Lock Down Your PC: Enable Windows Defender Tamper Protection + Security Baselines

  • Thread Author

Lock Down Your PC: Enable Windows Defender Tamper Protection + Security Baselines​

Difficulty: Intermediate | Time Required: 15 minutes
Windows Security (Microsoft Defender) is solid out of the box—but a lot of real-world infections and “cleanup tool” damage happens after someone (or something) disables protections. Two of the best ways to harden a Windows 10/11 PC without installing extra software are:
1) Tamper Protection (prevents most unauthorized changes to Defender settings), and
2) Microsoft security baselines (a vetted set of recommended security settings you can apply to Windows).
This guide walks you through enabling Tamper Protection and applying a security baseline in a way that’s reversible and friendly to home and small-office setups.

Prerequisites​

Before you start, check these items:
  • Windows edition:
    • Tamper Protection works on Windows 10/11 (Home/Pro/Enterprise).
    • Applying security baselines via Group Policy is easiest on Windows Pro/Enterprise/Education. (Home can still use Tamper Protection, and you can review baseline recommendations, but applying them is more limited.
  • Admin access: You’ll need a local administrator account.
  • Windows version notes:
    • Windows 10: 1909 and newer is ideal for the newest baseline sets and Defender options.
    • Windows 11: any supported release (21H2/22H2/23H2/24H2) works.
  • Backups recommended: Make sure you have a recent restore point or system image. (Baselines can change many settings at once.
Note: If you use a third-party antivirus, Tamper Protection and some Defender settings may be unavailable or behave differently because Defender runs in a reduced mode.

Step-by-step: Enable Microsoft Defender Tamper Protection (Windows 10/11)​

Tamper Protection helps stop malware, scripts, or “helpful” tools from turning off Defender protections (like real-time scanning or cloud protection) without your consent.
  1. Open Windows Security
    • Press Start, type Windows Security, and open it.
  2. Go to Virus & threat protection
    • Click Virus & threat protection.
  3. Open Virus & threat protection settings
    • Under Virus & threat protection settings, click Manage settings.
  4. Turn on Tamper Protection
    • Find Tamper Protection and set it to On.
  5. Confirm it’s enabled
    • You should see Tamper Protection set to On immediately.
    • If it won’t turn on, see the troubleshooting section below.
Tip: While you’re here, consider enabling:
  • Cloud-delivered protection (faster threat response)
  • Automatic sample submission (helps Defender learn quickly)
    These options improve detection rates, especially for new threats.
Warning: If you manage Defender via enterprise tools (Microsoft Intune / Defender for Endpoint / Group Policy), some settings may be controlled by your organization. Tamper Protection might be enforced or locked.

Step-by-step: Apply Microsoft Security Baselines (the “supported” way)​

Microsoft publishes Security Baselines for Windows and Microsoft Defender. These are pre-configured policy recommendations meant to reduce attack surface while maintaining usability.

Option A (Recommended): Apply baseline using Local Group Policy (Windows Pro/Enterprise)​

This method uses Microsoft’s baseline package and applies settings through policy templates. It’s the closest “official” approach for standalone PCs without enterprise management.
  1. Create a restore point (quick safety net)
    • Press Start, type Create a restore point, open it.
    • Under Protection Settings, select your system drive (usually C:), click Create, name it (e.g., Before Security Baseline).
  2. Download the Microsoft Security Baselines package
    • Go to Microsoft’s official Security Baselines page and download the baseline for your OS (Windows 10 or Windows 11).
    • The download typically contains:
      • GPO backups
      • Documentation (Excel/HTML)
      • Scripts or tools for importing
  3. Extract the ZIP
    • Right-click the ZIP → Extract All.
    • Place it somewhere simple like C:\SecurityBaseline\.
  4. Review the baseline documentation first (highly recommended)
    • Open the provided documentation file (often an Excel sheet).
    • Look for common “impact” items such as:
      • Credential and authentication hardening
      • Attack Surface Reduction (ASR) rules
      • Firewall settings
      • SmartScreen / Office macro-related restrictions
    Tip: Don’t blindly apply everything if you rely on legacy apps, older printers/scanners, or custom scripts.
  5. Open Local Group Policy Editor
    • Press Win + R, type gpedit.msc, press Enter.
  6. Import baseline GPO settings
    • Depending on the baseline package, you’ll usually import settings by restoring a GPO backup into Local Group Policy or using Microsoft-provided scripts.
    • Follow the package’s included instructions (often a README) to:
      • Import the baseline policy objects, or
      • Manually apply the recommended settings through the documented paths in Group Policy.
    Note: Baseline packages are updated as Windows changes. Always use the baseline that matches your Windows version.
  7. Force policy update
    • Open an elevated Command Prompt (Start → type cmdRun as administrator)
    • Run:
      gpupdate /force
  8. Restart your PC
    • Baselines often affect security services and authentication policies; a reboot ensures everything applies cleanly.

