There’s a reason why I’m skeptical about the fancy new security features touted for Win10 versions. In many cases, at least for me, they don’t work. E
[See the full post at: Another key Win10 security feature bites the dust: Say goodbye to Windows Defender Exploit Guard]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Another key Win10 security feature bites the dust: Say goodbye to Windows Defender Exploit Guard
Home » Forums » Newsletter and Homepage topics » Another key Win10 security feature bites the dust: Say goodbye to Windows Defender Exploit Guard
- This topic has 15 replies, 9 voices, and was last updated 5 years, 6 months ago.
AuthorTopicwoody
ManagerNovember 22, 2019 at 8:08 am #2009401Viewing 8 reply threadsAuthorReplies-
anonymous
Guest -
pHROZEN gHOST
AskWoody LoungerNovember 22, 2019 at 9:12 am #2009446Coming soon … a script to turn off Windows and go back to DOS.
Byte me!
2 users thanked author for this post.
-
WildBill
AskWoody PlusNovember 22, 2019 at 9:22 am #2009451Is that even possible anymore? Probably for Micro$oft, but not for real-world users… okay, it’s probably a jokey jab at M$, but some people would actually prefer to go back to the old-school MS-DOS command line.
Bought a refurbished Windows 10 64-bit, currently updated to 22H2. Have broke the AC adapter cord going to the 8.1 machine, but before that, coaxed it into charging. Need to buy new adapter if wish to continue using it.
Wild Bill Rides Again... -
anonymous
GuestNovember 22, 2019 at 9:36 am #2009456Oh yes, DOS had less Adware/Bloatware/C***ware pushing with considerably less Spying, update forcing, and useless UI changes than 10. And no cloud logins surreptitiously enforced by trying to hide the local login options.
Windows 10 really wants to become the cable box of OSs where the end user has little say in their captive state of take it or take it again options under Windows 10.
1 user thanked author for this post.
-
-
WildBill
AskWoody PlusNovember 22, 2019 at 9:15 am #2009447If you (the Famous Woody!) couldn’t get Exploit Guard to work, what hope did us average schlub users have? & now M$ wants everyone to disable it in Win10 1909?! What were the odds that it ever worked… for power users and enterprise security “experts”?!?
Bought a refurbished Windows 10 64-bit, currently updated to 22H2. Have broke the AC adapter cord going to the 8.1 machine, but before that, coaxed it into charging. Need to buy new adapter if wish to continue using it.
Wild Bill Rides Again... -
warrenrumak
AskWoody LoungerNovember 22, 2019 at 9:19 am #2009448Woody, you’re being pretty dishonest here.
Microsoft isn’t “recommending” that WDEG be turned off. That’s not what the linked content says at all. What’s happening here is that they aren’t pushing it to be turned on by default anymore because of compatibility concerns.
I’ll give you an extremely practical example: untrusted fonts.
Fonts are a viable attack vector because they contain executable code, and any application that displays a font preview could potentially trigger an exploit. There have been many security vulnerabilities found & fixed over the years with font handling, and it’s part of the reason why font handling was moved out of the kernel after Windows Vista. So, it is worth considering whether fonts that aren’t formally installed into C:\Windows\Fonts should be allowed to be used. This includes printer servers that might not have the requested font installed, so the font gets sent with the print job. In Windows 10, this is turned off by default, but enabling WDEG turns it on.
So what ended up happening is, people would apply the Security Baseline, which includes enabling WDEG, and find they couldn’t print anymore. That’s a step too far for many people, and it made the Security Baseline useless.
Reading material: Block untrusted fonts in an enterprise
-
This reply was modified 5 years, 6 months ago by
warrenrumak.
-
This reply was modified 5 years, 6 months ago by
warrenrumak.
2 users thanked author for this post.
-
This reply was modified 5 years, 6 months ago by
-
woody
Manager
-
-
RetiredGeek
AskWoody_MVPNovember 22, 2019 at 9:22 am #2009452To make this a bit easier I’ve downloaded the SB and extracted the necessary files (2).
I’ve also modified the PowerShell so it looks for the .xml file in the same folder as the .ps1 file.
Here’s a .zip file with both files. Just extract them to your scripts directory then run the Remove-EPBaselineSettings.ps1 file. Note: You will get no output if successful otherwise you will get PowerShell errors.
HTH
-
anonymous
Guest -
b
AskWoody_MVPNovember 22, 2019 at 12:54 pm #2009573There’s a reason why I’m skeptical about the fancy new security features touted for Win10 versions. In many cases, at least for me, they don’t work.
Take, if you will, the Windows Defender Exploit Guard. When Win10 version 1709 hit the street, it was billed as a major new security feature that the whole world needs. Although on the surface it seemed like something I could understand — keep rogue programs out of key pieces of Windows — I never got it to work right.
…
So this once-highly-touted security feature has not only bitten the dust, there’s a handy program included in the Security Baselines toolbox that makes it easy to ensure that the %$#@! thing has been turned off everywhere.There’s a reason to be skeptical of new security “features” that you don’t understand….
I think you’ve totally misinterpreted the recommended change, and also totally misremembered what you couldn’t get to work.
