A cloud-native solution that protects workloads across hybrid and multi-cloud environments with threat detection and security recommendations
The behavior described is consistent with Microsoft Defender Antivirus being controlled by policies or another management method, so local changes in GPEDIT, registry, or third‑party “tuning” tools have no visible effect.
Key points and checks:
- Avoid multiple AV/antispyware products
Running more than one real‑time security product can cause conflicts and unexpected behavior. Only one real‑time AV should be active.
- If any third‑party antivirus/antispyware is installed, uninstall it and then run Microsoft Safety Scanner as recommended.
- Use only one management method for Defender
Defender can be managed by:
- Microsoft Defender for Endpoint security settings management
- Intune (MDM)
- Configuration Manager (co‑management or standalone)
- Group Policy (GPO)
- PowerShell / WMI / direct registry For best results, only one method should be used. If another method is already applying policy, local GPEDIT changes can be overridden.
- Check where Defender settings are coming from
Use the documented registry locations to see what is controlling Defender:
- Policy (GPO / ConfigMgr / MDE security settings management):
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender - MDM (Intune, ConfigMgr with tenant attach):
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Policy Manager - Local settings (PowerShell, WMI, direct registry):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender
- For GPO: run
GpResult.exe /h C:\temp\GpResult_output.htmlas administrator and review applied policies. - For Intune/MDM: run
mdmdiagnosticstool.exe -out "c:\temp\MDMDiagReport.zip"and review. - For local settings: review whether scripts, imaging, or manual registry edits have set Defender preferences.
- Policy (GPO / ConfigMgr / MDE security settings management):
- Look for policy conflicts that disable or block Defender
If Defender appears “stuck” or versions show as 0.0.0.0, there may be a policy conflict such as
DisableAntispywarebeing set under the policy key. The recommended process is:- Understand the order of precedence (MDM, GPO, local, etc.).
- Determine where Defender settings are configured (step 3 above).
- Identify the specific policies or settings that conflict.
- Work with whoever manages security in the environment to remove or revise those policies so the device receives correct Defender settings.
- Configuring Defender via supported methods
Once conflicts are removed and Defender is active, configuration should be done via one supported method:
- For standalone devices: Local Group Policy Editor under
Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus. - For managed environments: Intune or Microsoft Defender for Endpoint security settings management, using the built‑in “Microsoft Defender Antivirus” endpoint security policy to configure real‑time protection, PUA protection, and cloud protection.
- For standalone devices: Local Group Policy Editor under
- Real‑time protection and cloud features
When properly managed, typical secure settings include:
- Real‑time monitoring allowed and bi‑directional.
- Behavior monitoring and on‑access protection allowed.
- PUA protection on.
- Cloud protection allowed with high block level.
If, after removing other AV products and resolving policy conflicts, Defender still shows 0.0.0.0 for engine and definitions, the next step is to identify and correct the controlling policy using the registry locations and tools above, then let Defender update normally.
References:
- Antivirus and antimalware software: FAQ
- Troubleshoot Microsoft Defender Antivirus settings
- Enable and configure Microsoft Defender Antivirus always-on protection
- Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management (Endpoint security policies)
- Evaluate Microsoft Defender Antivirus using Group Policy