Thanks for the detailed outputs. Right now WinDefend and WdNisSvc won’t start because Windows still sees Defender as disabled/passive or its platform/feature isn’t fully present. Let’s bring Defender AV online first, then enable Controlled Folder Access (CFA).
Do this exactly (Admin PowerShell; step-by-step)
Prep
- Turn Tamper Protection OFF temporarily:
Windows Security > Virus & threat protection > Manage settings > Tamper Protection = Off.
1) Remove any policies that disable Defender
Copy/paste the whole block. “Cannot find” is OK.
reg delete "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /f
reg delete "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiVirus /f
reg delete "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /f
reg delete "HKLM\SOFTWARE\Microsoft\Windows Defender" /v PassiveMode /f
reg delete "HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" /v ForceDefenderPassiveMode /f
gpupdate /force
2) Make sure the Defender feature is enabled and files exist
- Check the feature:
dism /online /Get-Features /Format:Table | findstr /i Defender
- If you see Windows-Defender-Features = Disabled, enable it:
dism /online /Enable-Feature /FeatureName:Windows-Defender-Features /All /NoRestart
- Repair system files (safe):
sfc /scannow
DISM /online /Cleanup-Image /RestoreHealth
3) Refresh Defender platform/signatures
Use the call operator so PowerShell actually runs the EXE:
$mp = "$env
rogramFiles\Windows Defender\MpCmdRun.exe"
& $mp -RemoveDefinitions -All
& $mp -SignatureUpdate
& $mp -PlatformUpdate
4) Start the required services
sc.exe config WinDefend start= auto
sc.exe start WinDefend
sc.exe config WdNisSvc start= demand
sc.exe start WdNisSvc
sc.exe config SecurityHealthService start= auto
sc.exe start SecurityHealthService
5) Verify status, then enable CFA
Get-MpComputerStatus | Select AMServiceEnabled,AntivirusEnabled,RealTimeProtectionEnabled,PassiveMode,AMProductVersion
Set-MpPreference -EnableControlledFolderAccess Enabled
Turn Tamper Protection back ON in Windows Security.
If any start command fails
Please run these and paste the outputs (they give the exact reason):
- sc.exe qc WinDefend
- sc.exe queryex WinDefend
- sc.exe qc WdNisSvc
- sc.exe queryex WdNisSvc
- wevtutil qe System /q:"*[System[Provider[@Name='Service Control Manager'] and (EventID=7000 or EventID=7001 or EventID=7034)]" /c:5 /f:text /rd:true
Typical next fixes based on those results
- If “The system cannot find the file specified”: the Defender platform folder is missing; the PlatformUpdate above should fix it. If not, run Windows Update or do an in‑place repair (keep apps/files) from the 24H2 ISO.
- If “Access is denied”: Tamper Protection is still on, or a policy remains—recheck step 1 and confirm Tamper is Off while changing services.
- If WDFilter driver isn’t running (sc query wdfilter shows Stopped/Not found): run sfc/DISM again; this driver is part of Defender features.
Once WinDefend shows Running and PassiveMode=False in Get‑MpComputerStatus, CFA will enable without error.