Option B: “Baseline-style” hardening for Windows Home (practical alternative)​

Windows Home doesn’t include the full Local Group Policy Editor by default. If you’re on Home, you can still meaningfully harden the system:
  1. Enable Tamper Protection (previous section).
  2. Turn on Core isolation / Memory integrity (if supported):
    • Windows Security → Device securityCore isolationMemory integrityOn
  3. Ensure SmartScreen is enabled:
    • Windows Security → App & browser control → set SmartScreen options to Warn/Block
  4. Keep Firewall on for all profiles:
    • Windows Security → Firewall & network protection → ensure Domain/Private/Public are On
  5. Use standard user for daily work:
    • Settings → Accounts → Family & other users → create a standard account and use it day-to-day
Tip: Windows Home users can still implement many baseline outcomes—just not via one centralized GPO import.

Verify your protections (quick checks)​

After enabling Tamper Protection and applying a baseline (or baseline-like settings), verify:
  1. Tamper Protection
    • Windows Security → Virus & threat protection → Manage settings → Tamper Protection: On
  2. Defender is active
    • Windows Security main page should show No actions needed (or list recommended actions).
    • Confirm Real-time protection is on.
  3. Firewall profiles
    • Windows Security → Firewall & network protection → verify Private/Public are enabled.
  4. Windows Update
    • Settings → Windows Update → Check for updates (security baselines assume you’re patched).

Tips, warnings, and troubleshooting​

Tamper Protection is missing or won’t turn on​

  • Third-party antivirus installed: Defender may be in passive mode. Uninstall the third-party AV (or disable it properly) if you want Defender fully active.
  • Work/school managed device: Organization policy may lock settings. Check Settings → Accounts → Access work or school.
  • Outdated Windows: Install the latest cumulative updates and reboot.

Baseline breaks an app, script, or device feature​

Security baselines can restrict behaviors commonly abused by malware (macros, unsigned scripts, weak authentication).
  • Roll back quickly:
    • Use your restore point, or
    • Undo the specific policy changes you applied (best if you did a staged rollout).
  • Apply in stages:
    • If possible, apply baseline sections one at a time (Defender rules first, then firewall, then credential hardening).
Warning: Some baseline settings intentionally reduce convenience (e.g., tightening script execution or blocking older auth). That’s normal—security often trades off with legacy compatibility.

You want “maximum” Defender hardening​

Consider (carefully) enabling additional Microsoft Defender features commonly aligned with baseline strategies:
  • Attack Surface Reduction (ASR) rules (especially blocking Office from creating child processes, blocking credential stealing)
  • Controlled folder access (protects documents against ransomware)
    These can be great, but test them if you rely on specialized software.

Conclusion​

Enabling Windows Defender Tamper Protection prevents many common “turn off security” attacks, while applying Microsoft Security Baselines brings your PC closer to Microsoft’s recommended hardened configuration. Together, they reduce your attack surface, improve resilience against malware and unwanted changes, and help ensure your security settings stay put over time.
Key Takeaways:
  • Tamper Protection helps stop unauthorized changes to Microsoft Defender settings.
  • Microsoft Security Baselines provide a vetted set of hardening recommendations for Windows and Defender.
  • Apply baselines thoughtfully (and preferably in stages), and keep a restore point for quick rollback.
  • Even Windows Home users can adopt many baseline-aligned protections via Windows Security settings.

This tutorial was generated to help WindowsForum.com users get the most out of their Windows experience.
 

Back
Top