No feature has “bitten the dust” here. Windows Defender Exploit Guard consists of four parts:
The four components of Windows Defender Exploit Guard are:
Attack Surface Reduction (ASR): A set of controls that enterprises can enable to prevent malware from getting on the machine by blocking Office-, script-, and email-based threats
Network protection: Protects the endpoint against web-based threats by blocking any outbound process on the device to untrusted hosts/IP through Windows Defender SmartScreen
Controlled folder access: Protects sensitive data from ransomware by blocking untrusted processes from accessing your protected folders
Exploit protection: A set of exploit mitigations (replacing EMET) that can be easily configured to protect your system and applications
Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware
The recommended changes only affect the ASR component. Check the newly-provided EP.reset file and you will find it only removes previously recommended ASR settings for 26 common programs.
This is only likely to affect Enterprises who had opted for higher-than-normal security by following the version 1709 security baseline (if not already reverted due to issues over the last two years).
The part you tried, but dismissed almost immediately, was Controlled Folder Access (the anti-ransomware component, which is why you mention “keep rogue programs out of key pieces of Windows”):
Yep, but Controlled Folder Access, in my experience, is a monumental pain. Far too many false positives.
Controlled Folder Access was initially very difficult to manage in version 1709 as allowing access for a specific program involved finding the appropriate path and .exe filename yourself. But it was made MUCH easier in version 1809 which lists recently blocked apps which can be allowed with a single click:
Controlled folder access improvements: Controlled folder access can help prevent ransomware and other destructive malware from changing your personal files. Sometimes apps that you normally use might be blocked from making changes to common folders like Documents and Pictures, and we’ve listened to feedback and made it easier for you to allow apps that were recently blocked so you can stay productive while using this great feature.
To allow a recently blocked app to make changes to your protected folders, open the Virus & threat protection section, then click Ransomware protection, and Allow an app through Controlled folder access. From there you can click the plus button to allow an app, and you’ll see the new option to add Recently blocked apps. This will open a list where you can easily choose which blocked items you’d like to trust to make changes. Alternately you can still browse for an app to allow.
It was recommended in the AskWoody newsletter only a couple of months ago:
Next up, Controlled folder access should also be enabled; it prevents malicious programs from changing system and personal-profile files and folders.
How to block malware with Windows’ built-in securityAnd earlier this year in the Newsletter, Susan Bradley mentioned it as one of the reasons Windows 10 is more secure than Windows 7: “… and controlled folder access (anti-ransomware protection) — none of which you’ll find in Windows 7.”
It should provide excellent protection against ransomware. I’ve been using it for the last year without any issues. You really should give it another try.
-
wavy
AskWoody Plus -
AlexEiffel
AskWoody_MVPNovember 25, 2019 at 2:55 pm #2011041To be fair here, Microsoft has always been in a delicate position with these kind of features. If they enable the security features, things developed with lazy standards stop working. If they don’t enable them, lots of developers don’t even care coding with them in mind and things don’t change.
==
-Hey big security company, how come your camera’s client software doesn’t work under a standard user account? This concept has been around for a very long time and being in the industry you are in, you should, of all suppliers, know better.
-Oh, just disable UAC and use the normal admin account on your user station and it will work.
==
-Hey, software supplier, could you just recompile your software with more recent tools so it doesn’t break under ASLR?
-What?
==
-Hey bank, your web site doesn’t work properly.
-Could you disable your firewall and antivirus? We sometimes have problems with those.
or
-Are you behind a firewall? Oh, yeah, well sometimes we have issues with companies using firewalls.
or
-Sorry, do you use Chrome because our web site only works with Chrome?
Viewing 8 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
23 minutes ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
5 hours, 39 minutes ago -
Stop the OneDrive defaults
by
CWBillow
1 hour, 11 minutes ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
11 hours, 7 minutes ago -
X Suspends Encrypted DMs
by
Alex5723
13 hours, 19 minutes ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
13 hours, 37 minutes ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
14 hours, 14 minutes ago -
OpenAI model sabotages shutdown code
by
Cybertooth
14 hours, 51 minutes ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
3 hours, 1 minute ago -
Enabling Secureboot
by
ITguy
10 hours, 1 minute ago -
Windows hosting exposes additional bugs
by
Susan Bradley
22 hours, 45 minutes ago -
No more rounded corners??
by
CWBillow
18 hours, 34 minutes ago -
Android 15 and IPV6
by
Win7and10
8 hours, 19 minutes ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
1 day, 11 hours ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
1 day, 13 hours ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
1 day, 8 hours ago -
Windows Update orchestration platform to update all software
by
Alex5723
1 day, 21 hours ago -
May preview updates
by
Susan Bradley
1 day, 8 hours ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
1 day ago -
Just got this pop-up page while browsing
by
Alex5723
1 day, 13 hours ago -
KB5058379 / KB 5061768 Failures
by
crown
1 day, 10 hours ago -
Windows 10 23H2 Good to Update to ?
by
jkitc
12 hours, 34 minutes ago -
At last – installation of 24H2
by
Botswana12
2 days, 12 hours ago -
MS-DEFCON 4: As good as it gets
by
Susan Bradley
9 hours, 21 minutes ago -
RyTuneX optimize Windows 10/11 tool
by
Alex5723
3 days ago -
Can I just update from Win11 22H2 to 23H2?
by
Dave Easley
23 hours, 17 minutes ago -
Limited account permission error related to Windows Update
by
gtd12345
3 days, 14 hours ago -
Another test post
by
gtd12345
3 days, 14 hours ago -
Connect to someone else computer
by
wadeer
3 days, 8 hours ago -
Limit on User names?
by
CWBillow
3 days, 12 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.