\" -ForegroundColor Blue -NoNewLine; Write-Output \"^\"\"$message\"^\"\"; }\""
Similar Guides
Wider Goal
Guides below includes this guide to achieve a wider goal.See other more general settings that includes this one as one of its actions.
These plans combine multiple privacy settings, including this one, for stronger protection.
- Disable Defender Firewall services and drivers
- Disable Defender Firewall
- Disable Defender
- Privacy over security
This section contains scripts to disable the essential services and drivers of Defender Firewall. Defender Firewall uses services and drivers to operate. Services ...
This category provides scripts to disable the Defender Firewall. This firewall serves as a security gate for your computer. It controls network traffic to and from...
This category offers scripts to disable Windows security components related to Defender. Defender is also referred to as Microsoft Defender or Windows Defender. Al...
Steps to privacy over security on your Windows machine to enhance data privacy protection. Together with that, this feature walks through the procedure to undo the...
Same Goal
Other guides in Disable Defender Firewall services and driversSee settings that are in the same category as this guide.
Using other actions in the same category may help you achieve your goal better.
About the Creators
These people have authored this documentation and written its scripts:
Reviewed By
This guide has undergone comprehensive auditing and peer review:Expert review by undergroundwires
- Verified technical accuracy and editorial standards
- Assessed system impact and user privacy risks
Public review by large community
- Privacy enthusiasts and professionals peer-reviewed
- Millions of end-users tested across different environments
History
We continually monitor our guides, their impact and all other privacy options. We update our guides when new information becomes available. On every update, we publicly store who made the change, what has been changed, why the change was made and when the change was made.