Quick fix: Open Windows Security → Virus & threat protection → Manage settings, toggle Tamper Protection to Off temporarily. Run your legitimate tool (security scanner, AV vendor uninstaller, debugger). Re-enable Tamper Protection after.
You’re running a legitimate security tool — Sysinternals utility, third-party antivirus uninstaller, system diagnostic — and it fails. The tool reports it can’t access certain Defender resources or modify protection settings. Tamper Protection is doing its job: it prevents any external process from modifying Defender state, including legitimate tools. Disabling it temporarily fixes the friction.
Affects: Windows 11 (and Windows 10) with Defender Tamper Protection enabled.
Fix time: ~3 minutes.
What causes this
Tamper Protection is Defender’s defense against malware that disables real-time protection. It blocks PowerShell, Group Policy, and most other automation from modifying Defender settings — even legitimate ones. The trade-off: legitimate tools (especially third-party AV uninstallers, sysadmin scripts, debugger utilities) get caught in the same net. Disabling Tamper Protection temporarily lets the tool run, then you re-enable it.
Method 1: Toggle Tamper Protection off temporarily
The standard approach. Always re-enable after.
- Open Windows Security (search “Windows Security” in Start, or click the shield icon in the system tray).
- Click Virus & threat protection.
- Under Virus & threat protection settings, click Manage settings.
- Scroll to Tamper Protection. Toggle Off.
- Confirm the UAC prompt.
- Run your legitimate tool. It should now work without Defender interference.
- After finishing, return to the same settings page and toggle Tamper Protection On again.
This is the supported approach. The toggle requires admin privileges and a UAC prompt — Tamper Protection can’t be disabled by automated scripts.
Method 2: Use Microsoft Defender Offline scan for tools that need to bypass Defender entirely
Use when you need to run a security tool that requires a Defender-free environment.
- Open Windows Security → Virus & threat protection → Scan options.
- Choose Microsoft Defender Offline scan. Click Scan now.
- Confirm. The PC reboots into a special Defender Offline environment — minimal Windows, Defender running with elevated capabilities.
- This is the right environment for deep cleaning. After scan completes, PC reboots back to normal Windows.
- For your own tools to run in a similar environment: boot to Safe Mode (Settings → System → Recovery → Advanced startup → Restart now → Troubleshoot → Advanced options → Startup Settings → F4). Defender runs in reduced mode in Safe Mode; many third-party AV uninstallers expect this.
This handles cases where you need a Defender-minimal environment to run cleanup tools.
Method 3: Add the legitimate tool to Defender exclusions
Use for tools you’ll run repeatedly — avoid toggling Tamper Protection every time.
- Temporarily disable Tamper Protection (Method 1).
- Open Windows Security → Virus & threat protection → Manage settings → Add or remove exclusions.
- Add the tool’s file or folder as an exclusion (e.g.,
C:\Tools\Sysinternals). - Re-enable Tamper Protection.
- Now the tool runs without Defender scanning, even with Tamper Protection on.
- However, Tamper Protection still blocks the tool from modifying Defender itself — exclusions only stop scanning, not Defender interference. For tools that need to modify Defender (like a third-party AV installer), you still need to disable Tamper Protection.
This combination minimizes the friction for trusted tools without sacrificing protection.
How to verify the fix worked
- The legitimate tool runs without error.
- Open Windows Security → Virus & threat protection → Manage settings. After your work, Tamper Protection shows On and Real-time protection shows On.
- Run
Get-MpPreference | Select-Object DisableRealtimeMonitoring, DisableTamperProtectionin PowerShell. Both should be False.
If none of these work
If a tool fails even with Tamper Protection off and exclusions set, three deeper causes apply. The tool needs SYSTEM context: some sysadmin tools require running as the SYSTEM account, not just Administrator. Use psexec from Sysinternals: psexec.exe -s -i C:\path\to\tool.exe. Defender service interference: even with Tamper Protection off, the Microsoft Defender service may quarantine tool components. Stop Defender service temporarily: net stop WinDefend, run tool, net start WinDefend. Group Policy enforcement: corporate-managed PCs have Tamper Protection enforced via policy; you can’t disable it locally. Contact IT for an exception.
Bottom line: Tamper Protection blocks all Defender modification by design — toggle it off temporarily, run your legitimate tool, toggle on after. Add tools to exclusions for repeated use.